Distributed Oblivious RAM (DORAM) protocols---in which parties obliviously access a shared location in a shared array---are a fundamental component of secure-computation protocols in the RAM model. We show here an efficient, 3-party DORAM protocol with semi-honest security for a single corrupted party. To the best of our knowledge, ours is the first protocol for this setting that runs in constant rounds, requires sublinear communication and linear work, and makes only black-box use of cryptographic primitives. We believe our protocol is also concretely more efficient than existing solutions. As a building block of independent interest, we construct a 3-server distributed point function with security against two colluding servers that is si...
We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which enables a cl...
The all increasing need for data protection has given raise to a plethora of privacy preserving cry...
Hiding memory access patterns is required for secure computation, but remains prohibitively expensiv...
Distributed Oblivious Random Access Memory (DORAM) is a secure multiparty protocol that allows a gr...
An Oblivious RAM (ORAM) protocol allows a client to access memory outsourced at the server without l...
This paper presents the first Distributed Oblivious RAM (DORAM) protocol that achieves sub-logarithm...
We design and implement a Distributed Oblivious Random Access Memory (ORAM) data structure that is o...
We design and implement GigaDORAM, a novel 3-server Distributed Oblivious Random Access Memory (DOR...
We show a protocol for two-server oblivious RAM (ORAM) that is simpler and more efficient than the b...
Abstract. Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely ac...
Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely access untru...
Oblivious RAM (ORAM), first introduced in the ground-breaking work of Goldreich and Ostrovsky (STOC ...
Abstract. It has been an open question whether Oblivious RAM stored on a ma-licious server can be se...
When multiple users and applications share the resources on cloud servers, information may be leaked...
302 pagesOblivious RAM (ORAM), introduced by Goldreich and Ostrovsky (STOC'87, J.~ACM'96), is a data...
We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which enables a cl...
The all increasing need for data protection has given raise to a plethora of privacy preserving cry...
Hiding memory access patterns is required for secure computation, but remains prohibitively expensiv...
Distributed Oblivious Random Access Memory (DORAM) is a secure multiparty protocol that allows a gr...
An Oblivious RAM (ORAM) protocol allows a client to access memory outsourced at the server without l...
This paper presents the first Distributed Oblivious RAM (DORAM) protocol that achieves sub-logarithm...
We design and implement a Distributed Oblivious Random Access Memory (ORAM) data structure that is o...
We design and implement GigaDORAM, a novel 3-server Distributed Oblivious Random Access Memory (DOR...
We show a protocol for two-server oblivious RAM (ORAM) that is simpler and more efficient than the b...
Abstract. Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely ac...
Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely access untru...
Oblivious RAM (ORAM), first introduced in the ground-breaking work of Goldreich and Ostrovsky (STOC ...
Abstract. It has been an open question whether Oblivious RAM stored on a ma-licious server can be se...
When multiple users and applications share the resources on cloud servers, information may be leaked...
302 pagesOblivious RAM (ORAM), introduced by Goldreich and Ostrovsky (STOC'87, J.~ACM'96), is a data...
We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which enables a cl...
The all increasing need for data protection has given raise to a plethora of privacy preserving cry...
Hiding memory access patterns is required for secure computation, but remains prohibitively expensiv...