Recent techniques reduce ORAM communication complexity down to constant in the number of blocks N. However, they induce expensive homomorphic encryption on both the server and the client. In this paper, we present an alternative approach CHf-ORAM. This ORAM features constant communication complexity without homomorphic encryption, in exchange for expanding the traditional ORAM setting from single-server to multiple non-colluding servers. We show that adding as few as 4 servers allows for substantially reduced client and server computation compared to existing single-server alternatives. Our approach uses techniques from information-theoretically secure Private Information Retrieval to replace homomorphic encryption with simple XOR operation...
We demonstrate a simple, statistically secure, ORAM with computational overhead Õ(log2 n); previ-ou...
We design and implement GigaDORAM, a novel 3-server Distributed Oblivious Random Access Memory (DOR...
Oblivious RAM (ORAM) is a provable technique to protect a user’s access pattern to outsourced data. ...
Abstract—Recent techniques reduce ORAM communication complexity down to constant in the number of bl...
There have been several attempts recently at using homomorphic encryption to increase the efficiency...
Oblivious Random Access Machine (ORAM) enables a client to access her data without leaking her acces...
Recently, server-with-computation model has been applied in Oblivious RAM scheme to achieve constant...
We show a protocol for two-server oblivious RAM (ORAM) that is simpler and more efficient than the b...
This paper proposes TSKT-oblivious RAM (ORAM), an efficient multi-server ORAM construction, to prote...
We design and implement a Distributed Oblivious Random Access Memory (ORAM) data structure that is o...
Abstract. It has been an open question whether Oblivious RAM stored on a ma-licious server can be se...
Abstract—Recent research results on tree-based Oblivious RAM by Shi et al. [15] obtain communication...
Oblivious RAM (ORAM) is a cryptographic primitive that hides memory access patterns as seen by untru...
Oblivious RAM (ORAM) is important for applications that require hiding access patterns. Many ORAM sc...
We demonstrate a simple, statistically secure, ORAM with computational overhead Õ(log2 n); previ-ou...
We demonstrate a simple, statistically secure, ORAM with computational overhead Õ(log2 n); previ-ou...
We design and implement GigaDORAM, a novel 3-server Distributed Oblivious Random Access Memory (DOR...
Oblivious RAM (ORAM) is a provable technique to protect a user’s access pattern to outsourced data. ...
Abstract—Recent techniques reduce ORAM communication complexity down to constant in the number of bl...
There have been several attempts recently at using homomorphic encryption to increase the efficiency...
Oblivious Random Access Machine (ORAM) enables a client to access her data without leaking her acces...
Recently, server-with-computation model has been applied in Oblivious RAM scheme to achieve constant...
We show a protocol for two-server oblivious RAM (ORAM) that is simpler and more efficient than the b...
This paper proposes TSKT-oblivious RAM (ORAM), an efficient multi-server ORAM construction, to prote...
We design and implement a Distributed Oblivious Random Access Memory (ORAM) data structure that is o...
Abstract. It has been an open question whether Oblivious RAM stored on a ma-licious server can be se...
Abstract—Recent research results on tree-based Oblivious RAM by Shi et al. [15] obtain communication...
Oblivious RAM (ORAM) is a cryptographic primitive that hides memory access patterns as seen by untru...
Oblivious RAM (ORAM) is important for applications that require hiding access patterns. Many ORAM sc...
We demonstrate a simple, statistically secure, ORAM with computational overhead Õ(log2 n); previ-ou...
We demonstrate a simple, statistically secure, ORAM with computational overhead Õ(log2 n); previ-ou...
We design and implement GigaDORAM, a novel 3-server Distributed Oblivious Random Access Memory (DOR...
Oblivious RAM (ORAM) is a provable technique to protect a user’s access pattern to outsourced data. ...