Efficient 3-Party Distributed ORAM

作者: Paul Bunn , Jonathan Katz , Eyal Kushilevitz , Rafail Ostrovsky

DOI: 10.1007/978-3-030-57990-6_11

关键词:

摘要: Distributed Oblivious RAM (DORAM) protocols—in which parties obliviously access a shared location in array—are fundamental component of secure-computation protocols the model. We show here an efficient, 3-party DORAM protocol with semi-honest security for single corrupted party. To best our knowledge, ours is first this setting that runs constant rounds, requires sublinear communication and linear work, makes only black-box use cryptographic primitives. Our also appears to be concretely more efficient than existing solutions.

参考文章(35)
Niv Gilboa, Yuval Ishai, Distributed Point Functions and their Applications theory and application of cryptographic techniques. pp. 640- 658 ,(2014) , 10.1007/978-3-642-55220-5_35
Eyal Kushilevitz, Rafail Ostrovsky, Steve Lu, On the (in)security of hash-based oblivious RAM and a new balancing scheme symposium on discrete algorithms. pp. 143- 156 ,(2012) , 10.5555/2095116.2095129
Elette Boyle, Niv Gilboa, Yuval Ishai, Function Secret Sharing theory and application of cryptographic techniques. pp. 337- 367 ,(2015) , 10.1007/978-3-662-46803-6_12
Arash Afshar, Zhangxiang Hu, Payman Mohassel, Mike Rosulek, How to Efficiently Evaluate RAM Programs with Malicious Security theory and application of cryptographic techniques. pp. 702- 729 ,(2015) , 10.1007/978-3-662-46800-5_27
Elaine Shi, T. -H. Hubert Chan, Emil Stefanov, Mingfei Li, Oblivious RAM with o((logn) 3 ) worst-case cost international conference on the theory and application of cryptology and information security. pp. 197- 214 ,(2011) , 10.1007/978-3-642-25385-0_11
Kartik Nayak, Xiao Shaun Wang, Stratis Ioannidis, Udi Weinsberg, Nina Taft, Elaine Shi, None, GraphSC: Parallel Secure Computation Made Easy 2015 IEEE Symposium on Security and Privacy. pp. 377- 394 ,(2015) , 10.1109/SP.2015.30
Michael T. Goodrich, Michael Mitzenmacher, Privacy-preserving access of outsourced data via oblivious RAM simulation international colloquium on automata languages and programming. pp. 576- 587 ,(2011) , 10.1007/978-3-642-22012-8_46
Ling Ren, Christopher Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten Van Dijk, Srinivas Devadas, None, Constants count: practical improvements to oblivious RAM usenix security symposium. pp. 415- 430 ,(2015)
Oded Goldreich, Rafail Ostrovsky, Software protection and simulation on oblivious RAMs Journal of the ACM. ,vol. 43, pp. 431- 473 ,(1996) , 10.1145/233551.233553
Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan, Efficient Private File Retrieval by Combining ORAM and PIR. network and distributed system security symposium. ,(2014) , 10.14722/NDSS.2014.23033