Revisiting Square-Root ORAM: Efficient Random Access in Multi-party Computation

@article{Zahur2016RevisitingSO,
  title={Revisiting Square-Root ORAM: Efficient Random Access in Multi-party Computation},
  author={Samee Zahur and Xiao Wang and Mariana Raykova and Adri{\`a} Gasc{\'o}n and Jack Doerner and David Evans and Jonathan Katz},
  journal={2016 IEEE Symposium on Security and Privacy (SP)},
  year={2016},
  pages={218-234}
}
Hiding memory access patterns is required for secure computation, but remains prohibitively expensive for many interesting applications. Prior work has either developed custom algorithms that minimize the need for data-dependant memory access, or proposed the use of Oblivious RAM (ORAM) to provide a general-purpose solution. However, most ORAMs are designed for client-server scenarios, and provide only asymptotic benefits in secure computation. Even the best prior schemes show concrete benefits… CONTINUE READING
Highly Cited
This paper has 38 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 27 extracted citations

Secure Computation with Differentially Private Access Patterns

ACM Conference on Computer and Communications Security • 2018
View 4 Excerpts
Highly Influenced

Differentially Private Access Patterns in Secure Computation

IACR Cryptology ePrint Archive • 2017
View 12 Excerpts
Highly Influenced

Active Attack Against Oblivious RAM

2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA) • 2018
View 1 Excerpt

An Efficient Oblivious Database for the Public Cloud

Saba Eskandarian Stanford saba
2018
View 2 Excerpts

Efficient 3-Party Distributed ORAM

IACR Cryptology ePrint Archive • 2018
View 2 Excerpts

References

Publications referenced by this paper.
Showing 1-10 of 45 references

A Permutation Network

J. ACM • 1968
View 3 Excerpts
Highly Influenced

: A Lightweight Compiler for DataOblivious Computation

Samee Zahur, David Evans. Obliv-C
Cryptology ePrint Archive , Report • 2015

ObliVM: A Programming Framework for Secure Computation

2015 IEEE Symposium on Security and Privacy • 2015
View 3 Excerpts

Obliv-C: A Lightweight Compiler for Data-Oblivious Computation

Samee Zahur, David Evans
Cryptology ePrint Archive, Report 2015/1153, • 2015
View 4 Excerpts

Secure Computation of MIPS Machine Code

IACR Cryptology ePrint Archive • 2015
View 1 Excerpt

Similar Papers

Loading similar papers…