File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-642-25385-0_11
- Scopus: eid_2-s2.0-82955173838
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Oblivious RAM with O((log N)3) worst-case cost
Title | Oblivious RAM with O((log N)3) worst-case cost |
---|---|
Authors | |
Keywords | Asymptotic performance Data access Data blocks ITS data Novel techniques Untrusted server |
Issue Date | 2011 |
Publisher | Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ |
Citation | The 17th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2011), Seoul, South Korea, 4-8 December 2011. In Lecture Notes in Computer Science, 2011, v. 7073, p. 197-214 How to Cite? |
Abstract | Oblivious RAM is a useful primitive that allows a client to hide its data access patterns from an untrusted server in storage outsourcing applications. Until recently, most prior works on Oblivious RAM aim to optimize its amortized cost, while suffering from linear or even higher worst-case cost. Such poor worst-case behavior renders these schemes impractical in realistic settings, since a data access request can occasionally be blocked waiting for an unreasonably large number of operations to complete.
This paper proposes novel Oblivious RAM constructions that achieves poly-logarithmic worst-case cost, while consuming constant client-side storage. To achieve the desired worst-case asymptotic performance, we propose a novel technique in which we organize the O-RAM storage into a binary tree over data buckets, while moving data blocks obliviously along tree edges. |
Description | LNCS v. 7073 entitled: Advances in Cryptology – ASIACRYPT 2011 |
Persistent Identifier | http://hdl.handle.net/10722/139993 |
ISBN | |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shi, E | en_US |
dc.contributor.author | Chan, HTH | en_US |
dc.contributor.author | Stefanov, E | en_US |
dc.contributor.author | Li, M | en_US |
dc.date.accessioned | 2011-09-23T06:04:29Z | - |
dc.date.available | 2011-09-23T06:04:29Z | - |
dc.date.issued | 2011 | en_US |
dc.identifier.citation | The 17th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2011), Seoul, South Korea, 4-8 December 2011. In Lecture Notes in Computer Science, 2011, v. 7073, p. 197-214 | en_US |
dc.identifier.isbn | 978-364225384-3 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10722/139993 | - |
dc.description | LNCS v. 7073 entitled: Advances in Cryptology – ASIACRYPT 2011 | - |
dc.description.abstract | Oblivious RAM is a useful primitive that allows a client to hide its data access patterns from an untrusted server in storage outsourcing applications. Until recently, most prior works on Oblivious RAM aim to optimize its amortized cost, while suffering from linear or even higher worst-case cost. Such poor worst-case behavior renders these schemes impractical in realistic settings, since a data access request can occasionally be blocked waiting for an unreasonably large number of operations to complete. This paper proposes novel Oblivious RAM constructions that achieves poly-logarithmic worst-case cost, while consuming constant client-side storage. To achieve the desired worst-case asymptotic performance, we propose a novel technique in which we organize the O-RAM storage into a binary tree over data buckets, while moving data blocks obliviously along tree edges. | - |
dc.language | eng | en_US |
dc.publisher | Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ | - |
dc.relation.ispartof | Lecture Notes in Computer Science | en_US |
dc.rights | The original publication is available at www.springerlink.com | - |
dc.subject | Asymptotic performance | - |
dc.subject | Data access | - |
dc.subject | Data blocks | - |
dc.subject | ITS data | - |
dc.subject | Novel techniques | - |
dc.subject | Untrusted server | - |
dc.title | Oblivious RAM with O((log N)3) worst-case cost | en_US |
dc.type | Conference_Paper | en_US |
dc.identifier.email | Chan, HTH: hubert@cs.hku.hk | en_US |
dc.identifier.authority | Chan, HTH=rp01312 | en_US |
dc.description.nature | postprint | - |
dc.identifier.doi | 10.1007/978-3-642-25385-0_11 | - |
dc.identifier.scopus | eid_2-s2.0-82955173838 | - |
dc.identifier.hkuros | 193269 | en_US |
dc.identifier.volume | 7073 | - |
dc.identifier.spage | 197 | - |
dc.identifier.epage | 214 | - |
dc.publisher.place | Germany | - |
dc.customcontrol.immutable | sml 131009 | - |
dc.identifier.issnl | 0302-9743 | - |