Cryptology ePrint Archive: Report 2015/005
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM
Srinivas Devadas and Marten van Dijk and Christopher W. Fletcher and Ling Ren and Elaine Shi and Daniel Wichs
Abstract: We present Onion ORAM, an Oblivious RAM (ORAM) with constant worst-case bandwidth blowup that leverages poly-logarithmic server computation to circumvent the logarithmic ORAM bandwidth lower bound.
Our construction does not require fully homomorphic encryption, but employs an additive homomorphic encryption scheme such as the Damg\r{a}rd-Jurik cryptosystem, or alternatively a BGV-style somewhat homomorphic encryption scheme without bootstrapping. At the core of our construction is an ORAM scheme that has ``shallow circuit depth'' over the entire history of ORAM accesses. We also propose novel techniques to achieve security against a malicious server, without resorting to expensive and non-standard techniques such as SNARKs. To the best of our knowledge, Onion ORAM is the first concrete instantiation of a constant-bandwidth ORAM under standard assumptions (even for the semi-honest setting).
Category / Keywords: ORAM, Cryptographic Protocols
Date: received 5 Jan 2015, last revised 14 Jul 2015
Contact author: renling at mit edu
Available format(s): PDF | BibTeX Citation
Version: 20150714:222440 (All versions of this report)
Short URL: ia.cr/2015/005
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]