Paper 2017/827
Scaling ORAM for Secure Computation
Jack Doerner and abhi shelat
Abstract
We design and implement a Distributed Oblivious Random Access Memory (ORAM) data structure that is optimized for use in two-party secure computation protocols. We improve upon the access time of previous constructions by a factor of up to ten, their memory overhead by a factor of one hundred or more, and their initialization time by a factor of thousands. We are able to instantiate ORAMs that hold
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Major revision. ACM CCS 2017
- DOI
- 10.1145/3133956.3133967
- Keywords
- Oblivious RAMPrivate Information RetrievalSecure Multi-Party Computation
- Contact author(s)
- j @ ckdoerner net
- History
- 2018-01-09: last of 3 revisions
- 2017-08-31: received
- See all versions
- Short URL
- https://ia.cr/2017/827
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2017/827, author = {Jack Doerner and abhi shelat}, title = {Scaling {ORAM} for Secure Computation}, howpublished = {Cryptology {ePrint} Archive, Paper 2017/827}, year = {2017}, doi = {10.1145/3133956.3133967}, url = {https://eprint.iacr.org/2017/827} }