Paper 2024/1650

Towards Practical Oblivious Map

Xinle Cao, Zhejiang University
Weiqi Feng, University of Massachusetts Amherst
Jian Liu, Zhejiang University
Jinjin Zhou, Ant Group
Wenjing Fang, Ant Group
Lei Wang, Ant Group
Quanqing Xu, OceanBase, Ant Group
Chuanhui Yang, OceanBase, Ant Group
Kui Ren, Zhejiang University
Abstract

Oblivious map (OMAP) is an important component in encrypted databases, utilized to safeguard against the server inferring sensitive information about client's encrypted key-value stores based on access patterns. Despite its widespread usage and importance, existing OMAP solutions face practical challenges, including the need for a large number of interaction rounds between the client and server, as well as the substantial communication bandwidth requirements. For example, the state-of-the-art protocol named OMIX++ in VLDB 2024 still requires $O(\log{n})$ interaction rounds and $O(\log^2{n})$ communication bandwidth per access, where $n$ denotes the total number of key-value pairs stored. In this work, we introduce more practical and efficient OMAP constructions. Consistent with all prior OMAPs, our constructions also adapt only the tree-based Oblivious RAM (ORAM) and oblivious data structures (ODS) to achieve OMAP for enhanced practicality. In complexity, our approach needs $O(\log{n}/\log{\log{n})+O(\log{\lambda})}$ interaction rounds and $O(\log^2{n}/\log{\log{n}})+O(\log{\lambda}\log{n})$ communication bandwidth per data access where $\lambda$ is the security parameter. This new complexity results from our two main contributions. First, unlike prior works that rely solely on search trees, we design a novel framework for OMAP that combines hash table with search trees. Second, we propose a more efficient tree-based ORAM named DAORAM, which is of significant independent interest. This newly developed ORAM noticeably accelerates our constructions as it supports obliviously accessing hash tables much more efficiently. We implement both our proposed constructions and prior methods to experimentally demonstrate that our constructions substantially outperform prior methods in terms of efficiency.

Note: The full version of a short paper to appear in VLDB 2025

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Major revision. VLDB 2025
Keywords
ObliviousnessOblivious RAM
Contact author(s)
xinlecao72 @ gmail com
weiqifeng @ umass edu
liujian2411 @ zju edu cn
zhoujinjin zjj @ antgroup com
bean fwj @ antgroup com
shensi wl @ antgroup com
xuquanqing xqq @ oceanbase com
rizhao ych @ oceanbase com
kuiren @ zju edu cn
History
2024-11-15: last of 7 revisions
2024-10-13: received
See all versions
Short URL
https://ia.cr/2024/1650
License
Creative Commons Attribution-NonCommercial
CC BY-NC

BibTeX

@misc{cryptoeprint:2024/1650,
      author = {Xinle Cao and Weiqi Feng and Jian Liu and Jinjin Zhou and Wenjing Fang and Lei Wang and Quanqing Xu and Chuanhui Yang and Kui Ren},
      title = {Towards Practical Oblivious Map},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1650},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1650}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.