Locality-Preserving Oblivious RAM

  • Gilad Asharov
  • , T. H.Hubert Chan
  • , Kartik Nayak
  • , Rafael Pass
  • , Ling Ren
  • , Elaine Shi

Research output: Contribution to journalArticlepeer-review

4 Scopus citations

Abstract

Oblivious RAMs, introduced by Goldreich and Ostrovsky [JACM’96], compile any RAM program into one that is “memory oblivious,” i.e., the access pattern to the memory is independent of the input. All previous ORAM schemes, however, completely break the locality of data accesses (for instance, by shuffling the data to pseudorandom positions in memory). In this work, we initiate the study of locality-preserving ORAMs—ORAMs that preserve locality of the accessed memory regions, while leaking only the lengths of contiguous memory regions accessed. Our main results demonstrate the existence of a locality-preserving ORAM with polylogarithmic overhead both in terms of bandwidth and locality. We also study the trade-off between locality, bandwidth and leakage, and show that any scheme that preserves locality and does not leak the lengths of the contiguous memory regions accessed, suffers from prohibitive bandwidth. To further improve the parameters, we also consider a weaker notion of a File ORAM, which supports accesses to predefined non-overlapping regions. Assuming one-way functions, we present a computationally secure File ORAM that has a work overhead and locality of roughly O(log 2N) , while ignoring log log N factors. To the best of our knowledge, before our work, the only works combining locality and obliviousness were for symmetric searchable encryption [e.g., Cash and Tessaro (EUROCRYPT’14), Asharov et al. (STOC’16)]. Symmetric search encryption ensures obliviousness if each keyword is searched only once, whereas ORAM provides obliviousness to any input program. Thus, our work generalizes that line of work to the much more challenging task of preserving locality in ORAMs.

Original languageEnglish
Article number6
JournalJournal of Cryptology
Volume35
Issue number2
DOIs
StatePublished - Apr 2022

Bibliographical note

Publisher Copyright:
© 2022, International Association for Cryptologic Research.

Funding

This work was partially supported by a Junior Fellow award from the Simons Foundation to Gilad Asharov. Currently supported by the Israel Science Foundation (grant No. 2439/20), by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office, and by the European Union’s Horizon 2020 research and innovation program under the Marie Skłodowska-Curie Grant Agreement No. 891234. Supported in part by NSF Award CNS-1561209, NSF Award CNS-1217821, NSF Award CNS-1704788, AFOSR Award FA9550-15-1-0262, a Microsoft Faculty Fellowship, a Google Faculty Research Award and a JP Morgan fellowship to Rafael Pass. This work was supported in part by NSF grants CNS-1314857, CNS-1514261, CNS-1544613, CNS-1601879, CNS-1617676, an Office of Naval Research Young Investigator Program Award, a Packard Fellowship, a Sloan Fellowship, Google Faculty Research Awards, a VMWare Research Award, and a Baidu Faculty Research Award to Elaine Shi. Kartik Nayak was partially supported by a Google Ph.D. Fellowship Award. T-H. Hubert Chan was partially supported by the Hong Kong RGC under the GGrants 17200418 and 17201220.

FundersFunder number
Marie Skłodowska-Curie
RGC17200418, 17201220
National Science FoundationCNS-1704788, CNS-1561209, CNS-1217821
Office of Naval Research
Air Force Office of Scientific ResearchFA9550-15-1-0262
Simons Foundation
Microsoft
GoogleCNS-1314857, CNS-1617676, CNS-1544613, CNS-1514261, CNS-1601879
Horizon 2020 Framework Programme891234
Israel Science Foundation2439/20

    Keywords

    • Locality
    • Oblivious RAM
    • Randomized algorithms

    Fingerprint

    Dive into the research topics of 'Locality-Preserving Oblivious RAM'. Together they form a unique fingerprint.

    Cite this