Abstract
We present the first Oblivious RAM (ORAM) construction that for N memory blocks supports accesses with worst-case O(log N) overhead for any block size Ω(log N) while requiring a client memory of only a constant number of memory blocks. We rely on the existence of one-way functions and guarantee computational security. Our result closes a long line of research on fundamental feasibility results for ORAM constructions as logarithmic overhead is necessary. The previous best logarithmic overhead construction only guarantees it in an amortized sense, i.e., logarithmic overhead is achieved only for long enough access sequences, where some of the individual accesses incur Θ(N) overhead. The previously best ORAM in terms of worst-case overhead achieves O(log2N/ log log N) overhead. Technically, we design a novel de-amortization framework for modern ORAM constructions that use the “shuffled inputs” assumption. Our framework significantly departs from all previous de-amortization frameworks, originating from Ostrovsky and Shoup (STOC ’97), that seem to be fundamentally too weak to be applied on modern ORAM constructions.
Original language | English |
---|---|
Title of host publication | Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings |
Editors | Tal Malkin, Chris Peikert |
Publisher | Springer Science and Business Media Deutschland GmbH |
Pages | 610-640 |
Number of pages | 31 |
ISBN (Print) | 9783030842581 |
DOIs | |
State | Published - 2021 |
Event | 41st Annual International Cryptology Conference, CRYPTO 2021 - Virtual, Online Duration: 16 Aug 2021 → 20 Aug 2021 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 12828 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 41st Annual International Cryptology Conference, CRYPTO 2021 |
---|---|
City | Virtual, Online |
Period | 16/08/21 → 20/08/21 |
Bibliographical note
Publisher Copyright:© 2021, International Association for Cryptologic Research.
Funding
Acknowledgments. This work is supported in part by a DARPA Brandeis award, by NSF under the award numbers CNS-1601879, CNS-2044679, by Packard Fellowship, an ONR YIP award, by the Israel Science Foundation (grants No. 2439/20 and 1774/20), by an Alon Young Faculty Fellowship, and by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office. This project has received funding from the European Union’s Horizon 2020 research and innovation programme under the Marie Sk lodowska-Curie grant agreement No. 891234.
Funders | Funder number |
---|---|
Alon Young Faculty Fellowship | |
Marie Sk lodowska-Curie | 891234 |
National Science Foundation | CNS-2044679, CNS-1601879 |
Office of Naval Research | |
Defense Advanced Research Projects Agency | |
Horizon 2020 Framework Programme | |
Israel Science Foundation | 1774/20, 2439/20 |
Keywords
- Deamortization
- Oblivious RAM
- Worst-case overhead