TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption.

CRYPTO(2016)

引用 191|浏览131
暂无评分
摘要
We present $$\\mathsf {TWORAM}$$, an asymptotically efficient oblivious RAM ORAM protocol providing oblivious access read and write of a memory index y in exactly two rounds: The client prepares an encrypted query encapsulating y and sends it to the server. The server accesses memory $$\\mathsf {M}$$ obliviously and returns encrypted information containing the desired value $$\\mathsf {M}[y]$$. The cost of $$\\mathsf {TWORAM}$$ is only a multiplicative factor of security parameter higher than the tree-based ORAM schemes such as the path ORAM scheme of Stefanov et al. [34]. $$\\mathsf {TWORAM}$$ gives rise to interesting applications, and in particular to a 4-round symmetric searchable encryption scheme where search is sublinear in the worst case and the search pattern is not leaked--the access pattern can also be concealed assuming the documents are stored in the obliviously accessed memory $$\\mathsf {M}$$.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要