Path ORAM: an extremely simple oblivious RAM protocol

E Stefanov, M Dijk, E Shi, THH Chan… - Journal of the ACM …, 2018‏ - dl.acm.org
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …

OnionPIR: Response efficient single-server PIR

MH Mughees, H Chen, L Ren - Proceedings of the 2021 ACM SIGSAC …, 2021‏ - dl.acm.org
This paper presents OnionPIR and stateful OnionPIR, two single-server PIR schemes that
significantly improve the response size and computation cost over state-of-the-art schemes …

Scaling ORAM for secure computation

J Doerner, A Shelat - Proceedings of the 2017 ACM SIGSAC Conference …, 2017‏ - dl.acm.org
We design and implement a Distributed Oblivious Random Access Memory (DORAM) data
structure that is optimized for use in two-party secure computation protocols. We improve …

Oblidb: Oblivious query processing for secure databases

S Eskandarian, M Zaharia - arxiv preprint arxiv:1710.00458, 2017‏ - arxiv.org
Hardware enclaves such as Intel SGX are a promising technology for improving the security
of databases outsourced to the cloud. These enclaves provide an execution environment …

Graphsc: Parallel secure computation made easy

K Nayak, XS Wang, S Ioannidis… - … IEEE symposium on …, 2015‏ - ieeexplore.ieee.org
We propose introducing modern parallel programming paradigms to secure computation,
enabling their secure execution on large datasets. To address this challenge, we present …

Yes, there is an oblivious RAM lower bound!

KG Larsen, JB Nielsen - Annual International Cryptology Conference, 2018‏ - Springer
Abstract An Oblivious RAM (ORAM) introduced by Goldreich and Ostrovsky JACM'96 is a
(possibly randomized) RAM, for which the memory access pattern reveals no information …

Snoopy: Surpassing the scalability bottleneck of oblivious storage

E Dauterman, V Fang, I Demertzis, N Crooks… - Proceedings of the …, 2021‏ - dl.acm.org
Existing oblivious storage systems provide strong security by hiding access patterns, but do
not scale to sustain high throughput as they rely on a central point of coordination. To …

PanORAMa: Oblivious RAM with logarithmic overhead

S Patel, G Persiano, M Raykova… - 2018 IEEE 59th Annual …, 2018‏ - ieeexplore.ieee.org
We present PanORAMa, the first Oblivious RAM construction that achieves communication
overhead O (log N log log N) for database of N blocks and for any block size B= Ω (log N) …

Taostore: Overcoming asynchronicity in oblivious data storage

C Sahin, V Zakhary, A El Abbadi, H Lin… - … IEEE Symposium on …, 2016‏ - ieeexplore.ieee.org
We consider oblivious storage systems hiding both the contents of the data as well as
access patterns from an untrusted cloud provider. We target a scenario where multiple users …

Cloud computing security: foundations and research directions

A Chakraborti, R Curtmola, J Katz… - … and Trends® in …, 2022‏ - nowpublishers.com
Cloud services have revolutionized modern computing. The benefits of outsourcing data and
computation come with security and privacy concerns. This monograph explores the …