2018
DOI: 10.1007/978-3-319-96881-0_18
|View full text |Cite
|
Sign up to set email alerts
|

Yes, There is an Oblivious RAM Lower Bound!

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
33
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 78 publications
(34 citation statements)
references
References 23 publications
1
33
0
Order By: Relevance
“…The lower bound was proven in a model, where the ORAM construction is not allowed to read the data it is storing (the so-called "balls in bins" model) and where the adversary was allowed to have an unbounded running time. In [23] Larsen and Nielsen proved the same lower bound in a model where the encoding of the data can be arbitrary and where the adversary's running time is only allowed to be polynomial time. Notice that this is the more challenging model when proving a lower bound.…”
Section: Introductionmentioning
confidence: 77%
See 2 more Smart Citations
“…The lower bound was proven in a model, where the ORAM construction is not allowed to read the data it is storing (the so-called "balls in bins" model) and where the adversary was allowed to have an unbounded running time. In [23] Larsen and Nielsen proved the same lower bound in a model where the encoding of the data can be arbitrary and where the adversary's running time is only allowed to be polynomial time. Notice that this is the more challenging model when proving a lower bound.…”
Section: Introductionmentioning
confidence: 77%
“…We prove our lower bounds in the oblivious cell probe model of Larsen and Nielsen [23]. In this model, a data structure consists of a server memory of w-bit cells, each having an integer address in [K] for some K ≤ 2 w .…”
Section: Lower Boundsmentioning
confidence: 95%
See 1 more Smart Citation
“…Oblivious RAM (ORAM) and private information retrieval (PIR) are two oblivious storage primitives that have been the objective of extensive research [12, 19, 25-28, 35, 36, 44, 48]. For ORAM, it has been shown that Ω(log n) overhead is necessary [37]. On the other hand, the best constructions for PIR require at least Ω(n) server computation over the entire outsourced database.…”
Section: Introductionmentioning
confidence: 99%
“…With this efficiency, the majority of ORAM schemes consider only simple upload and download operations and forego the use of expensive encryption schemes of PIR that require the server to perform untrusted computation, although some previous works consider ORAM with homomorphic encryption [20]. For a database with n records, it has been shown that ORAM requires overhead of Ω(log n) records [27,37] and that O(log n· log log n) communication suffices [44]. We also examine an extension to ORAM, which we denote as oblivious key-value storage (previously also denoted as oblivious storage), where database records are uniquely identified by keys from a large universe and clients might also attempt to retrieve a nonexistent key [29].…”
Section: Introductionmentioning
confidence: 99%