Skip to main content

Oblivious data structures

Publication ,  Conference
Wang, XS; Nayak, K; Liu, C; Chan, THH; Shi, E; Stefanov, E; Huang, Y
Published in: Proceedings of the ACM Conference on Computer and Communications Security
November 3, 2014

We design novel, asymptotically more efficient data structures and algorithms for programs whose data access patterns exhibit some degree of predictability. To this end, we propose two novel techniques, a pointer-based technique and a locality-based technique. We show that these two techniques are powerful building blocks in making data structures and algorithms oblivious. Specifically, we apply these techniques to a broad range of commonly used data structures, including maps, sets, priority-queues, stacks, deques; and algorithms, including a memory allocator algorithm, max-flow on graphs with low doubling dimension, and shortestpath distance queries on weighted planar graphs. Our oblivious counterparts of the above outperform the best known ORAM scheme both asymptotically and in practice. Copyright is held by the owner/author(s). Publication rights licensed to ACM.

Duke Scholars

Altmetric Attention Stats
Dimensions Citation Stats

Published In

Proceedings of the ACM Conference on Computer and Communications Security

DOI

ISSN

1543-7221

ISBN

9781450329576

Publication Date

November 3, 2014

Start / End Page

215 / 226
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Wang, X. S., Nayak, K., Liu, C., Chan, T. H. H., Shi, E., Stefanov, E., & Huang, Y. (2014). Oblivious data structures. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 215–226). https://doi.org/10.1145/2660267.2660314
Wang, X. S., K. Nayak, C. Liu, T. H. H. Chan, E. Shi, E. Stefanov, and Y. Huang. “Oblivious data structures.” In Proceedings of the ACM Conference on Computer and Communications Security, 215–26, 2014. https://doi.org/10.1145/2660267.2660314.
Wang XS, Nayak K, Liu C, Chan THH, Shi E, Stefanov E, et al. Oblivious data structures. In: Proceedings of the ACM Conference on Computer and Communications Security. 2014. p. 215–26.
Wang, X. S., et al. “Oblivious data structures.” Proceedings of the ACM Conference on Computer and Communications Security, 2014, pp. 215–26. Scopus, doi:10.1145/2660267.2660314.
Wang XS, Nayak K, Liu C, Chan THH, Shi E, Stefanov E, Huang Y. Oblivious data structures. Proceedings of the ACM Conference on Computer and Communications Security. 2014. p. 215–226.

Published In

Proceedings of the ACM Conference on Computer and Communications Security

DOI

ISSN

1543-7221

ISBN

9781450329576

Publication Date

November 3, 2014

Start / End Page

215 / 226