Skip to main content
Journal cover image

Locality-Preserving Oblivious RAM

Publication ,  Journal Article
Asharov, G; Chan, THH; Nayak, K; Pass, R; Ren, L; Shi, E
Published in: Journal of Cryptology
April 1, 2022

Oblivious RAMs, introduced by Goldreich and Ostrovsky [JACM’96], compile any RAM program into one that is “memory oblivious,” i.e., the access pattern to the memory is independent of the input. All previous ORAM schemes, however, completely break the locality of data accesses (for instance, by shuffling the data to pseudorandom positions in memory). In this work, we initiate the study of locality-preserving ORAMs—ORAMs that preserve locality of the accessed memory regions, while leaking only the lengths of contiguous memory regions accessed. Our main results demonstrate the existence of a locality-preserving ORAM with polylogarithmic overhead both in terms of bandwidth and locality. We also study the trade-off between locality, bandwidth and leakage, and show that any scheme that preserves locality and does not leak the lengths of the contiguous memory regions accessed, suffers from prohibitive bandwidth. To further improve the parameters, we also consider a weaker notion of a File ORAM, which supports accesses to predefined non-overlapping regions. Assuming one-way functions, we present a computationally secure File ORAM that has a work overhead and locality of roughly O(log 2N) , while ignoring log log N factors. To the best of our knowledge, before our work, the only works combining locality and obliviousness were for symmetric searchable encryption [e.g., Cash and Tessaro (EUROCRYPT’14), Asharov et al. (STOC’16)]. Symmetric search encryption ensures obliviousness if each keyword is searched only once, whereas ORAM provides obliviousness to any input program. Thus, our work generalizes that line of work to the much more challenging task of preserving locality in ORAMs.

Duke Scholars

Published In

Journal of Cryptology

DOI

EISSN

1432-1378

ISSN

0933-2790

Publication Date

April 1, 2022

Volume

35

Issue

2

Related Subject Headings

  • Computation Theory & Mathematics
  • 4613 Theory of computation
  • 4604 Cybersecurity and privacy
  • 0804 Data Format
  • 0103 Numerical and Computational Mathematics
  • 0101 Pure Mathematics
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Asharov, G., Chan, T. H. H., Nayak, K., Pass, R., Ren, L., & Shi, E. (2022). Locality-Preserving Oblivious RAM. Journal of Cryptology, 35(2). https://doi.org/10.1007/s00145-022-09419-1
Asharov, G., T. H. H. Chan, K. Nayak, R. Pass, L. Ren, and E. Shi. “Locality-Preserving Oblivious RAM.” Journal of Cryptology 35, no. 2 (April 1, 2022). https://doi.org/10.1007/s00145-022-09419-1.
Asharov G, Chan THH, Nayak K, Pass R, Ren L, Shi E. Locality-Preserving Oblivious RAM. Journal of Cryptology. 2022 Apr 1;35(2).
Asharov, G., et al. “Locality-Preserving Oblivious RAM.” Journal of Cryptology, vol. 35, no. 2, Apr. 2022. Scopus, doi:10.1007/s00145-022-09419-1.
Asharov G, Chan THH, Nayak K, Pass R, Ren L, Shi E. Locality-Preserving Oblivious RAM. Journal of Cryptology. 2022 Apr 1;35(2).
Journal cover image

Published In

Journal of Cryptology

DOI

EISSN

1432-1378

ISSN

0933-2790

Publication Date

April 1, 2022

Volume

35

Issue

2

Related Subject Headings

  • Computation Theory & Mathematics
  • 4613 Theory of computation
  • 4604 Cybersecurity and privacy
  • 0804 Data Format
  • 0103 Numerical and Computational Mathematics
  • 0101 Pure Mathematics