Inbook,

Perfectly Secure Oblivious RAM without Random Oracles

, , and .
page 144--163. Springer, (2011)
DOI: 10.1007/978-3-642-19571-6_10

Abstract

We present an algorithm for implementing a secure oblivious RAM where the access pattern is perfectly hidden in the information theoretic sense, without assuming that the CPU has access to a random oracle. In addition we prove a lower bound on the amount of randomness needed for implementing an information theoretically secure oblivious RAM.

Tags

Users

  • @ytyoun

Comments and Reviews