Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 4 von 325

Details

Autor(en) / Beteiligte
Titel
Revisiting Square-Root ORAM: Efficient Random Access in Multi-party Computation
Ist Teil von
  • 2016 IEEE Symposium on Security and Privacy (SP), 2016, p.218-234
Ort / Verlag
IEEE
Erscheinungsjahr
2016
Link zum Volltext
Quelle
IEEE/IET Electronic Library
Beschreibungen/Notizen
  • Hiding memory access patterns is required for secure computation, but remains prohibitively expensive for many interesting applications. Prior work has either developed custom algorithms that minimize the need for data-dependant memory access, or proposed the use of Oblivious RAM (ORAM) to provide a general-purpose solution. However, most ORAMs are designed for client-server scenarios, and provide only asymptotic benefits in secure computation. Even the best prior schemes show concrete benefits over naïve linear scan only for array sizes greater than 100. This immediately implies each ORAM access is 100 times slower than a single access at a known location. Even then, prior evaluations ignore the substantial initialization cost of existing schemes. We show how the classical square-root ORAM of Goldreich and Ostrovsky can be modified to overcome these problems, even though it is asymptotically worse than the best known schemes. Specifically, we show a design that has over 100x lower initialization cost, and provides benefits over linear scan for just 8 blocks of data. For all benchmark applications we tried, including Gale-Shapley stable matching and the scrypt key derivation function, our scheme outperforms alternate approaches across a wide range of parameters, often by several orders of magnitude.
Sprache
Englisch
Identifikatoren
eISSN: 2375-1207
DOI: 10.1109/SP.2016.21
Titel-ID: cdi_proquest_miscellaneous_1835566312

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX