首页> 外文会议>Annual International Cryptology Conference >TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption
【24h】

TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption

机译:Tworam:两轮的高效漏窃RAM,应用程序可搜索加密

获取原文

摘要

We present TWORAM, an asymptotically efficient oblivious RAM (ORAM) protocol providing oblivious access (read and write) of a memory index y in exactly two rounds: The client prepares an encrypted query encapsulating y and sends it to the server. The server accesses memory M obliviously and returns encrypted information containing the desired value M[y]. The cost of TWORAM is only a multiplicative factor of security parameter higher than the tree-based ORAM schemes such as the path ORAM scheme of Stefanov et al. [34]. TWORAM gives rise to interesting applications, and in particular to a 4-round symmetric searchable encryption scheme where search is sub-linear in the worst case and the search pattern is not leaked - the access pattern can also be concealed assuming the documents are stored in the obliviously accessed memory M.
机译:我们呈现Tworam,一个渐近的有效的漏洞RAM(ORAM)协议提供了内存索引y的令人沮丧的访问(读写)在恰好两轮上:客户端准备封装y的加密查询并将其发送到服务器。 服务器不确定访问内存M并返回包含所需值M [Y]的加密信息。 Tworam的成本只是安全参数的乘法因子高于基于树的ORAM方案,例如Stefanov等人的路径ORAM方案。 [34]。 Tworam引发了有趣的应用,特别是在最坏情况下搜索是SEARCE的4轮对称可搜索的加密方案,并且搜索模式未被泄露 - 也可以在存储中隐藏访问模式 绝不为止访问的记忆M.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号