TWORAM: efficient oblivious RAM in two rounds with applications to searchable encryption

S Garg, P Mohassel, C Papamanthou - Annual International Cryptology …, 2016 - Springer
We present TWORAM, an asymptotically efficient oblivious RAM (ORAM) protocol providing
oblivious access (read and write) of a memory index y in exactly two rounds: The client …

Onion ORAM: A constant bandwidth blowup oblivious RAM

S Devadas, M van Dijk, CW Fletcher, L Ren… - Theory of Cryptography …, 2016 - Springer
We present Onion ORAM, an Oblivious RAM (ORAM) with constant worst-case bandwidth
blowup that leverages poly-logarithmic server computation to circumvent the logarithmic …

Practicing oblivious access on cloud storage: the gap, the fallacy, and the new way forward

V Bindschaedler, M Naveed, X Pan, XF Wang… - Proceedings of the …, 2015 - dl.acm.org
To understand the gap between theory and practice for oblivious cloud storage, we
experimentally evaluate four representative Oblivious RAM (ORAM) designs on Amazon S3 …

PanORAMa: Oblivious RAM with logarithmic overhead

S Patel, G Persiano, M Raykova… - 2018 IEEE 59th Annual …, 2018 - ieeexplore.ieee.org
We present PanORAMa, the first Oblivious RAM construction that achieves communication
overhead O (log N log log N) for database of N blocks and for any block size B= Ω (log N) …

Taostore: Overcoming asynchronicity in oblivious data storage

C Sahin, V Zakhary, A El Abbadi, H Lin… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
We consider oblivious storage systems hiding both the contents of the data as well as
access patterns from an untrusted cloud provider. We target a scenario where multiple users …

Obfuscated access and search patterns in searchable encryption

Z Shang, S Oya, A Peter, F Kerschbaum - arXiv preprint arXiv:2102.09651, 2021 - arxiv.org
Searchable Symmetric Encryption (SSE) allows a data owner to securely outsource its
encrypted data to a cloud server while maintaining the ability to search over it and retrieve …

POPE: Partial order preserving encoding

DS Roche, D Apon, SG Choi… - Proceedings of the 2016 …, 2016 - dl.acm.org
Recently there has been much interest in performing search queries over encrypted data to
enable functionality while protecting sensitive data. One particularly efficient mechanism for …

Onion ring ORAM: Efficient constant bandwidth oblivious RAM from (leveled) TFHE

H Chen, I Chillotti, L Ren - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
Oblivious RAM (ORAM) is a cryptographic primitive that allows a client to hide access
pattern to its data encrypted and stored at a remote server. Traditionally, ORAM algorithms …

DivORAM: Towards a practical oblivious RAM with variable block size

Z Liu, Y Huang, J Li, X Cheng, C Shen - Information Sciences, 2018 - Elsevier
Oblivious RAM (ORAM) is important for applications that require hiding access patterns.
Many ORAM schemes have been proposed but most of them support only storing blocks of …

A practical oblivious map data structure with secure deletion and history independence

DS Roche, A Aviv, SG Choi - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
We present a new oblivious RAM that supports variable-sized storage blocks (vORAM),
which is the first ORAM to allow varying block sizes without trivial padding. We also present …