Perfectly secure oblivious RAM without random oracles

  • Authors:
  • Ivan Damgård;Sigurd Meldgaard;Jesper Buus Nielsen

  • Affiliations:
  • Department of Computer Science, Aarhus University;Department of Computer Science, Aarhus University;Department of Computer Science, Aarhus University

  • Venue:
  • TCC'11 Proceedings of the 8th conference on Theory of cryptography
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present an algorithm for implementing a secure oblivious RAM where the access pattern is perfectly hidden in the information theoretic sense, without assuming that the CPU has access to a random oracle. In addition we prove a lower bound on the amount of randomness needed for implementing an information theoretically secure oblivious RAM.