skip to main content
10.1145/2810103.2813634acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound

Published:12 October 2015Publication History

ABSTRACT

We propose a new tree-based ORAM scheme called Circuit ORAM. Circuit ORAM makes both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM shows that the well-known Goldreich-Ostrovsky logarithmic ORAM lower bound is tight under certain parameter ranges, for several performance metrics. Therefore, we are the first to give an answer to a theoretical challenge that remained open for the past twenty-seven years. Second, Circuit ORAM earns its name because it achieves (almost) optimal circuit size both in theory and in practice for realistic choices of block sizes. We demonstrate compelling practical performance and show that Circuit ORAM is an ideal candidate for secure multi-party computation applications.

References

  1. https://eprint.iacr.org/2014/672.pdf.Google ScholarGoogle Scholar
  2. http://www.oblivm.com.Google ScholarGoogle Scholar
  3. D. Apon, J. Katz, E. Shi, and A. Thiruvengadam. Verifiable oblivious storage. In PKC. 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. G. Asharov, Y. Lindell, T. Schneider, and M. Zohner. More efficient oblivious transfer and extensions for faster secure computation. In CCS, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. Beame and W. Machmouchi. Making branching programs oblivious requires superlogarithmic overhead. In CCC, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Boneh, D. Mazieres, and R. A. Popa. Remote oblivious storage: Making oblivious RAM practical. http://dspace.mit.edu/bitstream/handle/1721.1/62006/MIT-CSAIL-TR-2011-018.pdf, 2011.Google ScholarGoogle Scholar
  7. K.-M. Chung, Z. Liu, and R. Pass. Statistically-secure oram with ~O(log2 n) overhead. In Asiacrypt, 2014.Google ScholarGoogle Scholar
  8. I. Damgård, S. Meldgaard, and J. B. Nielsen. Perfectly secure oblivious RAM without random oracles. In TCC, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  9. J. Dautrich, E. Stefanov, and E. Shi. Burst oram: Minimizing oram response times for bursty access patterns. In 23rd USENIX Security Symposium (USENIX Security 14), pages 749--764, San Diego, CA, Aug. 2014. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Devadas, M. van Dijk, C. W. Fletcher, L. Ren, E. Shi, and D. Wichs. Onion ORAM: A constant bandwidth oram without FHE, 2015.Google ScholarGoogle Scholar
  11. D. Dubhashi and D. Ranjan. Balls and bins: a study in negative dependence. Random Struct. Algorithms, 13:99--124, September 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. C. W. Fletcher, M. v. Dijk, and S. Devadas. A secure processor architecture for encrypted computation on untrusted programs. In STC, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. W. Fletcher, L. Ren, A. Kwon, M. van Dijk, E. Stefanov, and S. Devadas. RAW Path ORAM: A low-latency, low-area hardware ORAM controller with integrity verification. IACR Cryptology ePrint Archive, 2014.Google ScholarGoogle Scholar
  14. C. W. Fletcher, L. Ren, X. Yu, M. van Dijk, O. Khan, and S. Devadas. Suppressing the oblivious RAM timing channel while making information leakage and program efficiency trade-offs. In HPCA, pages 213--224, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  15. C. Gentry, K. A. Goldman, S. Halevi, C. S. Jutla, M. Raykova, and D. Wichs. Optimizing ORAM and using it efficiently for secure computation. In Privacy Enhancing Technologies Symposium (PETS), 2013.Google ScholarGoogle ScholarCross RefCross Ref
  16. C. Gentry, S. Halevi, C. Jutla, and M. Raykova. Private database access with he-over-oram architecture. Cryptology ePrint Archive, Report 2014/345, 2014. http://eprint.iacr.org/.Google ScholarGoogle Scholar
  17. O. Goldreich. Towards a theory of software protection and simulation by oblivious RAMs. In STOC, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In STOC, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious RAMs. J. ACM, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. T. Goodrich. Zig-zag sort: A simple deterministic data-oblivious sorting algorithm running in O(N Log N) time. In STOC, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. T. Goodrich and M. Mitzenmacher. Privacy-preserving access of outsourced data via oblivious RAM simulation. In ICALP, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. Oblivious RAM simulation with efficient worst-case access overhead. In CCSW, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. Practical oblivious storage. In CODASPY, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. Privacy-preserving group data access via stateless oblivious RAM simulation. In SODA, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. S. D. Gordon, J. Katz, V. Kolesnikov, F. Krell, T. Malkin, M. Raykova, and Y. Vahlis. Secure two-party computation in sublinear (amortized) time. In CCS, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. M. Harchol-Balter. Performance Modeling and Design of Computer Systems: Queueing Theory in Action. Performance Modeling and Design of Computer Systems: Queueing Theory in Action. Cambridge University Press, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. J. Hsu and P. Burke. Behavior of tandem buffers with geometric input and Markovian output. In IEEE Transactions on Communications. v24, pages 358--361, 1976.Google ScholarGoogle ScholarCross RefCross Ref
  28. M. Keller and P. Scholl. Efficient, oblivious data structures for mpc. In ASIACRYPT. 2014.Google ScholarGoogle ScholarCross RefCross Ref
  29. D. G. Kendall. Stochastic processes occurring in the theory of queues and their analysis by the method of the imbedded markov chain. The Annals of Mathematical Statistics, 1953.Google ScholarGoogle ScholarCross RefCross Ref
  30. V. Kolesnikov and T. Schneider. Improved Garbled Circuit: Free XOR Gates and Applications. In ICALP, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. C. P. Kruskal, M. Snir, and A. Weiss. The distribution of waiting times in clocked multistage interconnection networks. IEEE Trans. Computers, 37(11):1337--1352, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. E. Kushilevitz, S. Lu, and R. Ostrovsky. On the (in)security of hash-based oblivious RAM and a new balancing scheme. In SODA, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. C. Liu, Y. Huang, E. Shi, J. Katz, and M. Hicks. Automating efficient ram-model secure computation. In IEEE S & P. IEEE Computer Society, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. C. Liu, X. S. Wang, K. Nayak, Y. Huang, and E. Shi. ObliVM: A Generic, Customizable, and Reusable Secure Computation Architecture. S & P, 2015.Google ScholarGoogle Scholar
  35. J. R. Lorch, B. Parno, J. W. Mickens, M. Raykova, and J. Schiffman. Shroud: Ensuring private access to large-scale data in the data center. FAST, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. S. Lu and R. Ostrovsky. Distributed oblivious ram for secure two-party computation. In TCC, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. M. Maas, E. Love, E. Stefanov, M. Tiwari, E. Shi, K. Asanovic, J. Kubiatowicz, and D. Song. Phantom: Practical oblivious computation in a secure processor. In CCS, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. T. Mayberry, E.-O. Blass, and A. H. Chan. Efficient private file retrieval by combining oram and pir. 2014.Google ScholarGoogle ScholarCross RefCross Ref
  39. J. C. Mitchell and J. Zimmerman. Data-Oblivious Data Structures. In STACS, 2014.Google ScholarGoogle Scholar
  40. T. Moataz, T. Mayberry, E.-O. Blass, and A. H. Chan. Resizable tree-based oblivious ram, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  41. M. Naor, B. Pinkas, and R. Sumner. Privacy preserving auctions and mechanism design. In EC, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. R. Ostrovsky. Efficient computation on oblivious RAMs. In STOC, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. R. Ostrovsky and V. Shoup. Private information storage. In STOC, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. B. Pinkas and T. Reinman. Oblivious RAM revisited. In CRYPTO, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. N. Pippenger and M. J. Fischer. Relations among complexity measures. J. ACM, 26(2), Apr. 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. L. Ren, C. W. Fletcher, A. Kwon, E. Stefanov, E. Shi, M. van Dijk, and S. Devadas. Constants count: Practical improvements to oblivious ram. http://eprint.iacr.org/2014/997/, 2014.Google ScholarGoogle Scholar
  47. L. Ren, X. Yu, C. W. Fletcher, M. van Dijk, and S. Devadas. Design space exploration and optimization of path oblivious RAM in secure processors. In ISCA, pages 571--582, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. E. Shi, T.-H. H. Chan, E. Stefanov, and M. Li. Oblivious RAM with O((log N)3) worst-case cost. In ASIACRYPT, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. E. Stefanov and E. Shi. Multi-cloud oblivious storage. In ACM Conference on Computer and Communications Security (CCS), 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. E. Stefanov and E. Shi. Oblivistore: High performance oblivious cloud storage. In IEEE Symposium on Security and Privacy (S & P), 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. E. Stefanov, E. Shi, and D. Song. Towards practical oblivious RAM. In NDSS, 2012.Google ScholarGoogle Scholar
  52. E. Stefanov, M. van Dijk, E. Shi, T.-H. H. Chan, C. Fletcher, L. Ren, X. Yu, and S. Devadas. Path ORAM: an extremely simple oblivious ram protocol. Cryptology ePrint Archive, Report 2013/280, previous version published on CCS, 2013. Google ScholarGoogle Scholar
  53. X. S. Wang, Y. Huang, T.-H. H. Chan, A. Shelat, and E. Shi. Scoram: Oblivious ram for secure computation. In CCS, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. P. Williams and R. Sion. Usable PIR. In NDSS, 2008.Google ScholarGoogle Scholar
  55. P. Williams and R. Sion. Single round access privacy on outsourced storage. In CCS, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. P. Williams and R. Sion. SR-ORAM: Single round-trip oblivious ram. In CCS, 2012.Google ScholarGoogle Scholar
  57. P. Williams, R. Sion, and B. Carbunar. Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage. In CCS, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. A. C.-C. Yao. Protocols for secure computations (extended abstract). In FOCS, 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. S. Zahur and D. Evans. Circuit structures for improving efficiency of security and privacy tools. In S&P, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. S. Zahur, M. Rosulek, and D. Evans. Two halves make a whole: Reducing data transfer in garbled circuits using half gates. In EUROCRYPT, 2015.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
      October 2015
      1750 pages
      ISBN:9781450338325
      DOI:10.1145/2810103

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 October 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CCS '15 Paper Acceptance Rate128of660submissions,19%Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader