A Lower Bound for One-Round Oblivious RAM

被引:11
作者
Cash, David [1 ]
Drucker, Andrew [1 ]
Hoover, Alexander [1 ]
机构
[1] Univ Chicago, Chicago, IL 60637 USA
来源
THEORY OF CRYPTOGRAPHY, TCC 2020, PT I | 2020年 / 12550卷
关键词
D O I
10.1007/978-3-030-64375-1_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We initiate a fine-grained study of the round complexity of Oblivious RAM (ORAM). We prove that any one-round balls-in-bins ORAM that does not duplicate balls must have either Omega(root N) bandwidth or Omega(root N) client memory, where N is the number of memory slots being simulated. This shows that such schemes are strictly weaker than general (multi-round) ORAMs or those with server computation, and in particular implies that a one-round version of the original square-root ORAM of Goldreich and Ostrovksy (J. ACM 1996) is optimal. We prove this bound via new techniques that differ from those of Goldreich and Ostrovksy, and of Larsen and Nielsen (CRYPTO 2018), which achieved an Omega(log N) bound for balls-in-bins and general multi-round ORAMs respectively. Finally we give a weaker extension of our bound that allows for limited duplication of balls, and also show that our bound extends to multiple-round ORAMs of a restricted form that include the best known constructions.
引用
收藏
页码:457 / 485
页数:29
相关论文
共 26 条
[1]   OptORAMa: Optimal Oblivious RAM [J].
Asharov, Gilad ;
Komargodski, Ilan ;
Lin, Wei-Kai ;
Nayak, Kartik ;
Peserico, Enoch ;
Shi, Elaine .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II, 2020, 12106 :403-432
[2]   Is There an Oblivious RAM Lower Bound? [J].
Boyle, Elette ;
Naor, Moni .
ITCS'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INNOVATIONS IN THEORETICAL COMPUTER SCIENCE, 2016, :357-368
[3]   On the Depth of Oblivious Parallel RAM [J].
Chan, T-H. Hubert ;
Chung, Kai-Min ;
Shi, Elaine .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 :567-597
[4]  
Dautrich J, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P749
[5]   Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM [J].
Devadas, Srinivas ;
van Dijk, Marten ;
Fletcher, Christopher W. ;
Ren, Ling ;
Shi, Elaine ;
Wichs, Daniel .
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT II, 2016, 9563 :145-174
[6]  
Fletcher C., 2015, Report 2015/1065
[7]   Garbled RAM From One-Way Functions [J].
Garg, Sanjam ;
Lu, Steve ;
Ostrovsky, Rafail ;
Scafuro, Alessandra .
STOC'15: PROCEEDINGS OF THE 2015 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2015, :449-458
[8]   TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption [J].
Garg, Sanjam ;
Mohassel, Payman ;
Papamanthou, Charalampos .
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 :563-592
[9]   Black-Box Garbled RAM [J].
Garg, Sanjam ;
Lu, Steve ;
Ostrovsky, Rafail .
2015 IEEE 56TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2015, :210-229
[10]  
Gentry C, 2014, LECT NOTES COMPUT SC, V8441, P405, DOI 10.1007/978-3-642-55220-5_23