Paper 2017/1033
Foundations of Differentially Oblivious Algorithms
T-H. Hubert Chan, Kai-Min Chung, Bruce Maggs, and Elaine Shi
Abstract
It is well-known that a program's memory access pattern can leak information about its input. To thwart such leakage, most existing works adopt the solution of oblivious RAM (ORAM) simulation. Such a notion has stimulated much debate. Some have argued that the notion of ORAM is too strong, and suffers from a logarithmic lower bound on simulation overhead. Despite encouraging progress in designing efficient ORAM algorithms, it would nonetheless be desirable to avoid the oblivious simulation overhead. Others have argued that obliviousness, without protection of length-leakage, is too weak, and have demonstrated examples where entire databases can be reconstructed merely from length-leakage.
Inspired by the elegant notion of differential privacy, we initiate the study of a new notion of access pattern privacy, which we call ``
Metadata
- Available format(s)
-
PDF
- Category
- Foundations
- Publication info
- Published elsewhere. Minor revision. SODA'19
- Keywords
- differential obliviousness
- Contact author(s)
- runting @ gmail com
- History
- 2020-08-05: last of 3 revisions
- 2017-10-28: received
- See all versions
- Short URL
- https://ia.cr/2017/1033
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2017/1033, author = {T-H. Hubert Chan and Kai-Min Chung and Bruce Maggs and Elaine Shi}, title = {Foundations of Differentially Oblivious Algorithms}, howpublished = {Cryptology {ePrint} Archive, Paper 2017/1033}, year = {2017}, url = {https://eprint.iacr.org/2017/1033} }