Revisiting Secure Multi-Server Oblivious RAMs

Chaewon Kwak, Kangmo Ahn, Changhee Hahn, Dongyoung Koo, Junbeom Hur

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Oblivious RAM (ORAM) facilitates search and update on outsourced encrypted databases without leaking access patterns. Since ORAM typically requires large client storage and high computational overhead, many studies proposed more efficient ORAM schemes. For example, Thang et al. proposed a multi-server ORAM, S3ORAM, by utilizing Shamir's secret sharing and secure multi-party computation, instead of fully homomorphic encryption to enhance the efficiency. However, recent studies show that Shamir's secret sharing is no longer secure in Galois Fields. To solve this security problem while achieving the efficiency, we propose two ORAM schemes: (1) BSS-ORAM by applying Blakley's secret sharing to S3ORAM, aiming to improve security with high efficiency, and (2) VH-BSS-ORAM, which further prevents size pattern leakage by storage padding. According to our analysis, BSS-ORAM is secure in Galois Fields with the same computational overhead of S3ORAM; and VH-BSS-ORAM further hides size pattern with higher overhead compared to S3ORAM.

Original languageEnglish
Title of host publication38th International Conference on Information Networking, ICOIN 2024
PublisherIEEE Computer Society
Pages469-472
Number of pages4
ISBN (Electronic)9798350330946
DOIs
StatePublished - 2024
Event38th International Conference on Information Networking, ICOIN 2024 - Hybrid, Ho Chi Minh City, Viet Nam
Duration: 17 Jan 202419 Jan 2024

Publication series

NameInternational Conference on Information Networking
ISSN (Print)1976-7684

Conference

Conference38th International Conference on Information Networking, ICOIN 2024
Country/TerritoryViet Nam
CityHybrid, Ho Chi Minh City
Period17/01/2419/01/24

Keywords

  • Blakley's secret sharing
  • information leakage
  • Oblivious RAM
  • searchable encryption

Fingerprint

Dive into the research topics of 'Revisiting Secure Multi-Server Oblivious RAMs'. Together they form a unique fingerprint.

Cite this