Welcome to the resource topic for 2010/108
Title:
Perfectly Secure Oblivious RAM Without Random Oracles
Authors: Ivan Damgård, Sigurd Meldgaard, Jesper Buus Nielsen
Abstract:We present an algorithm for implementing a secure oblivious RAM where the access pattern is perfectly hidden in the information theoretic sense, without assuming that the CPU has access to a random oracle. In addition we prove a lover bound on the amount of randomness needed for information theoretically secure oblivious RAM.
ePrint: https://eprint.iacr.org/2010/108
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .