TY - GEN
T1 - Oblivious data structures
AU - Wang, Xiao
AU - Nayak, Kartik
AU - Liu, Chang
AU - Chan, T. H.Hubert
AU - Shi, Elaine
AU - Stefanov, Emil
AU - Huang, Yan
PY - 2014/11/3
Y1 - 2014/11/3
N2 - We design novel, asymptotically more efficient data structures and algorithms for programs whose data access patterns exhibit some degree of predictability. To this end, we propose two novel techniques, a pointer-based technique and a locality-based technique. We show that these two techniques are powerful building blocks in making data structures and algorithms oblivious. Specifically, we apply these techniques to a broad range of commonly used data structures, including maps, sets, priority-queues, stacks, deques; and algorithms, including a memory allocator algorithm, max-flow on graphs with low doubling dimension, and shortestpath distance queries on weighted planar graphs. Our oblivious counterparts of the above outperform the best known ORAM scheme both asymptotically and in practice. Copyright is held by the owner/author(s). Publication rights licensed to ACM.
AB - We design novel, asymptotically more efficient data structures and algorithms for programs whose data access patterns exhibit some degree of predictability. To this end, we propose two novel techniques, a pointer-based technique and a locality-based technique. We show that these two techniques are powerful building blocks in making data structures and algorithms oblivious. Specifically, we apply these techniques to a broad range of commonly used data structures, including maps, sets, priority-queues, stacks, deques; and algorithms, including a memory allocator algorithm, max-flow on graphs with low doubling dimension, and shortestpath distance queries on weighted planar graphs. Our oblivious counterparts of the above outperform the best known ORAM scheme both asymptotically and in practice. Copyright is held by the owner/author(s). Publication rights licensed to ACM.
KW - Cryptography
KW - Oblivious algorithms
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=84910678637&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84910678637&partnerID=8YFLogxK
U2 - 10.1145/2660267.2660314
DO - 10.1145/2660267.2660314
M3 - Conference contribution
AN - SCOPUS:84910678637
SN - 9781450329576
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 215
EP - 226
BT - Proceedings of the ACM Conference on Computer and Communications Security
PB - Association for Computing Machinery
T2 - 21st ACM Conference on Computer and Communications Security, CCS 2014
Y2 - 3 November 2014 through 7 November 2014
ER -