ORAMs in a Quantum World

نویسندگان

  • Tommaso Gagliardoni
  • Nikolaos P. Karvelas
  • Stefan Katzenbeisser
چکیده

We study the security of Oblivious Random Access Machines (ORAM) in the quantum world. First we introduce a new formal treatment of ORAMs, which is at the same time elegant and simpler than the known formalization by Goldreich and Ostrovsky. Then we define and analyze the notion of post-quantum security for ORAMs, i.e., classical ORAMs resistant against quantum adversaries. We show that merely switching to post-quantum secure encryption in a classically secure ORAM construction does not generally yield a post-quantum secure ORAM construction. On the other hand, we provide a post-quantum secure construction based on a modification of Path-ORAM, the most efficient general ORAM construction, introduced by Stefanov et al. Furthermore, we initiate the study of Quantum ORAMs (QORAMs), that is, ORAM constructions meant to be executed between quantum parties acting on arbitrary quantum data. We address many problems arising when formalizing Quantum ORAMs, and we provide a secure construction (based on Path-ORAM and a quantum encryption scheme introduced by Alagic et al.) which has the interesting property of making read and write operations inherently equivalent. In so doing, we develop a novel technique of quantum extractability which is of independent interest. We believe that QORAMs represent a natural and interesting step in the direction of achieving privacy in future scenarios where quantum computing is ubiquitous.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Recursive Trees for Practical ORAM

We present a general construction to reduce the communication cost of recent tree-based ORAMs. Contrary to trees with constant height and path lengths, our new construction r-ORAM provides varying, shorter path lengths. Accessing an element in the ORAM tree will have different communication cost depending on the location of the element. The main idea behind r-ORAM is a recursive ORAM tree struc...

متن کامل

Why Dolphins May Get Ulcers: Considering the Impacts of Cetacean-based Tourism in New Zealand

1 Title derived from Robert Sapolsky’s (1994) Why Zebras Don’t Get Ulcers. A Guide to Stress, Stress Related Diseases, and Coping. Address correspondence to Mark Orams, Coastal–Marine Research Group, Massey University at Albany, Private Bag 102 904, North Shore MSC, New Zealand. Tel: (64 9) 443 9799; Fax: (64 9) 441 8109; E-mail: [email protected] WHY DOLPHINS MAY GET ULCERS: CONSIDERING T...

متن کامل

SeqORAM: A Locality-Preserving Write-Only Oblivious RAM

Oblivious RAM technology has advanced rapidly. Under certain clientside storage assumptions, tree-based ORAM designs [19] have achieved established lower bounds even for online adversaries that can monitor everything a client does. Write-only ORAMs target a weaker but often more practical multisnapshot adversary that can monitor only user writes. This adversary is typical in plausible deniabili...

متن کامل

A Quantum Evolutionary Algorithm for the Vehicle Routing Problem with Single-sided Time Window Setting

Customer service level is of prime importance in today competitive world and has various dimensions with delivery quality being one of the most important ones. Delivery quality has several parameters such as deliver time window options, time window size, etc. In this paper we focus on one of these parameters, namely time window setting. It has a direct impact upon customer satisfaction and busi...

متن کامل

Multi-User Oblivious RAM Secure Against Malicious Servers

It has been an open question whether Oblivious RAM stored on a malicious server can be securely shared among multiple users. ORAMs are stateful, and users need to exchange updated state to maintain security. This is a challenge, as the motivation for using ORAM is that the users may not have a way to directly communicate. A malicious server can potentially tamper with state information and thus...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2017  شماره 

صفحات  -

تاریخ انتشار 2017