We present the idea of externally verifiable oblivious RAM (ORAM). Our goal is to allow a client and server carrying out an ORAM protocol to have disputes adjudicated by a third party, allowing for the enforcement of penalties against an unreliable or malicious server. We give a security definition that guarantees protection not only against a malicious server but also against a client making false accusations. We then give modifications of the Path ORAM [15] and Ring ORAM [9] protocols that meet this security definition. These protocols both have the same asymptotic runtimes as the semi-honest original versions and require the external verifier to be involved only when the client or server deviates from the protocol. Finally, we implement externally verified ORAM, along with an automated cryptocurrency contract to use as the external verifier.
CITATION STYLE
Gancher, J., Groce, A., & Ledger, A. (2017). Externally Verifiable Oblivious RAM. Proceedings on Privacy Enhancing Technologies, 2017(2), 149–171. https://doi.org/10.1515/popets-2017-0021
Mendeley helps you to discover research relevant for your work.