## CryptoDB

### Paper: Snapshot-Oblivious RAMs: Sub-Logarithmic Efficiency for Short Transcripts

Authors: Yang Du , University of Michigan Daniel Genkin , Georgia Tech Paul Grubbs , University of Michigan Search ePrint Search Google Slides CRYPTO 2022 Oblivious RAM (ORAM) is a powerful technique to prevent harmful data breaches. Despite tremendous progress in improving the concrete performance of ORAM, it remains too slow for use in many practical settings; recent breakthroughs in lower bounds indicate this inefficiency is inherent for ORAM and even some natural relaxations. This work introduces snapshot-oblivious RAMs, a new secure memory access primitive. Snapshot-oblivious RAMs bypass lower bounds by providing security only for transcripts whose length (call it c) is fixed and known ahead of time. Intuitively, snapshot-oblivious RAMs provide strong security for attacks of short duration, such as the snapshot attacks targeted by many encrypted databases. We give an ORAM-style definition of this new primitive, and present several constructions. The underlying design principle of our constructions is to store the history of recent operations in a data structure that can be accessed obliviously. We instantiate this paradigm with data structures that remain on the client, giving a snapshot-oblivious RAM with constant bandwidth overhead. We also show how these data structures can be stored on the server and accessed using oblivious memory primitives. Our most efficient instantiation achieves O(log c) bandwidth overhead. By extending recent ORAM lower bounds, we show this performance is asymptotically optimal. Along the way, we define a new hash queue data structure—essentially, a dictionary whose elements can be modified in a first-in-first-out fashion—which may be of independent interest.
##### BibTeX
@inproceedings{crypto-2022-32210,
title={Snapshot-Oblivious RAMs: Sub-Logarithmic Efficiency for Short Transcripts},
publisher={Springer-Verlag},
author={Yang Du and Daniel Genkin and Paul Grubbs},
year=2022
}