28 research outputs found

    Perfectly Secure Oblivious RAM without Random Oracles

    Get PDF
    We present an algorithm for implementing a secure oblivious RAM where the access pattern is perfectly hidden in the information theoretic sense, without assuming that the CPU has access to a random oracle. In addition we prove a lover bound on the amount of randomness needed for information theoretically secure oblivious RAM.
    corecore