@inproceedings{5c44418544564adc9d95015da7f6b785,
title = "Multi-client Oblivious RAM with Poly-logarithmic Communication",
keywords = "Access control, Distributed point function, Homomorphic encryption, Homomorphic secret sharing, Multi-client oblivious RAM",
author = "Chow, {Sherman S.M.} and Katharina Fech and Lai, {Russell W.F.} and Giulio Malavolta",
note = "Funding Information: S. S. M. Chow—This work is supported in parts by General Research Funds (CUHK 14209918 and 14210217) and Germany/Hong Kong Joint Research Scheme G-CUHK406/17 of the Research Grants Council, University Grant Committee, Hong Kong, and German Academic Exchange Service under Grant No.: PPP-HK 57391915. The authors would like to thank Brice Minaud and anonymous reviewers for their helpful comments. Funding Information: Our first result answers the above question affirmatively by giving a construction from fully homomorphic encryption (FHE). Our main technical innovation is a new technique for cross-key trial evaluation of ciphertexts. We also consider the same question in the setting with N non-colluding servers, out of which at most t of them can be corrupt. We build multi-server MCORAM from distributed point functions (DPF), and propose new constructions of DPF via a virtualization technique S. S. M. Chow—This work is supported in parts by General Research Funds (CUHK 14209918 and 14210217) and Germany/Hong Kong Joint Research Scheme G-CUHK406/17 of the Research Grants Council, University Grant Committee, Hong Kong, and German Academic Exchange Service under Grant No.: PPP-HK 57391915. The authors would like to thank Brice Minaud and anonymous reviewers for their helpful comments. Publisher Copyright: {\textcopyright} 2020, International Association for Cryptologic Research.; International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT ; Conference date: 07-12-2020 Through 11-12-2020",
year = "2020",
doi = "10.1007/978-3-030-64834-3_6",
language = "English",
isbn = "9783030648336",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer",
pages = "160--190",
editor = "Shiho Moriai and Huaxiong Wang",
booktitle = "Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings",
address = "Germany",
}