{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:54:40Z","timestamp":1773510880052,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"FWO under an Odysseus project GOH9718N"},{"name":"ERC Advanced Grant ERC-2015-AdG-IMPaCT"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3354226","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"345-360","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["Onion Ring ORAM"],"prefix":"10.1145","author":[{"given":"Hao","family":"Chen","sequence":"first","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Ilaria","family":"Chillotti","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Ling","family":"Ren","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana-Champaign, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54365-8_5"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2015-0016"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00062"},{"key":"e_1_3_2_2_4_1","unstructured":"Anastasov Anton. 2016. Implementing Onion ORAM: A Constant Bandwidth ORAM using AHE. https:\/\/github.com\/aanastasov\/onion-oram\/blob\/master\/doc\/ report.pdf. (2016).  Anastasov Anton. 2016. Implementing Onion ORAM: A Constant Bandwidth ORAM using AHE. https:\/\/github.com\/aanastasov\/onion-oram\/blob\/master\/doc\/ report.pdf. (2016)."},{"key":"e_1_3_2_2_5_1","volume-title":"InternationalWorkshop on Public Key Cryptography","author":"Apon Daniel"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2014.55"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0129626402000999"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813649"},{"key":"e_1_3_2_2_10_1","volume-title":"Innovations in Theoretical Computer Science","author":"Brakerski Zvika","year":"2012"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1137\/120868669"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.14778\/2994509.2994528"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_14"},{"key":"e_1_3_2_2_16_1","unstructured":"Ilaria Chillotti Nicolas Gama Mariya Georgieva and Malika Izabach\u00e8ne. 2017. TFHE: experimental-tfhe repository. (2017). https:\/\/github.com\/tfhe\/experimental-tfhe.  Ilaria Chillotti Nicolas Gama Mariya Georgieva and Malika Izabach\u00e8ne. 2017. TFHE: experimental-tfhe repository. (2017). https:\/\/github.com\/tfhe\/experimental-tfhe."},{"key":"e_1_3_2_2_17_1","volume-title":"TFHE: Fast Fully Homomorphic Encryption Library. (August","author":"Chillotti Ilaria","year":"2016"},{"key":"e_1_3_2_2_18_1","volume-title":"TFHE: Fast Fully Homomorphic Encryption over the Torus. Cryptology ePrint Archive, Report 2018\/421. https:\/\/eprint.iacr.org\/2018\/421.","author":"Chillotti Ilaria","year":"2018"},{"key":"e_1_3_2_2_19_1","volume-title":"13th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 727--743","author":"Crooks Natacha","year":"2018"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44586-2_9"},{"key":"e_1_3_2_2_21_1","volume-title":"USENIX Security Symposium. USENIX Association, 749--764","author":"Dautrich Jonathan L","year":"2014"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49099-0_6"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382536.2382540"},{"key":"e_1_3_2_2_24_1","volume-title":"ACM SIGARCH Computer Architecture News","volume":"43","author":"Fletcher Christopher","year":"2015"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39077-7_1"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28166-7_9"},{"key":"e_1_3_2_2_27_1","first-page":"340","article-title":"Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based","volume":"2013","author":"Gentry Craig","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28416"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046680"},{"key":"e_1_3_2_2_31_1","volume-title":"HElib-An Implementation of homomorphic encryption. (May","author":"Halevi Shai","year":"2019"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134090"},{"key":"e_1_3_2_2_33_1","unstructured":"Yan Huang David Evans and Jonathan Katz. 2012. Private set intersection: Are garbled circuits better than custom protocols?. In NDSS.  Yan Huang David Evans and Jonathan Katz. 2012. Private set intersection: Are garbled circuits better than custom protocols?. In NDSS."},{"key":"e_1_3_2_2_34_1","first-page":"12","article-title":"Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation","volume":"20","author":"Islam Mohammad Saiful","year":"2012","journal-title":"Network and Distributed System Security"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557561"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978386"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973099.13"},{"key":"e_1_3_2_2_38_1","volume-title":"Sub-logarithmic distributed oblivious RAM with small block size. arXiv preprint arXiv:1802.05145","author":"Kushilevitz Eyal","year":"2018"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96881-0_18"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2775054.2694385"},{"key":"e_1_3_2_2_41_1","volume-title":"Theory of Cryptography","author":"Lu Steve"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516692"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"crossref","unstructured":"Travis Mayberry Erik-Oliver Blass and Agnes Hui Chan. 2014. Efficient Private File Retrieval by Combining ORAM and PIR. In Network and Distributed System Security.  Travis Mayberry Erik-Oliver Blass and Agnes Hui Chan. 2014. Efficient Private File Retrieval by Combining ORAM and PIR. In Network and Distributed System Security.","DOI":"10.14722\/ndss.2014.23033"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813701"},{"key":"e_1_3_2_2_46_1","volume-title":"HOP: Hardware makes obfuscation practical. In Network and Distributed System Security.","author":"Nayak Kartik","year":"2017"},{"key":"e_1_3_2_2_47_1","volume-title":"Proceedings of the twenty-ninth annual ACM symposium on Theory of computing. ACM, 294--303","author":"Ostrovsky Rafail","year":"1997"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2018.00087"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055399.3055489"},{"key":"e_1_3_2_2_50_1","volume-title":"USENIX Security Symposium. 431--446","author":"Rane Ashay","year":"2015"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"e_1_3_2_2_52_1","volume-title":"USENIX Security Symposium. 415--430","author":"Ren Ling","year":"2015"},{"key":"e_1_3_2_2_53_1","volume-title":"Design and implementation of the ascend secure processor","author":"Ren Ling","year":"2018"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.20"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"crossref","unstructured":"Sajin Sasy Sergey Gorbunov and Christopher Fletcher. 2018. ZeroTrace: Oblivious memory primitives from Intel SGX. In Network and Distributed System Security.  Sajin Sasy Sergey Gorbunov and Christopher Fletcher. 2018. ZeroTrace: Oblivious memory primitives from Intel SGX. In Network and Distributed System Security.","DOI":"10.14722\/ndss.2018.23239"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_11"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3177872"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516673"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.25"},{"key":"e_1_3_2_2_60_1","unstructured":"Emil Stefanov Elaine Shi and Dawn Song. 2012. Towards practical oblivious RAM. In Network and Distributed System Security.  Emil Stefanov Elaine Shi and Dawn Song. 2012. Towards practical oblivious RAM. In Network and Distributed System Security."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_2_62_1","volume-title":"15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6--10, 2009. Proceedings. 617--635","author":"Stehl\u00e9 Damien","year":"2009"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134038"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813634"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455790"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_2_67_1","volume-title":"USENIX Security Symposium. 707--720","author":"Zhang Yupeng","year":"2016"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354226","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:03Z","timestamp":1750202643000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354226"}},"subtitle":["Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":66,"alternative-id":["10.1145\/3319535.3354226","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3354226","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}