Next: How to Play any
Up: The Post-Doctoral Period (1983-86)
Previous: Proofs that Yield Nothing
The problem of hiding the memory-access sequence (of a protected CPU)
is introduced and an efficient solution is provided.
The heart of the solution is a randomized simulation of
an arbitrary Random Access Machine (RAM) on an ``oblivious RAM''
(a randomized RAM in which the distribution of the memory-access
sequence is independent of the actual input).
Comments:
Authored by O. Goldreich. Appeared in
- Proc. of the 19th STOC, pp. 182-194, 1987.
- Journal
version with R. Ostrovsky
(``Software Protection and Simulation on Oblivious RAMs'')
Jour. of the ACM, Vol. 43, No. 3, 1996, pp. 431-473.
Oded Goldreich
2003-07-30