{"id":"https://openalex.org/W4416548913","doi":"https://doi.org/10.1145/3719027.3765159","title":"MegaBlocks: Breaking the Logarithmic I/O-Overhead Barrier for Oblivious RAM","display_name":"MegaBlocks: Breaking the Logarithmic I/O-Overhead Barrier for Oblivious RAM","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416548913","doi":"https://doi.org/10.1145/3719027.3765159"},"language":null,"primary_location":{"id":"doi:10.1145/3719027.3765159","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765159","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3719027.3765159","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042677137","display_name":"Gilad Asharov","orcid":"https://orcid.org/0000-0002-0846-9773"},"institutions":[{"id":"https://openalex.org/I13955877","display_name":"Bar-Ilan University","ror":"https://ror.org/03kgsv495","country_code":"IL","type":"education","lineage":["https://openalex.org/I13955877"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Gilad Asharov","raw_affiliation_strings":["Bar-Ilan University, Ramat-Gan, Israel"],"affiliations":[{"raw_affiliation_string":"Bar-Ilan University, Ramat-Gan, Israel","institution_ids":["https://openalex.org/I13955877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120748493","display_name":"Eliran Eiluz","orcid":"https://orcid.org/0009-0000-2403-7244"},"institutions":[{"id":"https://openalex.org/I13955877","display_name":"Bar-Ilan University","ror":"https://ror.org/03kgsv495","country_code":"IL","type":"education","lineage":["https://openalex.org/I13955877"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Eliran Eiluz","raw_affiliation_strings":["Bar-Ilan University, Ramat-Gan, Israel"],"affiliations":[{"raw_affiliation_string":"Bar-Ilan University, Ramat-Gan, Israel","institution_ids":["https://openalex.org/I13955877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032483797","display_name":"Ilan Komargodski","orcid":"https://orcid.org/0000-0002-1647-2112"},"institutions":[{"id":"https://openalex.org/I197251160","display_name":"Hebrew University of Jerusalem","ror":"https://ror.org/03qxff017","country_code":"IL","type":"education","lineage":["https://openalex.org/I197251160"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Ilan Komargodski","raw_affiliation_strings":["Hebrew University, Jerusalem, Israel"],"affiliations":[{"raw_affiliation_string":"Hebrew University, Jerusalem, Israel","institution_ids":["https://openalex.org/I197251160"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082730591","display_name":"Wei-Kai Lin","orcid":"https://orcid.org/0000-0001-6012-7124"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wei-Kai Lin","raw_affiliation_strings":["University of Virginia, Charlottesville, VA, USA"],"affiliations":[{"raw_affiliation_string":"University of Virginia, Charlottesville, VA, USA","institution_ids":["https://openalex.org/I51556381"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5042677137"],"corresponding_institution_ids":["https://openalex.org/I13955877"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20116616,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"4692","last_page":"4706"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9769999980926514,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9769999980926514,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.005200000014156103,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.0024999999441206455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5162000060081482},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4812999963760376},{"id":"https://openalex.org/keywords/logarithm","display_name":"Logarithm","score":0.4674000144004822},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.4253000020980835},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.3783999979496002}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6398000121116638},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5641999840736389},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5162000060081482},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4812999963760376},{"id":"https://openalex.org/C39927690","wikidata":"https://www.wikidata.org/wiki/Q11197","display_name":"Logarithm","level":2,"score":0.4674000144004822},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.4253000020980835},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3783999979496002},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3483999967575073},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.335999995470047},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.30169999599456787},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2922999858856201},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.2660999894142151},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2630999982357025},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.2542000114917755}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3719027.3765159","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765159","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3719027.3765159","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765159","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1704895987","https://openalex.org/W1988374166","https://openalex.org/W2000461888","https://openalex.org/W2005756274","https://openalex.org/W2019356824","https://openalex.org/W2061619267","https://openalex.org/W2076458424","https://openalex.org/W2076623138","https://openalex.org/W2099068032","https://openalex.org/W2117241830","https://openalex.org/W2125712182","https://openalex.org/W2143020967","https://openalex.org/W2160222995","https://openalex.org/W2166247408","https://openalex.org/W2170993700","https://openalex.org/W2220842785","https://openalex.org/W2293128137","https://openalex.org/W2295522738","https://openalex.org/W2296585978","https://openalex.org/W2537105955","https://openalex.org/W2603398316","https://openalex.org/W2766831041","https://openalex.org/W2769094878","https://openalex.org/W2796933658","https://openalex.org/W2809996417","https://openalex.org/W2885736157","https://openalex.org/W2898997176","https://openalex.org/W2902751186","https://openalex.org/W3013369260","https://openalex.org/W3021651652","https://openalex.org/W3029037520","https://openalex.org/W3114432140","https://openalex.org/W3192610252","https://openalex.org/W3202558991","https://openalex.org/W4388856956"],"related_works":[],"abstract_inverted_index":{"Oblivious":[0],"RAM":[1],"(ORAM)":[2],"is":[3],"a":[4,54],"central":[5],"cryptographic":[6],"primitive":[7],"that":[8,37,59],"enables":[9],"secure":[10],"memory":[11],"access":[12,15],"while":[13],"hiding":[14],"patterns.":[16],"Among":[17],"existing":[18],"ORAM":[19,57],"paradigms,":[20],"hierarchical":[21,38,56],"ORAMs":[22],"were":[23],"long":[24],"considered":[25],"impractical":[26],"despite":[27],"their":[28],"asymptotic":[29],"optimality.":[30],"However,":[31],"recent":[32],"advancements":[33],"(FutORAMa,":[34],"CCS'23)":[35],"demonstrate":[36],"ORAM-based":[39],"schemes":[40],"can":[41],"be":[42],"made":[43],"efficient":[44],"given":[45],"sufficient":[46],"client-side":[47],"memory.":[48,67],"In":[49],"this":[50],"work,":[51],"we":[52],"present":[53],"new":[55],"construction":[58],"achieves":[60],"practical":[61],"performance":[62],"without":[63],"requiring":[64],"large":[65],"local":[66]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-23T00:00:00"}
