Posts

Showing posts from June, 2025

Oblivious RAM (ORAM)

Encryption Alone is Not Sufficient Encryption preserves the contents of the data, but it may still leak access patterns . For example, if location x is accessed frequently, an observer can infer its importance—even if the data itself is encrypted. Student and Locker Room Analogy — An Example Imagine : A student (client) has secret notes stored in lockers (server). Each locker has a number (like a memory address). Every time the student wants to read or update a note, he walks to the corresponding locker. If someone is watching : They can see which lockers the student accesses. Even if they cannot read the notes, they can infer which notes are accessed frequently or repeatedly. To hide this : The student always visits multiple lockers, including some randomly chosen fake ones. He periodically shuffles and reorders the notes. As a result, the observer cannot tell which locker contains the real note or which accesses are genuine. This is exactly wha...