Showing 1 - 20 results of 55 for search '"privateer"', query time: 0.07s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Splinter: Practical Private Queries on Public Data by Wang, Frank, Yun, Catherine, Goldwasser, Shafi, Vaikuntananthan, Vinod, Zaharia, Matei

    Published 2021
    “…Splinter uses and extends a new cryptographic primitive called Function Secret Sharing (FSS) that makes it up to an order of magnitude more efficient than prior systems based on Private Information Retrieval and garbled circuits. …”
    Get full text
    Article
  8. 8

    On Basing Private Information Retrieval on NP-Hardness by Liu, Tianren, Vaikuntanathan, Vinod

    Published 2021
    “…We make progress along this line of inquiry by showing that the security of single-server single-round private information retrieval schemes cannot be based on NP-hardness, unless the polynomial hierarchy collapses. …”
    Get full text
    Article
  9. 9

    Private Constrained PRFs (and More) from LWE by Brakerski, Zvika, Tsabary, Rotem, Vaikuntanathan, Vinod, Wee, Hoeteck

    Published 2021
    “…Boneh, Kim and Montgomery (EUROCRYPT 2017) recently presented a construction of private constrained PRF for point function constraints, and Canetti and Chen (EUROCRYPT 2017) presented a completely different construction for more general NC1 constraints. …”
    Get full text
    Article
  10. 10

    Priv'IT: Private and sample efficient identity testing by Cai, B, Daskalakis, C, Kamath, G

    Published 2022
    “…We develop differentially private hypothesis testing methods for the small sample regime. …”
    Get full text
    Article
  11. 11

    Vuvuzela: scalable private messaging resistant to traffic analysis by van den Hooff, Jelle, Lazar, David, Zeldovich, Nickolai, Zaharia, Matei A.

    Published 2015
    “…Private messaging over the Internet has proven challenging to implement, because even if message data is encrypted, it is difficult to hide metadata about who is communicating in the face of traffic analysis. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Lightweb: Private web browsing without all the baggage by Dauterman, Emma, Corrigan-Gibbs, Henry

    Published 2023
    “…This paper proposes lightweb, a new system for private browsing. A lightweb client can browse a web of textbased pages without revealing to anyone—not the network, not the servers hosting the pages—which pages it is reading. …”
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Coresets for differentially private k-means clustering and applications to privacy in mobile sensor networks by Feldman, Dan, Xiang, Chongyuan, Zhu, Ruihao, Rus, Daniela

    Published 2021
    “…To the best of our knowledge, this is the first practical system that enables differentially private clustering on real data.…”
    Get full text
    Article
  17. 17

    Fundamental limits of perfect privacy by Calmon, Flavio du Pin, Makhdoumi Kakhaki, Ali, Medard, Muriel

    Published 2018
    “…We investigate the problem of intentionally disclosing information about a set of measurement points X (useful information), while guaranteeing that little or no information is revealed about a private variable S (private information). Given that S and X are drawn from a finite set with joint distribution pS,X, we prove that a non-trivial amount of useful information can be disclosed while not disclosing any private information if and only if the smallest principal inertia component of the joint distribution of S and X is 0. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Controlling privacy in recommender systems by Xin, Yu, Jaakkola, Tommi S.

    Published 2015
    “…We demonstrate gains from controlled access to private user preferences.…”
    Get full text
    Get full text
    Article
  19. 19

    Some Open Problems in Information-Theoretic Cryptography by Vaikuntananthan, Vinod

    Published 2021
    “…We will describe several such problems that arise in the study of private information retrieval, secure multi-party computation, secret sharing, private simultaneous messages (PSM) and conditional disclosure of secrets (CDS). …”
    Get full text
    Article
  20. 20

    Some Open Problems in Information-Theoretic Cryptography by Vaikuntananthan, Vinod

    Published 2021
    “…We will describe several such problems that arise in the study of private information retrieval, secure multi-party computation, secret sharing, private simultaneous messages (PSM) and conditional disclosure of secrets (CDS). …”
    Get full text
    Article