-
1
-
2
-
3
-
4
-
5
-
6
-
7
Splinter: Practical Private Queries on Public Data
Published 2021“…Splinter uses and extends a new cryptographic primitive called Function Secret Sharing (FSS) that makes it up to an order of magnitude more efficient than prior systems based on Private Information Retrieval and garbled circuits. …”
Get full text
Article -
8
On Basing Private Information Retrieval on NP-Hardness
Published 2021“…We make progress along this line of inquiry by showing that the security of single-server single-round private information retrieval schemes cannot be based on NP-hardness, unless the polynomial hierarchy collapses. …”
Get full text
Article -
9
Private Constrained PRFs (and More) from LWE
Published 2021“…Boneh, Kim and Montgomery (EUROCRYPT 2017) recently presented a construction of private constrained PRF for point function constraints, and Canetti and Chen (EUROCRYPT 2017) presented a completely different construction for more general NC1 constraints. …”
Get full text
Article -
10
Priv'IT: Private and sample efficient identity testing
Published 2022“…We develop differentially private hypothesis testing methods for the small sample regime. …”
Get full text
Article -
11
Vuvuzela: scalable private messaging resistant to traffic analysis
Published 2015“…Private messaging over the Internet has proven challenging to implement, because even if message data is encrypted, it is difficult to hide metadata about who is communicating in the face of traffic analysis. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
12
-
13
Lightweb: Private web browsing without all the baggage
Published 2023“…This paper proposes lightweb, a new system for private browsing. A lightweb client can browse a web of textbased pages without revealing to anyone—not the network, not the servers hosting the pages—which pages it is reading. …”
Get full text
Article -
14
-
15
-
16
Coresets for differentially private k-means clustering and applications to privacy in mobile sensor networks
Published 2021“…To the best of our knowledge, this is the first practical system that enables differentially private clustering on real data.…”
Get full text
Article -
17
Fundamental limits of perfect privacy
Published 2018“…We investigate the problem of intentionally disclosing information about a set of measurement points X (useful information), while guaranteeing that little or no information is revealed about a private variable S (private information). Given that S and X are drawn from a finite set with joint distribution pS,X, we prove that a non-trivial amount of useful information can be disclosed while not disclosing any private information if and only if the smallest principal inertia component of the joint distribution of S and X is 0. …”
Get full text
Get full text
Get full text
Article -
18
Controlling privacy in recommender systems
Published 2015“…We demonstrate gains from controlled access to private user preferences.…”
Get full text
Get full text
Article -
19
Some Open Problems in Information-Theoretic Cryptography
Published 2021“…We will describe several such problems that arise in the study of private information retrieval, secure multi-party computation, secret sharing, private simultaneous messages (PSM) and conditional disclosure of secrets (CDS). …”
Get full text
Article -
20
Some Open Problems in Information-Theoretic Cryptography
Published 2021“…We will describe several such problems that arise in the study of private information retrieval, secure multi-party computation, secret sharing, private simultaneous messages (PSM) and conditional disclosure of secrets (CDS). …”
Get full text
Article