Single-server private information retrieval with sublinear amortized time

H Corrigan-Gibbs, A Henzinger, D Kogan - … International Conference on …, 2022 - Springer
We construct new private-information-retrieval protocols in the single-server setting. Our
schemes allow a client to privately fetch a sequence of database records from a server …

Blinder--Scalable, Robust Anonymous Committed Broadcast

I Abraham, B Pinkas, A Yanai - Proceedings of the 2020 ACM SIGSAC …, 2020 - dl.acm.org
Anonymous Committed Broadcast is a functionality that extends DC-nets and allows a set of
clients to privately commit messages to set of servers, which can then simultaneously open …

Incremental {offline/online}{PIR}

Y Ma, K Zhong, T Rabin, S Angel - 31st USENIX Security Symposium …, 2022 - usenix.org
Recent private information retrieval (PIR) schemes preprocess the database with a query-
independent offline phase in order to achieve sublinear computation during a query-specific …

Sabre: Sender-anonymous messaging with fast audits

A Vadapalli, K Storrier, R Henry - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
We present Sabre, a family of sender-anonymous messaging protocols with instances
supporting both Twitter-like anonymous bulletin boards and Secure Drop-like mailboxes …

Cryptographic administration for secure group messaging

D Balbás, D Collins, S Vaudenay - 32nd USENIX Security Symposium …, 2023 - usenix.org
Many real-world group messaging systems delegate group administration to the application
level, failing to provide formal guarantees related to group membership. Taking a …

SoK: Metadata-protecting communication systems

S Sasy, I Goldberg - Proceedings on Privacy Enhancing …, 2024 - petsymposium.org
Protecting metadata of communications has been an area of active research since the
dining cryptographers problem was introduced by David Chaum in 1988. The Snowden …

Fully malicious authenticated PIR

M Dietz, S Tessaro - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Authenticated PIR enables a server to initially commit to a database of $ N $ items, for which
a client can later privately obtain individual items with complexity sublinear in $ N $, with the …

Trellis: Robust and scalable metadata-private anonymous broadcast

S Langowski, S Servan-Schreiber… - Cryptology ePrint …, 2022 - eprint.iacr.org
Trellis is a mix-net based anonymous broadcast system with cryptographic security
guarantees. Trellis can be used to anonymously publish documents or communicate with …

XSPIR: efficient symmetrically private information retrieval from Ring-LWE

C Lin, Z Liu, T Malkin - European Symposium on Research in Computer …, 2022 - Springer
Abstract Private Information Retrieval (PIR) allows a client to retrieve one entry from a
database held by a server, while hiding from the server which entry has been retrieved …

Pudding: Private User Discovery in Anonymity Networks

C Kocaoğullar, D Hugenroth, M Kleppmann… - arXiv preprint arXiv …, 2023 - arxiv.org
Anonymity networks allow messaging with metadata privacy, providing better privacy than
popular encrypted messaging applications. However, contacting a user on an anonymity …