A theory of composition for differential obliviousness

M Zhou, E Shi, THH Chan, S Maimon - … on the Theory and Applications of …, 2023 - Springer
Differential obliviousness (DO) is a privacy notion which guarantees that the access patterns
of a program satisfies differential privacy. Differential obliviousness was studied in a …

Spreading the privacy blanket: Differentially oblivious shuffling for differential privacy

D Gordon, J Katz, M Liang, J Xu - International Conference on Applied …, 2022 - Springer
In the shuffle model for differential privacy, n users locally randomize their data and submit
the results to a trusted “shuffler” who mixes the results before sending them to a server for …

Comprehensive anonymity trilemma: User coordination is not enough

D Das, S Meiser, E Mohammadi… - Proceedings on Privacy …, 2020 - petsymposium.org
For anonymous communication networks (ACNs), Das et al. recently confirmed a long-
suspected trilemma result that ACNs cannot achieve strong anonymity, low latency …

Divide and funnel: a scaling technique for mix-networks

D Das, S Meiser, E Mohammadi… - 2024 IEEE 37th …, 2024 - ieeexplore.ieee.org
While many anonymous communication (AC) protocols have been proposed to provide
anonymity over the internet, scaling to a large number of users while remaining provably …

Privacy preserving anti-forensic techniques

MA Wani - Multimedia Security: Algorithm Development, Analysis …, 2021 - Springer
In this digital age of mass surveillance and personal identity theft, data security and privacy
is a major concern. Although sophisticated tools and software that guarantee privacy are …

Cryptographic shallots: A formal treatment of repliable onion encryption

M Ando, A Lysyanskaya - … Conference, TCC 2021, Raleigh, NC, USA …, 2021 - Springer
Onion routing is a popular, efficient, and scalable method for enabling anonymous
communications. To send a message m to Bob via onion routing, Alice picks several …

On the complexity of anonymous communication through public networks

M Ando, A Lysyanskaya, E Upfal - arXiv preprint arXiv:1902.06306, 2019 - arxiv.org
Onion routing is the most widely used approach to anonymous communication online. The
idea is that Alice wraps her message to Bob in layers of encryption to form an" onion," and …

Bruisable Onions: Anonymous Communication in the Asynchronous Model

M Ando, A Lysyanskaya, E Upfal - Theory of Cryptography Conference, 2024 - Springer
In onion routing, a message travels through the network via a series of intermediaries,
wrapped in layers of encryption to make it difficult to trace. Onion routing is an attractive …

Poly onions: Achieving anonymity in the presence of churn

M Ando, M Christ, A Lysyanskaya, T Malkin - Theory of Cryptography …, 2022 - Springer
Onion routing is a popular approach towards anonymous communication. Practical
implementations are widely used (for example, Tor has millions of users daily), but are …

The Melbourne Shuffle

O Ohrimenko - Encyclopedia of Cryptography, Security and Privacy, 2023 - Springer
Background Memory side channels arise when a client stores their private data with a
remote server (eg, in a cloud setting). Though the content of the data can be protected with …