Blockchain access privacy: Challenges and directions

R Henry, A Herzberg, A Kate - IEEE Security & Privacy, 2018 - ieeexplore.ieee.org
Privacy, facilitated by a confluence of cryptography and decentralization, is one of the
primary motivations for the adoption of cryptocurrencies like Bitcoin. Alas, Bitcoins privacy …

Piano: extremely simple, single-server PIR with sublinear server computation

M Zhou, A Park, W Zheng, E Shi - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
We construct a sublinear-time single-server preprocessing Private Information Retrieval
(PIR) scheme with an optimal tradeoff between client storage and server computation (up to …

Puncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and time

E Shi, W Aqeel, B Chandrasekaran… - Advances in Cryptology …, 2021 - Springer
Imagine one or more non-colluding servers each holding a large public database, eg, the
repository of DNS entries. Clients would like to access entries in this database without …

Optimal single-server private information retrieval

M Zhou, WK Lin, Y Tselekounis, E Shi - … on the Theory and Applications of …, 2023 - Springer
We construct a single-server pre-processing Private Information Retrieval (PIR) scheme with
optimal bandwidth and server computation (up to poly-logarithmic factors), assuming …

Heterogeneous private information retrieval

H Mozaffari, A Houmansadr - Network and Distributed Systems Security …, 2020 - par.nsf.gov
Private information retrieval (PIR) enables clients to query and retrieve data from untrusted
servers without the untrusted servers learning which data was retrieved. In this paper, we …

Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage

Q Tong, X Li, Y Miao, Y Wang, X Liu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Boolean range query (BRQ) is a typical type of spatial keyword query that is widely used in
geographic information systems, location-based services and other applications. It retrieves …

[PDF][PDF] Hybrid Trust Multi-party Computation with Trusted Execution Environment.

P Wu, J Ning, J Shen, H Wang, EC Chang - NDSS, 2022 - ndss-symposium.org
Trusted execution environment (TEE) such as Intel SGX relies on hardware protection and
can perform secure multi-party computation (MPC) much more efficiently than pure software …

You may also like... privacy: Recommendation systems meet pir

A Vadapalli, F Bayatbabolghani… - Proceedings on Privacy …, 2021 - petsymposium.org
We describe the design, analysis, implementation, and evaluation of PIRSONA, a digital
content delivery system that realizes collaborative-filtering recommendations atop private …

PRAC: Round-Efficient 3-Party MPC for Dynamic Data Structures

S Sasy, A Vadapalli, I Goldberg - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Abstract We present Private Random Access Computations (PRAC), a 3-party Secure Multi-
Party Computation (MPC) framework to support random-access data structure algorithms for …

Private Aggregate Queries to Untrusted Databases

SM Hafiz, C Gupta, W Wnuck, B Vora… - arXiv preprint arXiv …, 2024 - arxiv.org
Private information retrieval (PIR), a privacy-preserving cryptographic tool, solves a
simplified version of this problem by hiding the database item that a client accesses. Most …