Summary of DNS over HTTPS abuse

K Hynek, D Vekshin, J Luxemburk, T Cejka… - IEEE …, 2022 - ieeexplore.ieee.org
The Internet Engineering Task Force adopted the DNS over HTTPS protocol in 2018 to
remediate privacy issues regarding the plain text transmission of the DNS protocol …

The Complete Guide to SCION

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022 - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …

Treepir: Sublinear-time and polylog-bandwidth private information retrieval from ddh

A Lazzaretti, C Papamanthou - Annual International Cryptology …, 2023 - Springer
Abstract In Private Information Retrieval (PIR), a client wishes to retrieve the value of an
index i from a public database of N values without leaking any information about i. In their …

Domain name encryption is not enough: Privacy leakage via IP-based website fingerprinting

NP Hoang, AA Niaki, P Gill, M Polychronakis - arXiv preprint arXiv …, 2021 - arxiv.org
Although the security benefits of domain name encryption technologies such as DNS over
TLS (DoT), DNS over HTTPS (DoH), and Encrypted Client Hello (ECH) are clear, their …

Reflections on trusting distributed trust

E Dauterman, V Fang, N Crooks, RA Popa - Proceedings of the 21st …, 2022 - dl.acm.org
Many systems today distribute trust across multiple parties such that the system provides
certain security properties if a subset of the parties are honest. In the past few years, we …

The decoupling principle: A practical privacy framework

P Schmitt, J Iyengar, C Wood, B Raghavan - Proceedings of the 21st …, 2022 - dl.acm.org
The three decade struggle to ensure Internet data confidentiality---a key aspect of
communications privacy---is finally behind us. Encryption is fast, secure, and standard in all …

Evaluating practical QUIC website fingerprinting defenses for the masses

S Siby, L Barman, C Wood… - Proceedings …, 2023 - research-repository.st-andrews.ac …
Website fingerprinting (WF) is a well-known threat to users' web privacy. New Internet
standards, such as QUIC, include padding to support defenses against WF. Previous work …

PQ-HPKE: post-quantum hybrid public key encryption

M Anastasova, P Kampanakis, J Massimo - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Public key cryptography is used to asymmetrically establish keys, authenticate or encrypt
data between communicating parties at a relatively high performance cost. To reduce …

Near-optimal private information retrieval with preprocessing

A Lazzaretti, C Papamanthou - Theory of Cryptography Conference, 2023 - Springer
Abstract In Private Information Retrieval (PIR), a client wishes to access an index i from a
public n-bit database without revealing any information about i. Recently, a series of works …

Information-Theoretic Multi-Server PIR with Global Preprocessing

A Ghoshal, B Li, Y Ma, C Dai, E Shi - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We propose a new unified framework to construct multi-server, information-theoretic Private
Information Retrieval (PIR) schemes that leverage global preprocesing to achieve sublinear …