Summary of DNS over HTTPS abuse
The Internet Engineering Task Force adopted the DNS over HTTPS protocol in 2018 to
remediate privacy issues regarding the plain text transmission of the DNS protocol …
remediate privacy issues regarding the plain text transmission of the DNS protocol …
The Complete Guide to SCION
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …
Treepir: Sublinear-time and polylog-bandwidth private information retrieval from ddh
A Lazzaretti, C Papamanthou - Annual International Cryptology …, 2023 - Springer
Abstract In Private Information Retrieval (PIR), a client wishes to retrieve the value of an
index i from a public database of N values without leaking any information about i. In their …
index i from a public database of N values without leaking any information about i. In their …
Domain name encryption is not enough: Privacy leakage via IP-based website fingerprinting
Although the security benefits of domain name encryption technologies such as DNS over
TLS (DoT), DNS over HTTPS (DoH), and Encrypted Client Hello (ECH) are clear, their …
TLS (DoT), DNS over HTTPS (DoH), and Encrypted Client Hello (ECH) are clear, their …
Reflections on trusting distributed trust
Many systems today distribute trust across multiple parties such that the system provides
certain security properties if a subset of the parties are honest. In the past few years, we …
certain security properties if a subset of the parties are honest. In the past few years, we …
The decoupling principle: A practical privacy framework
The three decade struggle to ensure Internet data confidentiality---a key aspect of
communications privacy---is finally behind us. Encryption is fast, secure, and standard in all …
communications privacy---is finally behind us. Encryption is fast, secure, and standard in all …
Evaluating practical QUIC website fingerprinting defenses for the masses
Website fingerprinting (WF) is a well-known threat to users' web privacy. New Internet
standards, such as QUIC, include padding to support defenses against WF. Previous work …
standards, such as QUIC, include padding to support defenses against WF. Previous work …
PQ-HPKE: post-quantum hybrid public key encryption
M Anastasova, P Kampanakis, J Massimo - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Public key cryptography is used to asymmetrically establish keys, authenticate or encrypt
data between communicating parties at a relatively high performance cost. To reduce …
data between communicating parties at a relatively high performance cost. To reduce …
Near-optimal private information retrieval with preprocessing
A Lazzaretti, C Papamanthou - Theory of Cryptography Conference, 2023 - Springer
Abstract In Private Information Retrieval (PIR), a client wishes to access an index i from a
public n-bit database without revealing any information about i. Recently, a series of works …
public n-bit database without revealing any information about i. Recently, a series of works …
Information-Theoretic Multi-Server PIR with Global Preprocessing
We propose a new unified framework to construct multi-server, information-theoretic Private
Information Retrieval (PIR) schemes that leverage global preprocesing to achieve sublinear …
Information Retrieval (PIR) schemes that leverage global preprocesing to achieve sublinear …