Advances and open problems in federated learning
Federated learning (FL) is a machine learning setting where many clients (eg, mobile
devices or whole organizations) collaboratively train a model under the orchestration of a …
devices or whole organizations) collaboratively train a model under the orchestration of a …
XPIR: Private information retrieval for everyone
CA Melchor, J Barrier, L Fousse… - Proceedings on Privacy …, 2016 - hal.science
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record
from a database while hiding which from the database administrators. PIR can be achieved …
from a database while hiding which from the database administrators. PIR can be achieved …
Practical non-interactive publicly verifiable secret sharing with thousands of parties
Non-interactive publicly verifiable secret sharing (PVSS) schemes enables (re-) sharing of
secrets in a decentralized setting in the presence of malicious parties. A recently proposed …
secrets in a decentralized setting in the presence of malicious parties. A recently proposed …
Private blocklist lookups with checklist
D Kogan, H Corrigan-Gibbs - 30th USENIX security symposium (USENIX …, 2021 - usenix.org
This paper presents Checklist, a system for private blocklist lookups. In Checklist, a client
can determine whether a particular string appears on a server-held blocklist of strings …
can determine whether a particular string appears on a server-held blocklist of strings …
Compressible FHE with applications to PIR
Homomorphic encryption (HE) is often viewed as impractical, both in communication and
computation. Here we provide an additively homomorphic encryption scheme based on …
computation. Here we provide an additively homomorphic encryption scheme based on …
Splinter: Practical private queries on public data
F Wang, C Yun, S Goldwasser… - … USENIX Symposium on …, 2017 - usenix.org
Many online services let users query public datasets such as maps, flight prices, or
restaurant reviews. Unfortunately, the queries to these services reveal highly sensitive …
restaurant reviews. Unfortunately, the queries to these services reveal highly sensitive …
Privatefs: A parallel oblivious file system
P Williams, R Sion, A Tomescu - … of the 2012 ACM conference on …, 2012 - dl.acm.org
PrivateFS is an oblivious file system that enables access to remote storage, while keeping
both the file contents and client access patterns secret. PrivateFS is based on a new parallel …
both the file contents and client access patterns secret. PrivateFS is based on a new parallel …
A novel time-obfuscated algorithm for trajectory privacy protection
Location-based services (LBS) which bring so much convenience to our daily life have been
intensively studied over the years. Generally, an LBS query processing can be categorized …
intensively studied over the years. Generally, an LBS query processing can be categorized …
Protocols for checking compromised credentials
To prevent credential stuffing attacks, industry best practice now proactively checks if user
credentials are present in known data breaches. Recently, some web services, such as …
credentials are present in known data breaches. Recently, some web services, such as …
Optimally robust private information retrieval
C Devet, I Goldberg, N Heninger - 21st USENIX Security Symposium …, 2012 - usenix.org
We give a protocol for multi-server information-theoretic private information retrieval which
achieves the theoretical limit for Byzantine robustness. That is, the protocol can allow a client …
achieves the theoretical limit for Byzantine robustness. That is, the protocol can allow a client …