Reading List
(Papers are listed in a randomized order, although still bucketized by theme:)
Oblivious Random Access Memory (ORAMs)
1) Path ORAM: An Extremely Simple Oblivious RAM Protocol
Emil Stefanov, Marten van Dijk, Elaine Shi, T-H Hubert Chan, Christopher Fletcher, Ling Ren, Xiangyao Yu, and Srinivas Devadas
2) Scaling ORAM for Secure Computation
Jack Doerner and abhi shelat
3) Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation
Adithya Vadapalli, Ryan Henry, and Ian Goldberg
4) GigaDORAM: Breaking the Billion Address Barrier
Brett Falk, Rafail Ostrovsky, Matan Shtepel, and Jacob Zhang
Private Information Retrieval (PIR)
5) One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval
Alexandra Henzinger, Mathew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, and Vinod Vaikuntanathan
6) PIR with compressed queries and amortized query processing
Sebastian Angel, Hao Chen, Kim Laine, and Srinath Setty
7) Communication-Computation Trade-offs in PIR
Asra Ali, Tancrède Le Point, Sarvar Patel, Mariana Raykova, Phillip Schoppmann, Karn Seth, and Kevin Yeo
8) Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators
Rasoul Akhavan Mahdavi and Florian Kerschbaum
Trusted Hardware Tools and Applications:
9) ZeroTrace: Oblivious Memory Primitives from Intel SGX
Sajin Sasy, Sergey Gorbunov, and Christopher W. Fletcher
10) Fast Fully Oblivious Compaction and Shuffling
Sajin Sasy, Aaron Johnson, and Ian Goldberg
11) Prochlo: Strong Privacy for Analytics in the Crowd
Andrea Bittau, Ulfar Erlingsson, Petro Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree Kode, Julien Tinnes, Bernhard Seefeld
12) GraphOS: Towards Oblivious Graph Processing
Javed Ghareh Chamni, Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, and Rasool Jalili
Private Communications:
13) Tor: The Second-Generation Onion Router
Roger Dingledine, Nick Mathewson, and Paul Syverson
14) Improving Signal's Sealed Sender
Ian Martiny, Gabriel Kaptchuk, Adam Aviv, Dan Roche, and Eric Wustrow
15) Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis
Jelle van den Hooff, David Lazar, Matei Zaharia, and Nickolai Zeldovich
16) Clarion: Anonymous Communications from Multiparty Shuffling Protocols
Saba Eskandarian and Dan Boneh
17) Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy
Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, and Dan Boneh
18) Sabre: Sender-Anonymous Messaging with Fast Audits
Adithya Vadapalli, Kyle Storrier, and Ryan Henry
Private Blocklists:
19) Private Blocklist Lookups with Checklist
Dmitry Kogan and Henry Corrigan-Gibbs
20) Orca: Blocklisting in Sender-Anonymous Messaging
Nirvan Tyagi, Julia Len, Ian Miers, and Thomas Ristenpart
Private Statistics:
21) Prio: Private, Robust, and Scalable Computation of Aggregate Statistics
Henry Corrgian-Gibbs and Dan Boneh
22) Lightweight Techniques for Private Heavy Hitters
Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, and Yuval Ishai
Private Search & Recommendation Systems:
23) Preco: Private Approximate Nearest Neighbor Search with Sublinear Communication
Sacha Servan-Schreiber, Simon Langowski, and Srinivas Devadas
24) DORY: An Encrypted Search System with Distributed Trust
Emma Dauterman, Eric Feng, Ellen Luo, Raluca Ada Popa, and Ion Stoica
25) Private Web Search with Tiptoe
Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs, Nickolai Zeldovich
26) You May Also Like...Privacy: Recommendation Systems Meet PIR
Adithya Vadapalli, Fattaneh Bayatbabolghani, and Ryan Henry
27) Scalable Private Search with Wally
Hilal Asi, Fabian Boemer, Nicholas Genise, Haris Mughees, Tabitha Ogilvie, Rehan Rishi, Guy N. Rothblum, Kunal Talwar, Karl Tarbe, Ruiyu Zhu, and Marco Zuliani