Reading List

(Papers are listed in a randomized order, although still bucketized by theme:)

Oblivious Random Access Memory (ORAMs)

1) Path ORAM: An Extremely Simple Oblivious RAM Protocol
     Emil Stefanov, Marten van Dijk, Elaine Shi, T-H Hubert Chan, Christopher Fletcher, Ling Ren, Xiangyao Yu, and Srinivas Devadas

2) Scaling ORAM for Secure Computation
     Jack Doerner and abhi shelat

3) Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation
    Adithya Vadapalli, Ryan Henry, and Ian Goldberg

4) GigaDORAM: Breaking the Billion Address Barrier
     Brett Falk, Rafail Ostrovsky, Matan Shtepel, and Jacob Zhang
 

Private Information Retrieval (PIR)

5) One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval
     Alexandra Henzinger, Mathew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, and Vinod Vaikuntanathan
 

6) PIR with compressed queries and amortized query processing
     Sebastian Angel, Hao Chen, Kim Laine, and Srinath Setty
 

7) Communication-Computation Trade-offs in PIR
     Asra Ali, Tancrède Le Point, Sarvar Patel, Mariana Raykova, Phillip Schoppmann, Karn Seth, and Kevin Yeo
 

8) Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators
     Rasoul Akhavan Mahdavi and Florian Kerschbaum
 

Trusted Hardware Tools and Applications:

9) ZeroTrace: Oblivious Memory Primitives from Intel SGX
     Sajin Sasy, Sergey Gorbunov, and Christopher W. Fletcher
 

10) Fast Fully Oblivious Compaction and Shuffling
      Sajin Sasy, Aaron Johnson, and Ian Goldberg

11) Prochlo: Strong Privacy for Analytics in the Crowd
       Andrea Bittau, Ulfar Erlingsson, Petro Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree Kode, Julien Tinnes, Bernhard Seefeld
 

12) GraphOS: Towards Oblivious Graph Processing
       Javed Ghareh Chamni, Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, and Rasool Jalili
 

Private Communications:

13) Tor: The Second-Generation Onion Router
       Roger Dingledine, Nick Mathewson, and Paul Syverson

14) Improving Signal's Sealed Sender
       Ian Martiny, Gabriel Kaptchuk, Adam Aviv, Dan Roche, and Eric Wustrow
 

15) Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis
       Jelle van den Hooff, David Lazar, Matei Zaharia, and Nickolai Zeldovich

16) Clarion: Anonymous Communications from Multiparty Shuffling Protocols
       Saba Eskandarian and Dan Boneh
 

17) Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy
       Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, and Dan Boneh

 

18) Sabre: Sender-Anonymous Messaging with Fast Audits
       Adithya Vadapalli, Kyle Storrier, and Ryan Henry


Private Blocklists:

19) Private Blocklist Lookups with Checklist
       Dmitry Kogan and Henry Corrigan-Gibbs

20) Orca: Blocklisting in Sender-Anonymous Messaging
       Nirvan Tyagi, Julia Len, Ian Miers, and Thomas Ristenpart

Private Statistics:

21) Prio: Private, Robust, and Scalable Computation of Aggregate Statistics
       Henry Corrgian-Gibbs and Dan Boneh

22) Lightweight Techniques for Private Heavy Hitters
       Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, and Yuval Ishai
 

Private Search & Recommendation Systems:

23) Preco: Private Approximate Nearest Neighbor Search with Sublinear Communication
       Sacha Servan-Schreiber, Simon Langowski, and Srinivas Devadas

24) DORY: An Encrypted Search System with Distributed Trust
       Emma Dauterman, Eric Feng, Ellen Luo, Raluca Ada Popa, and Ion Stoica
 

25) Private Web Search with Tiptoe
       Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs, Nickolai Zeldovich

26) You May Also Like...Privacy: Recommendation Systems Meet PIR
       Adithya Vadapalli, Fattaneh Bayatbabolghani, and Ryan Henry
 

27) Scalable Private Search with Wally
       Hilal Asi, Fabian Boemer, Nicholas Genise, Haris Mughees, Tabitha Ogilvie, Rehan Rishi, Guy N. Rothblum, Kunal Talwar, Karl Tarbe, Ruiyu Zhu, and Marco Zuliani
 

Privacy Policy | Legal Notice
If you encounter technical problems, please contact the administrators.