Reading List

(Papers are listed in a randomized order, although bucketized by theme.)

Oblivious Random Access Memory (ORAMs)

1) Software Protection and Simulation on Oblivious RAMs
      Oded Goldreich and Rafail Ostrovsky

2) Path ORAM: An Extremely Simple Oblivious RAM Protocol
      Emil Stefanov, Marten van Dijk, Elaine Shi, T-H Hubert Chan, Christopher Fletcher, Ling Ren, Xiangyao Yu, and Srinivas Devadas
 

Private Information Retrieval (PIR)

3) One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval
     Alexandra Henzinger, Mathew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, and Vinod Vaikuntanathan

4) PIR with compressed queries and amortized query processing
     Sebastian Angel, Hao Chen, Kim Laine, and Srinath Setty

5) Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators
     Rasoul Akhavan Mahdavi and Florian Kerschbaum

6) Private Blocklist Lookups with Checklist
      Dmitry Kogan and Henry Corrigan-Gibbs

7) Single Pass Client-Preprocessing Private Information Retrieval
      Arthur Lazzaretti and Charalampos Papamanthou

Trusted Hardware Tools and Applications:

8) ZeroTrace: Oblivious Memory Primitives from Intel SGX
     Sajin Sasy, Sergey Gorbunov, and Christopher W. Fletcher

9) Fast Fully Oblivious Compaction and Shuffling
      Sajin Sasy, Aaron Johnson, and Ian Goldberg

10) Prochlo: Strong Privacy for Analytics in the Crowd
       Andrea Bittau, Ulfar Erlingsson, Petro Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree Kode, Julien Tinnes, Bernhard Seefeld

11) GraphOS: Towards Oblivious Graph Processing
       Javed Ghareh Chamni, Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, and Rasool Jalili
 

Private Communications:

12) Clarion: Anonymous Communications from Multiparty Shuffling Protocols
       Saba Eskandarian and Dan Boneh

13) Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy
       Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, and Dan Boneh

14) Sabre: Sender-Anonymous Messaging with Fast Audits
       Adithya Vadapalli, Kyle Storrier, and Ryan Henry

15) Myco: Unlocking Polylogarithmic Accesses in Metadata-Private Messaging
        Darya Kaviani, Deevashwer Rathee, Bhargav Annem, and Raluca Ada Popa 

16) Distributed PIR: Scaling Private Messaging via the Users’ Machines
        Elkana Tovey, Jonathan Weiss, and Yossi Gilad

17) TEEMS: A Trusted Execution Environment based Metadata-protected Messaging System
        Sajin Sasy, Aaron Johnson, and Ian Goldberg


Private Statistics and Browsing:

18) Prio: Private, Robust, and Scalable Computation of Aggregate Statistics
       Henry Corrgian-Gibbs and Dan Boneh

19) Lightweight Techniques for Private Heavy Hitters
       Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, and Yuval Ishai

20) Privacy Pass: Bypassing Internet Challenges Anonymously
        Alex Davidson, Ian Goldberg, Nick Sullivan, George Tankersley, and Filippo Valsorda

Private Search & Recommendation Systems:

21) Preco: Private Approximate Nearest Neighbor Search with Sublinear Communication
       Sacha Servan-Schreiber, Simon Langowski, and Srinivas Devadas

22) DORY: An Encrypted Search System with Distributed Trust
       Emma Dauterman, Eric Feng, Ellen Luo, Raluca Ada Popa, and Ion Stoica

23) Private Web Search with Tiptoe
       Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs, Nickolai Zeldovich

24) Compass: Encrypted Semantic Search with High Accuracy
        Jinhao Zhu, Liana Patel, Matei Zaharia, and Raluca Ada Popa

Privacy Policy | Legal Notice
If you encounter technical problems, please contact the administrators.