Reading List
(Papers are listed in a randomized order, although bucketized by theme.)
Oblivious Random Access Memory (ORAMs)
1) Software Protection and Simulation on Oblivious RAMs
Oded Goldreich and Rafail Ostrovsky
2) Path ORAM: An Extremely Simple Oblivious RAM Protocol
Emil Stefanov, Marten van Dijk, Elaine Shi, T-H Hubert Chan, Christopher Fletcher, Ling Ren, Xiangyao Yu, and Srinivas Devadas
Private Information Retrieval (PIR)
3) One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval
Alexandra Henzinger, Mathew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, and Vinod Vaikuntanathan
4) PIR with compressed queries and amortized query processing
Sebastian Angel, Hao Chen, Kim Laine, and Srinath Setty
5) Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators
Rasoul Akhavan Mahdavi and Florian Kerschbaum
6) Private Blocklist Lookups with Checklist
Dmitry Kogan and Henry Corrigan-Gibbs
7) Single Pass Client-Preprocessing Private Information Retrieval
Arthur Lazzaretti and Charalampos Papamanthou
Trusted Hardware Tools and Applications:
8) ZeroTrace: Oblivious Memory Primitives from Intel SGX
Sajin Sasy, Sergey Gorbunov, and Christopher W. Fletcher
9) Fast Fully Oblivious Compaction and Shuffling
Sajin Sasy, Aaron Johnson, and Ian Goldberg
10) Prochlo: Strong Privacy for Analytics in the Crowd
Andrea Bittau, Ulfar Erlingsson, Petro Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree Kode, Julien Tinnes, Bernhard Seefeld
11) GraphOS: Towards Oblivious Graph Processing
Javed Ghareh Chamni, Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, and Rasool Jalili
Private Communications:
12) Clarion: Anonymous Communications from Multiparty Shuffling Protocols
Saba Eskandarian and Dan Boneh
13) Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy
Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, and Dan Boneh
14) Sabre: Sender-Anonymous Messaging with Fast Audits
Adithya Vadapalli, Kyle Storrier, and Ryan Henry
15) Myco: Unlocking Polylogarithmic Accesses in Metadata-Private Messaging
Darya Kaviani, Deevashwer Rathee, Bhargav Annem, and Raluca Ada Popa
16) Distributed PIR: Scaling Private Messaging via the Users’ Machines
Elkana Tovey, Jonathan Weiss, and Yossi Gilad
17) TEEMS: A Trusted Execution Environment based Metadata-protected Messaging System
Sajin Sasy, Aaron Johnson, and Ian Goldberg
Private Statistics and Browsing:
18) Prio: Private, Robust, and Scalable Computation of Aggregate Statistics
Henry Corrgian-Gibbs and Dan Boneh
19) Lightweight Techniques for Private Heavy Hitters
Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, and Yuval Ishai
20) Privacy Pass: Bypassing Internet Challenges Anonymously
Alex Davidson, Ian Goldberg, Nick Sullivan, George Tankersley, and Filippo Valsorda
Private Search & Recommendation Systems:
21) Preco: Private Approximate Nearest Neighbor Search with Sublinear Communication
Sacha Servan-Schreiber, Simon Langowski, and Srinivas Devadas
22) DORY: An Encrypted Search System with Distributed Trust
Emma Dauterman, Eric Feng, Ellen Luo, Raluca Ada Popa, and Ion Stoica
23) Private Web Search with Tiptoe
Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs, Nickolai Zeldovich
24) Compass: Encrypted Semantic Search with High Accuracy
Jinhao Zhu, Liana Patel, Matei Zaharia, and Raluca Ada Popa
