Private analytics via streaming, sketching, and silently verifiable proofs

M Rathee, Y Zhang, H Corrigan-Gibbs… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
We present Whisper, a system for privacy-preserving collection of aggregate statistics. Like
prior systems, a Whisper deployment consists of a small set of non-colluding servers; these …

PLASMA: Private, lightweight aggregated statistics against malicious adversaries

D Mouris, P Sarkar, NG Tsoutsos - Proceedings on Privacy …, 2024 - petsymposium.org
Private heavy-hitters is a data-collection task where multiple clients possess private bit
strings, and data-collection servers aim to identify the most popular strings without learning …

Secure statistical analysis on multiple datasets: Join and group-by

G Asharov, K Hamada, R Kikuchi, A Nof… - Proceedings of the …, 2023 - dl.acm.org
We implement a secure platform for statistical analysis over multiple organizations and
multiple datasets. We provide a suite of protocols for different variants of JOIN and GROUP …

{TVA}: A multi-party computation system for secure and expressive time series analytics

M Faisal, J Zhang, J Liagouris, V Kalavri… - 32nd USENIX Security …, 2023 - usenix.org
We present TVA, a multi-party computation (MPC) system for secure analytics on secret-
shared time series data. TVA achieves strong security guarantees in the semi-honest and …

Secret-shared shuffle with malicious security

X Song, D Yin, J Bai, C Dong, EC Chang - Cryptology ePrint Archive, 2023 - eprint.iacr.org
A secret-shared shuffle (SSS) protocol permutes a secret-shared vector using a random
secret permutation. It has found numerous applications, however, it is also an expensive …

Efficient permutation correlations and batched random access for two-party computation

S Peceny, S Raghuraman, P Rindal… - Cryptology ePrint …, 2024 - eprint.iacr.org
In this work we formalize the notion of a two-party permutation correlation $(A, B),(C,\pi) $ st
$\pi (A)= B+ C $ for a random permutation $\pi $ of $ n $ elements and vectors $ A, B …

Mastic: Private weighted heavy-hitters and attribute-based metrics

D Mouris, C Patton, H Davis, P Sarkar… - … on Privacy Enhancing …, 2025 - petsymposium.org
Insight into user experience and behavior is critical to the success of large software systems
and web services. Gaining such insights, while preserving user privacy, is a significant …

{GraphGuard}: Private {Time-Constrained} Pattern Detection Over Streaming Graphs in the Cloud

S Wang, Y Zheng, X Jia - 33rd USENIX Security Symposium (USENIX …, 2024 - usenix.org
Streaming graphs have seen wide adoption in diverse scenarios due to their superior ability
to capture temporal interactions among entities. With the proliferation of cloud computing, it …

Privacy-preserving dijkstra

B Ostrovsky - Annual International Cryptology Conference, 2024 - Springer
Given a graph G (V, E), represented as a secret-sharing of an adjacency list, we show how
to obliviously convert it into an alternative, MPC-friendly secret-shared representation, so …

Secure sampling for approximate multi-party query processing

Q Luo, Y Wang, K Yi, S Wang, F Li - … of the ACM on Management of Data, 2023 - dl.acm.org
We study the problem of random sampling in the secure multi-party computation (MPC)
model. In MPC, taking a sample securely must have a cost Ω (n) irrespective to the sample …