Prio: Private, robust, and scalable computation of aggregate statistics

H Corrigan-Gibbs, D Boneh - 14th USENIX symposium on networked …, 2017 - usenix.org
This paper presents Prio, a privacy-preserving system for the collection of aggregate
statistics. Each Prio client holds a private data value (eg, its current location), and a small set …

Revocable quantum timed-release encryption

D Unruh - Journal of the ACM (JACM), 2015 - dl.acm.org
Timed-release encryption is a kind of encryption scheme in which a recipient can decrypt
only after a specified amount of time T (assuming that we have a moderately precise …

Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors

R Cramer, Y Dodis, S Fehr, C Padró… - … Conference on the Theory …, 2008 - Springer
Consider an abstract storage device Σ(G) that can hold a single element x from a fixed,
publicly known finite group G. Storage is private in the sense that an adversary does not …

Private analytics via streaming, sketching, and silently verifiable proofs

M Rathee, Y Zhang, H Corrigan-Gibbs… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
We present Whisper, a system for privacy-preserving collection of aggregate statistics. Like
prior systems, a Whisper deployment consists of a small set of non-colluding servers; these …

Practical quantum anonymous private information retrieval based on quantum key distribution

YG Yang, BX Liu, GB Xu, YH Zhou… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Quantum Anonymous Private Information Retrieval (QAPIR) allows a user to retrieve an item
from a database anonymously thus achieving better user privacy. Recently, Khan et al …

Algebraic manipulation detection codes

R Cramer, S Fehr, C Padró - Science China Mathematics, 2013 - Springer
Algebraic manipulation detection codes are a cryptographic primitive that was introduced by
Cramer et al.(Eurocrypt 2008). It encompasses several methods that were previously used in …

Experimental implementation of secure anonymous protocols on an eight-user quantum key distribution network

Z Huang, SK Joshi, D Aktas, C Lupo… - npj quantum …, 2022 - nature.com
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure
key distribution alone is insufficient for high-security communications. Often, knowing who …

Anonymous quantum conference key agreement

F Hahn, J de Jong, A Pappa - PRX Quantum, 2020 - APS
Conference key agreement (CKA) is a cryptographic effort of multiple parties to establish a
shared secret key. In future quantum networks, generating secret keys in an anonymous way …

Self-tallying quantum anonymous voting

Q Wang, C Yu, F Gao, H Qi, Q Wen - Physical Review A, 2016 - APS
Anonymous voting is a voting method of hiding the link between a vote and a voter, the
context of which ranges from governmental elections to decision making in small groups like …

Secure anonymous conferencing in quantum networks

F Grasselli, G Murta, J de Jong, F Hahn, D Bruß… - PRX quantum, 2022 - APS
Users of quantum networks can securely communicate via so-called (quantum) conference
key agreement—making their identities publicly known. In certain circumstances, however …