Private analytics via streaming, sketching, and silently verifiable proofs

M Rathee, Y Zhang, H Corrigan-Gibbs… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
We present Whisper, a system for privacy-preserving collection of aggregate statistics. Like
prior systems, a Whisper deployment consists of a small set of non-colluding servers; these …

Verifiable distributed aggregation functions

H Davis, C Patton, M Rosulek… - Cryptology ePrint …, 2023 - eprint.iacr.org
The modern Internet is built on systems that incentivize collection of information about users.
In order to minimize privacy loss, it is desirable to prevent these systems from collecting …

{POPSTAR}: Lightweight Threshold Reporting with Reduced Leakage

H Li, S Navot, S Tessaro - 33rd USENIX Security Symposium (USENIX …, 2024 - usenix.org
This paper proposes POPSTAR, a new lightweight protocol for the private computation of
heavy hitters, also known as a private threshold reporting system. In such a protocol, the …

Camel: Communication-Efficient and Maliciously Secure Federated Learning in the Shuffle Model of Differential Privacy

S Xu, Y Zheng, Z Hua - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Federated learning (FL) has rapidly become a compelling paradigm that enables multiple
clients to jointly train a model by sharing only gradient updates for aggregation, without …

Curl: Private LLMs through wavelet-encoded look-up tables

MB Santos, D Mouris, M Ugurbil, S Jarecki… - Cryptology ePrint …, 2024 - eprint.iacr.org
Recent advancements in transformers have revolutionized machine learning, forming the
core of Large language models (LLMs). However, integrating these systems into everyday …

Delegated private matching for compute

D Mouris, D Masny, N Trieu, S Sengupta… - Proceedings on …, 2024 - petsymposium.org
Private matching for compute (PMC) establishes a match between two datasets owned by
mutually distrusted parties (C and P) and allows the parties to input more data for the …

Non-interactive distributed point functions

E Boyle, L Devadas, S Servan-Schreiber - Cryptology ePrint Archive, 2025 - eprint.iacr.org
Abstract Distributed Point Functions (DPFs) are a useful cryptographic primitive enabling a
dealer to distribute short keys to two parties, such that the keys encode additive secret …

Mastic: Private weighted heavy-hitters and attribute-based metrics

D Mouris, C Patton, H Davis, P Sarkar… - … on Privacy Enhancing …, 2025 - petsymposium.org
Insight into user experience and behavior is critical to the success of large software systems
and web services. Gaining such insights, while preserving user privacy, is a significant …

Mostree: malicious secure private decision tree evaluation with sublinear communication

J Bai, X Song, X Zhang, Q Wang, S Cui… - Proceedings of the 39th …, 2023 - dl.acm.org
A private decision tree evaluation (PDTE) protocol allows a feature vector owner (FO) to
classify its data using a tree model from a model owner (MO) and only reveals an inference …

Juliet: A configurable processor for computing on encrypted data

C Gouert, D Mouris, NG Tsoutsos - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Fully homomorphic encryption (FHE) has become progressively more viable in the years
since its original inception in 2009. At the same time, leveraging state-of-the-art schemes in …