Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Private web search with Tiptoe
Tiptoe is a private web search engine that allows clients to search over hundreds of millions
of documents, while revealing no information about their search query to the search engine's …
of documents, while revealing no information about their search query to the search engine's …
{I/O-Efficient} Dynamic Searchable Encryption meets Forward & Backward Privacy
We focus on the problem of I/O-efficient Dynamic Searchable Encryption (DSE), ie, schemes
that perform well when executed with the dataset on-disk. Towards this direction, for HDDs …
that perform well when executed with the dataset on-disk. Towards this direction, for HDDs …
Secret Key Recovery in a {Global-Scale}{End-to-End} Encryption System
End-to-end encrypted messaging applications ensure that an attacker cannot read a user's
message history without their decryption keys. While this provides strong privacy, it creates a …
message history without their decryption keys. While this provides strong privacy, it creates a …
Dynamic searchable encryption with optimal search in the presence of deletions
We focus on the problem of Dynamic Searchable Encryption (DSE) with efficient
(optimal/quasi-optimal) search in the presence of deletions. Towards that end, we first …
(optimal/quasi-optimal) search in the presence of deletions. Towards that end, we first …
Graphos: Towards oblivious graph processing
We propose GraphOS, a system that allows a client that owns a graph database to
outsource it to an untrusted server for storage and querying. It relies on doubly-oblivious …
outsource it to an untrusted server for storage and querying. It relies on doubly-oblivious …
Distributed & scalable oblivious sorting and shuffling
Existing oblivious systems offer robust security by concealing memory access patterns, but
they encounter significant scalability and performance challenges. Recent efforts to enhance …
they encounter significant scalability and performance challenges. Recent efforts to enhance …
Waffle: An online oblivious datastore for protecting data access patterns
We present Waffle, a datastore that protects an application's data access patterns from a
passive persistent adversary. Waffle achieves this without prior knowledge of the input data …
passive persistent adversary. Waffle achieves this without prior knowledge of the input data …
Waks-on/waks-off: Fast oblivious offline/online shuffling and sorting with waksman networks
As more privacy-preserving solutions leverage trusted execution environments (TEEs) like
Intel SGX, it becomes pertinent that these solutions can by design thwart TEE side-channel …
Intel SGX, it becomes pertinent that these solutions can by design thwart TEE side-channel …
Confidential Computing or Cryptographic Computing? Tradeoffs between cryptography and hardware enclaves
RA Popa - Queue, 2024 - dl.acm.org
Secure computation via MPC/homomorphic encryption versus hardware enclaves presents
tradeoffs involving deployment, security, and performance. Regarding performance, it …
tradeoffs involving deployment, security, and performance. Regarding performance, it …
Boomerang:{Metadata-Private} Messaging under Hardware Trust
In end-to-end encrypted (E2EE) messaging systems, protecting communication metadata,
such as who is communicating with whom, at what time, etc., remains a challenging …
such as who is communicating with whom, at what time, etc., remains a challenging …