{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T13:50:53Z","timestamp":1774965053672,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1717132"],"award-info":[{"award-number":["1717132"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,30]]},"DOI":"10.1145\/3620678.3624647","type":"proceedings-article","created":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T13:58:07Z","timestamp":1698760687000},"page":"65-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Oblivious Paxos"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5936-5264","authenticated-orcid":false,"given":"Fadhil I.","family":"Kurnia","sequence":"first","affiliation":[{"name":"University of Massachusetts Amherst, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7512-3374","authenticated-orcid":false,"given":"Arun","family":"Venkataramani","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, United States"}]}],"member":"320","published-online":{"date-parts":[[2023,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417261"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319893"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3135974.3135988"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243841"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354207"},{"key":"e_1_3_2_1_6_1","unstructured":"Stephen Beechen. 2022. Home Assistant Google Drive Backup. https:\/\/habackup.io\/"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535929"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352610"},{"key":"e_1_3_2_1_9_1","volume-title":"PFire-wall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection. In The Network and Distributed System Security Symposium (NDSS)","author":"Chi Haotian","year":"2022","unstructured":"Haotian Chi, Qiang Zeng, Xiaojiang Du, and Lannan Luo. 2022. PFire-wall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection. In The Network and Distributed System Security Symposium (NDSS) 2021."},{"key":"e_1_3_2_1_10_1","unstructured":"CloudLab. 2023. https:\/\/www.cloudlab.us\/."},{"key":"e_1_3_2_1_11_1","volume-title":"14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)","author":"Corrigan-Gibbs Henry","year":"2017","unstructured":"Henry Corrigan-Gibbs and Dan Boneh. 2017. Prio: Private, Robust, and Scalable Computation of Aggregate Statistics. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). USENIX Association, Boston, MA, 259--282."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229565.3229567"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2685616"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"David Evans Vladimir Kolesnikov Mike Rosulek et al. 2018. A pragmatic introduction to secure multi-party computation. Foundations and Trends\u00ae in Privacy and Security 2 2-3 (2018) 70--246.","DOI":"10.1561\/3300000019"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35362-8_15"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28416"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14778\/3329772.3329779"},{"key":"e_1_3_2_1_20_1","volume-title":"Scalable and Private Media Consumption with Popcorn. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)","author":"Gupta Trinabh","year":"2016","unstructured":"Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath Setty, Lorenzo Alvisi, and Michael Walfish. 2016. Scalable and Private Media Consumption with Popcorn. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). USENIX Association, Santa Clara, CA, 91--107."},{"key":"e_1_3_2_1_21_1","unstructured":"Hashicorp. 2023. Vault by HashiCorp. https:\/\/vaultproject.io\/."},{"key":"e_1_3_2_1_22_1","unstructured":"Hashicorp. 2023. Vault's Shamir Implementation. https:\/\/github.com\/hashicorp\/vault\/tree\/main\/shamir."},{"key":"e_1_3_2_1_23_1","unstructured":"Home Assistant. 2023. https:\/\/home-assistant.io\/."},{"key":"e_1_3_2_1_24_1","volume-title":"Flexible Paxos: Quorum Intersection Revisited. In 20th International Conference on Principles of Distributed Systems.","author":"Howard Heidi","year":"2017","unstructured":"Heidi Howard, Dahlia Malkhi, and Alexander Spiegelman. 2017. Flexible Paxos: Quorum Intersection Revisited. In 20th International Conference on Principles of Distributed Systems."},{"key":"e_1_3_2_1_25_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Hu Yuncong","year":"2020","unstructured":"Yuncong Hu, Sam Kumar, and Raluca Ada Popa. 2020. Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). 851--877."},{"key":"e_1_3_2_1_26_1","unstructured":"Hubitat. 2023. https:\/\/hubitat.com\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958223"},{"key":"e_1_3_2_1_28_1","volume-title":"Annual international cryptology conference","author":"Krawczyk Hugo","unstructured":"Hugo Krawczyk. 1993. Secret sharing made short. In Annual international cryptology conference. Springer, 136--146."},{"key":"e_1_3_2_1_29_1","unstructured":"Fadhil I. Kurnia. 2022. Go-Shamir: Fast Shamir Secret Sharing in Pure Go. https:\/\/github.com\/fadhilkurnia\/shamir."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Fadhil I. Kurnia. 2023. Oblivious Paxos and Fast Oblivious Paxos Prototype. https:\/\/opaxos.github.io\/.","DOI":"10.1145\/3620678.3624647"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Fadhil I. Kurnia and Arun Venkataramani. 2023. Oblivious Paxos: Privacy-Preserving Consensus Over Secret-Shares (Extended Version). University of Massachusetts Technical Report UM-CS-2023-001. Amherst MA USA.","DOI":"10.1145\/3620678.3624647"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2003.1233705"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"key":"e_1_3_2_1_34_1","first-page":"4","article-title":"Paxos Made Simple","volume":"32","author":"Lamport Leslie","year":"2001","unstructured":"Leslie Lamport. 2001. Paxos Made Simple. ACM SIGACT News (Distributed Computing Column) 32, 4 (Whole Number 121, December 2001) (2001), 51--58.","journal-title":"ACM SIGACT News (Distributed Computing Column)"},{"key":"e_1_3_2_1_35_1","unstructured":"Leslie Lamport. 2005. Generalized Consensus and Paxos. (2005)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-006-0005-x"},{"key":"e_1_3_2_1_37_1","volume-title":"6th Symposium on Operating Systems Design & Implementation (OSDI 04)","author":"Li Jinyuan","year":"2004","unstructured":"Jinyuan Li, Maxwell Krohn, David Mazi\u00e8res, and Dennis Shasha. 2004. Secure Untrusted Data Repository (SUNDR). In 6th Symposium on Operating Systems Design & Implementation (OSDI 04). USENIX Association, San Francisco, CA."},{"key":"e_1_3_2_1_38_1","volume-title":"20th USENIX Symposium on Networked Systems Design and Implementation.","author":"Liagouris John","year":"2023","unstructured":"John Liagouris, Vasiliki Kalavri, Muhammad Faisal, and Mayank Varia. 2023. SECRECY: Secure collaborative analytics in untrusted clouds. In 20th USENIX Symposium on Networked Systems Design and Implementation."},{"key":"e_1_3_2_1_39_1","unstructured":"Linux strace. 2023. https:\/\/linux.die.net\/man\/1\/strace."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2015.71"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3456629"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2366231.2337173"},{"key":"e_1_3_2_1_43_1","volume-title":"OKAPI: in support of application correctness in smart home environments. In 2019 fourth international conference on fog and mobile edge computing (FMEC)","author":"Melissaris Themis","unstructured":"Themis Melissaris, Kelly Shaw, and Margaret Martonosi. 2019. OKAPI: in support of application correctness in smart home environments. In 2019 fourth international conference on fog and mobile edge computing (FMEC). IEEE, 173--180."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354198"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2517350"},{"key":"e_1_3_2_1_46_1","volume-title":"SOPS: Secrets OPerationS. https:\/\/github.com\/mozilla\/sops.","year":"2023","unstructured":"Mozilla. 2023. SOPS: Secrets OPerationS. https:\/\/github.com\/mozilla\/sops."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600212.2600218"},{"key":"e_1_3_2_1_48_1","volume-title":"2014 USENIX Annual Technical Conference (USENIX ATC 14)","author":"Ongaro Diego","year":"2014","unstructured":"Diego Ongaro and John Ousterhout. 2014. In Search of an Understandable Consensus Algorithm. In 2014 USENIX Annual Technical Conference (USENIX ATC 14). USENIX Association, Philadelphia, PA, 305--319."},{"key":"e_1_3_2_1_49_1","volume-title":"USENIX Security Symposium. 2129--2146","author":"Poddar Rishabh","year":"2021","unstructured":"Rishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, and Joseph M Hellerstein. 2021. Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics.. In USENIX Security Symposium. 2129--2146."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_1_51_1","volume-title":"Building Web Applications on Top of Encrypted Data Using Mylar. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)","author":"Popa Raluca Ada","year":"2014","unstructured":"Raluca Ada Popa, Emily Stark, Steven Valdez, Jonas Helfer, Nickolai Zeldovich, and Hari Balakrishnan. 2014. Building Web Applications on Top of Encrypted Data Using Mylar. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14). USENIX Association, Seattle, WA, 157--172."},{"key":"e_1_3_2_1_52_1","unstructured":"Klaus Post. 2023. Reed-Solomon. https:\/\/github.com\/klauspost\/reedsolomon."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355577"},{"key":"e_1_3_2_1_54_1","unstructured":"Rhasspy. 2023. Rhasspy Voice Assistant. http:\/\/rhasspy.org\/."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_57_1","volume-title":"Communication theory of secrecy systems. The Bell system technical journal 28, 4","author":"Shannon Claude E","year":"1949","unstructured":"Claude E Shannon. 1949. Communication theory of secrecy systems. The Bell system technical journal 28, 4 (1949), 656--715."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3211890.3211896"},{"key":"e_1_3_2_1_59_1","volume-title":"Proceedings of the 2005 ACM Workshop on Storage Security and Survivability","author":"Subbiah Arun","unstructured":"Arun Subbiah and Douglas M. Blough. 2005. An Approach for Fault Tolerant and Secure Data Storage in Collaborative Work Environments. In Proceedings of the 2005 ACM Workshop on Storage Security and Survivability (Fairfax, VA, USA) (StorageSS '05). Association for Computing Machinery, New York, NY, USA, 84--93."},{"key":"e_1_3_2_1_60_1","volume-title":"Fifteenth symposium on usable privacy and security (SOUPS","author":"Tabassum Madiha","year":"2019","unstructured":"Madiha Tabassum, Tomasz Kosinski, and Heather Richter Lipford. 2019. \"I don't own the data\": End User Perceptions of Smart Home Device Data Practices and Risks. In Fifteenth symposium on usable privacy and security (SOUPS 2019). 435--450."},{"key":"e_1_3_2_1_61_1","unstructured":"TPC. 2023. TPC-C: On-Line Transaction Processing Benchmark. https:\/\/www.tpc.org\/tpcc\/"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24097"},{"key":"e_1_3_2_1_63_1","volume-title":"Near-Optimal Latency Versus Cost Tradeoffs in Geo-Distributed Storage. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Uluyol Muhammed","year":"2020","unstructured":"Muhammed Uluyol, Anthony Huang, Ayush Goel, Mosharaf Chowdhury, and Harsha V Madhyastha. 2020. Near-Optimal Latency Versus Cost Tradeoffs in Geo-Distributed Storage. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). 157--180."},{"key":"e_1_3_2_1_64_1","volume-title":"COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 1528--1528","author":"Vassantlal Robin","year":"2022","unstructured":"Robin Vassantlal, Eduardo Alchieri, Bernardo Ferreira, and Alysson Bessani. 2022. COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 1528--1528."},{"key":"e_1_3_2_1_65_1","volume-title":"Hassio Add-ons: Auto backup.","author":"Der Veldt Marcel Van","year":"2019","unstructured":"Marcel Van Der Veldt. 2019. Hassio Add-ons: Auto backup."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303982"},{"key":"e_1_3_2_1_67_1","unstructured":"Vorion. 2020. Create Automated Backups Every Day."},{"key":"e_1_3_2_1_68_1","volume-title":"13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)","author":"Wang Frank","year":"2016","unstructured":"Frank Wang, James Mickens, Nickolai Zeldovich, and Vinod Vaikuntanathan. 2016. Sieve: Cryptographically enforced access control for user data in untrusted clouds. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). 611--626."},{"key":"e_1_3_2_1_69_1","volume-title":"Splinter: Practical Private Queries on Public Data. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)","author":"Wang Frank","year":"2017","unstructured":"Frank Wang, Catherine Yun, Shafi Goldwasser, Vinod Vaikuntanathan, and Matei Zaharia. 2017. Splinter: Practical Private Queries on Public Data. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). USENIX Association, Boston, MA, 299--313."},{"key":"e_1_3_2_1_70_1","volume-title":"CRaft: An Erasure-coding-supported Version of Raft for Reducing Storage Cost and Network Cost. In 18th USENIX Conference on File and Storage Technologies (FAST 20)","author":"Wang Zizhong","year":"2020","unstructured":"Zizhong Wang, Tongliang Li, Haixia Wang, Airan Shao, Yunren Bai, Shangming Cai, Zihan Xu, and Dongsheng Wang. 2020. CRaft: An Erasure-coding-supported Version of Raft for Reducing Storage Cost and Network Cost. In 18th USENIX Conference on File and Storage Technologies (FAST 20). 297--308."}],"event":{"name":"SoCC '23: ACM Symposium on Cloud Computing","location":"Santa Cruz CA USA","acronym":"SoCC '23","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 2023 ACM Symposium on Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620678.3624647","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3620678.3624647","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T15:54:21Z","timestamp":1755878061000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620678.3624647"}},"subtitle":["Privacy-Preserving Consensus Over Secret-Shares"],"short-title":[],"issued":{"date-parts":[[2023,10,30]]},"references-count":70,"alternative-id":["10.1145\/3620678.3624647","10.1145\/3620678"],"URL":"https:\/\/doi.org\/10.1145\/3620678.3624647","relation":{},"subject":[],"published":{"date-parts":[[2023,10,30]]},"assertion":[{"value":"2023-10-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}