{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:35:30Z","timestamp":1759336530564,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670280","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"1819-1833","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Precio: Private Aggregate Measurement via Oblivious Shuffling"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-3998-594X","authenticated-orcid":false,"given":"Erik","family":"Anderson","sequence":"first","affiliation":[{"name":"Microsoft, Redmond, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8333-3942","authenticated-orcid":false,"given":"Melissa","family":"Chase","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0701-868X","authenticated-orcid":false,"given":"F. Bet\u00fcl","family":"Durak","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9087-5913","authenticated-orcid":false,"given":"Kim","family":"Laine","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2436-9366","authenticated-orcid":false,"given":"Chenkai","family":"Weng","sequence":"additional","affiliation":[{"name":"Northwestern University, Evanston, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Prio: Privacy Preserving Aggregate Statistics via Boolean Shares. Cryptology ePrint Archive","author":"Addanki Surya","year":"2021","unstructured":"Surya Addanki, Kevin Garbe, Eli Jaffe, Rafail Ostrovsky, and Antigoni Polychroniadou. 2021. Prio: Privacy Preserving Aggregate Statistics via Boolean Shares. Cryptology ePrint Archive (2021)."},{"key":"e_1_3_2_1_2_1","volume-title":"Exposure Notification Privacy-preserving Analytics (ENPA) White Paper. https:\/\/covid19-static.cdn-apple.com\/applications\/covid19\/current\/static\/contact-tracing\/pdf\/ENPA_White_Paper.pdf Retrieved","author":"Google Apple","year":"2023","unstructured":"Apple and Google. [n.,d.]. Exposure Notification Privacy-preserving Analytics (ENPA) White Paper. https:\/\/covid19-static.cdn-apple.com\/applications\/covid19\/current\/static\/contact-tracing\/pdf\/ENPA_White_Paper.pdf Retrieved October 7, 2023 from"},{"key":"e_1_3_2_1_3_1","volume-title":"Verifiable Distributed Aggregation Functions. https:\/\/datatracker.ietf.org\/doc\/draft-irtf-cfrg-vdaf\/ Retrieved","author":"Barnes Richard L.","year":"2023","unstructured":"Richard L. Barnes, Christopher Patton, and Phillipp Schoppmann. [n.,d.]. Verifiable Distributed Aggregation Functions. https:\/\/datatracker.ietf.org\/doc\/draft-irtf-cfrg-vdaf\/ Retrieved October 7, 2023 from"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0033"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132769"},{"volume-title":"Lightweight Techniques for Private Heavy Hitters. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 762--776","author":"Boneh Dan","key":"e_1_3_2_1_6_1","unstructured":"Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, and Yuval Ishai. [n.,d.]. Lightweight Techniques for Private Heavy Hitters. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 762--776."},{"volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on CCS. 1292--1303","author":"Boyle Elette","key":"e_1_3_2_1_7_1","unstructured":"Elette Boyle, Niv Gilboa, and Yuval Ishai. [n.,d.]. Function Secret Sharing: Improvements and Extensions. In Proceedings of the 2016 ACM SIGSAC Conference on CCS. 1292--1303."},{"key":"e_1_3_2_1_8_1","volume-title":"Function Secret Sharing. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 337--367","author":"Boyle Elette","year":"2015","unstructured":"Elette Boyle, Niv Gilboa, and Yuval Ishai. 2015. Function Secret Sharing. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 337--367."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 19th USENIX Conference on Security. USENIX Association.","author":"Burkhart Martin","year":"2010","unstructured":"Martin Burkhart, Mario Strasser, Dilip Many, and Xenofontas Dimitropoulos. 2010. SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics. In Proceedings of the 19th USENIX Conference on Security. USENIX Association."},{"key":"e_1_3_2_1_10_1","unstructured":"Benjamin Case Richa Jain Alex Koshelev Andy Leiserson Daniel Masny Thurston Sandberg Ben Savage Erik Taubeneck Martin Thomson and Taiki Yamaguchi. [n. d.]. Interoperable Private Attribution: A Distributed Attribution and Aggregation Protocol. Cryptology ePrint Archive Paper 2023\/437. https:\/\/eprint.iacr.org\/2023\/437"},{"key":"e_1_3_2_1_11_1","volume-title":"Secret-Shared Shuffle. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 342--372","author":"Chase Melissa","year":"2020","unstructured":"Melissa Chase, Esha Ghosh, and Oxana Poburinnaya. 2020. Secret-Shared Shuffle. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 342--372."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_13"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation. USENIX Association, 259--282","author":"Corrigan-Gibbs Henry","year":"2017","unstructured":"Henry Corrigan-Gibbs and Dan Boneh. 2017. Prio: Private, Robust, and Scalable Computation of Aggregate Statistics. In Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation. USENIX Association, 259--282."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2516930.2516944"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Daniel Demmler Thomas Schneider and Michael Zohner. 2015. ABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.. In NDSS.","DOI":"10.14722\/ndss.2015.23113"},{"key":"e_1_3_2_1_17_1","unstructured":"F. Bet\u00fcl Durak Chenkai Weng Erik Anderson Kim Laine and Melissa Chase. [n. d.]. Precio: Private Aggregate Measurement via Oblivious Shuffling. Cryptology ePrint Archive Paper. https:\/\/eprint.iacr.org\/2021\/1490"},{"volume-title":"Theory of cryptography conference","author":"Dwork Cynthia","key":"e_1_3_2_1_18_1","unstructured":"Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating Noise to Sensitivity in Private Data Analysis. In Theory of cryptography conference. Springer, 265--284."},{"key":"e_1_3_2_1_19_1","first-page":"3","article-title":"The Algorithmic Foundations of Differential Privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork, Aaron Roth, et al. 2014. The Algorithmic Foundations of Differential Privacy. Found. Trends Theor. Comput. Sci., Vol. 9, 3--4 (2014), 211--407.","journal-title":"Found. Trends Theor. Comput. Sci."},{"volume-title":"PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks. In Proceedings of the 2014 ACM SIGSAC Conference on CCS. ACM.","author":"Elahi Tariq","key":"e_1_3_2_1_20_1","unstructured":"Tariq Elahi, George Danezis, and Ian Goldberg. [n.,d.]. PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks. In Proceedings of the 2014 ACM SIGSAC Conference on CCS. ACM."},{"key":"e_1_3_2_1_21_1","volume-title":"Next Steps in Privacy-Preserving Telemetry with Prio. https:\/\/blog.mozilla.org\/security\/2019\/06\/06\/next-steps-in-privacy-preserving-telemetry-with-prio Retrieved","author":"Englehardt Steven","year":"2023","unstructured":"Steven Englehardt. 2019. Next Steps in Privacy-Preserving Telemetry with Prio. https:\/\/blog.mozilla.org\/security\/2019\/06\/06\/next-steps-in-privacy-preserving-telemetry-with-prio Retrieved October 7, 2023 from"},{"key":"e_1_3_2_1_22_1","volume-title":"Privacy Preserving Measurement. https:\/\/datatracker.ietf.org\/doc\/draft-gpew-priv-ppm Retrieved","author":"Geoghegan Tim","year":"2023","unstructured":"Tim Geoghegan, Christopher Patton, Eric Rescorla, and Christopher Wood. [n.,d.]. Privacy Preserving Measurement. https:\/\/datatracker.ietf.org\/doc\/draft-gpew-priv-ppm Retrieved October 7, 2023 from"},{"key":"e_1_3_2_1_23_1","volume-title":"Distributed Point Functions and Their Applications. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 640--658","author":"Gilboa Niv","year":"2014","unstructured":"Niv Gilboa and Yuval Ishai. 2014. Distributed Point Functions and Their Applications. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 640--658."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Oded Goldreich Silvio Micali and Avi Wigderson. 2019. How to Play Any Mental Game or a Completeness Theorem for Protocols with Honest Majority. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali. 307--328.","DOI":"10.1145\/3335741.3335759"},{"volume-title":"Protecting your privacy online. https:\/\/privacysandbox.com. (accessed","year":"2023","key":"e_1_3_2_1_25_1","unstructured":"Google. [n.,d.]. Protecting your privacy online. https:\/\/privacysandbox.com. (accessed: October 7, 2023)."},{"key":"e_1_3_2_1_26_1","unstructured":"Google. 2022. An Implementation of Incremental Distributed Point Functions in C. https:\/\/github.com\/google\/distributed_point_functions commit 88c73a78cd61dacba6d8258f13d0f5dc5f1fb0d2."},{"key":"e_1_3_2_1_27_1","volume-title":"Yin Tat Lee, and Lukas Wutschitz. [n.,d.]. Privacy Random Variable (PRV) Accountant. https:\/\/github.com\/microsoft\/prv_accountant. (accessed","author":"Gopi Sivakanth","year":"2023","unstructured":"Sivakanth Gopi, Yin Tat Lee, and Lukas Wutschitz. [n.,d.]. Privacy Random Variable (PRV) Accountant. https:\/\/github.com\/microsoft\/prv_accountant. (accessed: October 7, 2023)."},{"key":"e_1_3_2_1_28_1","first-page":"11631","article-title":"Numerical Composition of Differential Privacy","volume":"34","author":"Gopi Sivakanth","year":"2021","unstructured":"Sivakanth Gopi, Yin Tat Lee, and Lukas Wutschitz. 2021. Numerical Composition of Differential Privacy. In Advances in Neural Information Processing Systems, Vol. 34. 11631--11642.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_29_1","unstructured":"Yan Huang David Evans and Jonathan Katz. 2012. Private set intersection: Are garbled circuits better than custom protocols'. In NDSS."},{"key":"e_1_3_2_1_30_1","volume-title":"Fault-Tolerant Privacy-Preserving Statistics. In International Symposium on Privacy Enhancing Technologies Symposium. Springer, 221--238","author":"Jawurek Marek","year":"2012","unstructured":"Marek Jawurek and Florian Kerschbaum. 2012. Fault-Tolerant Privacy-Preserving Statistics. In International Symposium on Privacy Enhancing Technologies Symposium. Springer, 221--238."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93638-3_5"},{"volume-title":"Applied Cryptography and Network Security: 20th International Conference, ACNS 2022, Rome, Italy, June 20--23, 2022, Proceedings. Springer-Verlag, 643--662","author":"Lu Yi","key":"e_1_3_2_1_32_1","unstructured":"Yi Lu, Keisuke Hara, Kazuma Ohara, Jacob Schuldt, and Keisuke Tanaka. [n.,d.]. Efficient Two-Party Exponentiation from Quotient Transfer. In Applied Cryptography and Network Security: 20th International Conference, ACNS 2022, Rome, Italy, June 20--23, 2022, Proceedings. Springer-Verlag, 643--662."},{"volume-title":"Proceedings of the 2018 ACM SIGSAC Conference on CCS. 490--507","author":"Mazloom Sahar","key":"e_1_3_2_1_33_1","unstructured":"Sahar Mazloom and S Dov Gordon. [n.,d.]. Secure Computation with Differentially Private Access Patterns. In Proceedings of the 2018 ACM SIGSAC Conference on CCS. 490--507."},{"volume-title":"Make smarter business decisions with actionable insights. https:\/\/www.facebook.com\/business\/measurement. (accessed","year":"2023","key":"e_1_3_2_1_34_1","unstructured":"Meta. [n.,d.]. Make smarter business decisions with actionable insights. https:\/\/www.facebook.com\/business\/measurement. (accessed: October 7, 2023)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423358"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_33"},{"key":"e_1_3_2_1_37_1","volume-title":"International Conference on Artificial Intelligence and Statistics. PMLR, 2557--2565","author":"Medina Andr\u00e9s Mu\u00f1oz","year":"2021","unstructured":"Andr\u00e9s Mu\u00f1oz Medina, Umar Syed, Sergei Vassilvtiskii, and Ellen Vitercik. 2021. Private Optimization without Constraint Violations. In International Conference on Artificial Intelligence and Statistics. PMLR, 2557--2565."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502000"},{"key":"e_1_3_2_1_39_1","unstructured":"Web Platform Incubator Community Group. [n. d.]. Attribution Reporting API with Aggregatable Reports. https:\/\/github.com\/WICG\/conversion-measurement-api\/blob\/main\/AGGREGATE.md"},{"key":"e_1_3_2_1_40_1","unstructured":"Salil Vadhan. [n. d.]. The Complexity of Differential Privacy. https:\/\/privacytools.seas.harvard.edu\/files\/privacytools\/files\/complexityprivacy_1.pdf."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815417"},{"key":"e_1_3_2_1_42_1","unstructured":"IETF working group on Privacy Preserving Measurement. 2022. Privacy Preserving Measurement Protocol. https:\/\/github.com\/abetterinternet\/ppm-specification commit 3aa0e86a4261cd749f5fa0b2569f5a44f482f042."},{"key":"e_1_3_2_1_43_1","volume-title":"27th Annual Symposium on Foundations of Computer Science. IEEE Computer Society, 162--167","author":"Chi-Chih Yao Andrew","year":"1986","unstructured":"Andrew Chi-Chih Yao. 1986. How to Generate and Exchange Secrets. In 27th Annual Symposium on Foundations of Computer Science. IEEE Computer Society, 162--167."},{"volume-title":"Ibex: Privacy-Preserving Ad Conversion Tracking and Bidding. In Proceedings of the 2022 ACM SIGSAC Conference on CCS. 3223--3237","author":"Zhong Ke","key":"e_1_3_2_1_44_1","unstructured":"Ke Zhong, Yiping Ma, and Sebastian Angel. [n.,d.]. Ibex: Privacy-Preserving Ad Conversion Tracking and Bidding. In Proceedings of the 2022 ACM SIGSAC Conference on CCS. 3223--3237."},{"key":"e_1_3_2_1_45_1","volume-title":"20th USENIX Symposium on Networked Systems Design and Implementation. USENIX Association, 825--848","author":"Zhong Ke","year":"2023","unstructured":"Ke Zhong, Yiping Ma, Yifeng Mao, and Sebastian Angel. 2023. Addax: A fast, private, and accountable ad exchange infrastructure. In 20th USENIX Symposium on Networked Systems Design and Implementation. USENIX Association, 825--848."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670280","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:10:04Z","timestamp":1755843004000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670280"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":45,"alternative-id":["10.1145\/3658644.3670280","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670280","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}