{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:39:37Z","timestamp":1773931177129,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["1104\/23"],"award-info":[{"award-number":["1104\/23"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670350","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"1967-1981","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Distributed PIR: Scaling Private Messaging via the Users' Machines"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-4643-5644","authenticated-orcid":false,"given":"Elkana","family":"Tovey","sequence":"first","affiliation":[{"name":"Hebrew University, Jerusalem, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0559-6903","authenticated-orcid":false,"given":"Jonathan","family":"Weiss","sequence":"additional","affiliation":[{"name":"Hebrew University, Jerusalem, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3475-8322","authenticated-orcid":false,"given":"Yossi","family":"Gilad","sequence":"additional","affiliation":[{"name":"Hebrew University, Jerusalem, Israel"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Ahmad Ishtiyaque","year":"2021","unstructured":"Ishtiyaque Ahmad, Yuntian Yang, Divyakant Agrawal, Amr El Abbadi, and Trinabh Gupta. 2021. Addra: Metadata-private voice communication over fully untrusted infrastructure. In Proceedings of the 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_3_2_1_2_1","unstructured":"Martin Albrecht Melissa Chase Hao Chen Jintai Ding Shafi Goldwasser Sergey Gorbunov Shai Halevi Jeffrey Hoffstein Kim Laine Kristin Lauter Satya Lokam Daniele Micciancio Dustin Moody Travis Morrison Amit Sahai and Vinod Vaikuntanathan. 2018. Homomorphic Encryption Security Standard. Technical Report. HomomorphicEncryption.org Toronto Canada."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 39th IEEE Symposium on Security and Privacy. 962--979","author":"Angel Sebastian","unstructured":"Sebastian Angel, Hao Chen, Kim Laine, and Srinath T. V. Setty. 2018. PIR with Compressed Queries and Amortized Query Processing. In Proceedings of the 39th IEEE Symposium on Security and Privacy. 962--979."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 551--569","author":"Angel Sebastian","year":"2016","unstructured":"Sebastian Angel and Srinath Setty. 2016. Unobservable Communication over Fully Untrusted Infrastructure. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 551--569."},{"key":"e_1_3_2_1_5_1","volume-title":"Groove: Flexible Metadata-Private Messaging. In 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22)","author":"Barman Ludovic","year":"2022","unstructured":"Ludovic Barman, Moshe Kol, David Lazar, Yossi Gilad, and Nickolai Zeldovich. 2022. Groove: Flexible Metadata-Private Messaging. In 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22). 735--750."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484545"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_4"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"e_1_3_2_1_9_1","unstructured":"Benny Chor Niv Gilboa and Moni Naor. 1998. Private Information Retrieval by Keywords. Cryptology ePrint Archive Report 1998\/003."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.27"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866346"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45721-1_3"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0087"},{"key":"e_1_3_2_1_14_1","unstructured":"Leo de Castro and Keewoo Lee. [n. d.]. Verifiability in SimplePIR at No Online Cost for Honest Servers. ([n. d.])."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 5th Workshop on the Economics of Information Security (WEIS).","author":"Dingledine Roger","year":"2006","unstructured":"Roger Dingledine and Nick Mathewson. 2006. Anonymity Loves Company: Usability and the Network Effect. In Proceedings of the 5th Workshop on the Economics of Information Security (WEIS)."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 13th USENIX Security Symposium. 303--320","author":"Dingledine Roger","year":"2004","unstructured":"Roger Dingledine, Nick Mathewson, and Paul Syverson. 2004. Tor: The Secondgeneration Onion Router. In Proceedings of the 13th USENIX Security Symposium. 303--320."},{"key":"e_1_3_2_1_17_1","volume-title":"Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Eskandarian Saba","year":"2021","unstructured":"Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, and Dan Boneh. 2021. Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy. In 30th USENIX Security Symposium (USENIX Security 21). 1775--1792. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/ eskandarian"},{"key":"e_1_3_2_1_18_1","volume-title":"IFIP congress","author":"Freivalds Rusins","unstructured":"Rusins Freivalds. 1977. Probabilistic Machines Can Use Less Running Time.. In IFIP congress, Vol. 839. 842."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338537"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_6"},{"key":"e_1_3_2_1_21_1","volume-title":"The Price of Privacy: Re-Evaluating the NSA. Johns Hopkins Foreign Affairs Symposium. https:\/\/www.youtube.com\/watch?v= kV2HDM86XgI&t=17m50s.","author":"Hayden Michael","year":"2014","unstructured":"Michael Hayden. 2014. The Price of Privacy: Re-Evaluating the NSA. Johns Hopkins Foreign Affairs Symposium. https:\/\/www.youtube.com\/watch?v= kV2HDM86XgI&t=17m50s."},{"key":"e_1_3_2_1_22_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23). 3889--3905. https:\/\/www.usenix.org\/ conference\/usenixsecurity23\/presentation\/henzinger","author":"Henzinger Alexandra","unstructured":"Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, and Vinod Vaikuntanathan. 2023. One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval. In 32nd USENIX Security Symposium (USENIX Security 23). 3889--3905. https:\/\/www.usenix.org\/ conference\/usenixsecurity23\/presentation\/henzinger"},{"key":"e_1_3_2_1_23_1","unstructured":"Bastien Inzaurralde. 2018. The Cybersecurity 202: Leak charges against Treasury official show encrypted apps only as secure as you make them. The Washington Post."},{"key":"e_1_3_2_1_24_1","unstructured":"kate o'flaherty. 2021. All the data WhatsApp and Instagram send to Facebook. wired.co.uk. https:\/\/www.wired.co.uk\/article\/whatsapp-instagram-facebookdata."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Eyal Kushilevitz and Rafail Ostrovsky. 1997. Replication is NOT Needed: SINGLE Database Computationally-Private Information Retrieval. In FOCS. 364--373. http:\/\/www.computer.org\/csdl\/proceedings\/focs\/1997\/8197\/00\/index.html","DOI":"10.1109\/SFCS.1997.646125"},{"key":"e_1_3_2_1_26_1","volume-title":"Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services. In USENIX Security Symposium, Jaeyeon Jung and Thorsten Holz (Eds.). 287--302","author":"Kwon Albert","year":"2015","unstructured":"Albert Kwon, Mashael AlSabah, David Lazar, Marc Dacier, and Srinivas Devadas. 2015. Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services. In USENIX Security Symposium, Jaeyeon Jung and Thorsten Holz (Eds.). 287--302."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132755"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Kwon Albert","year":"2020","unstructured":"Albert Kwon, David Lu, and Srinivas Devadas. 2020. XRD: Scalable Messaging System with Cryptographic Privacy. In Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 711--726","author":"Lazar David","year":"2018","unstructured":"David Lazar, Yossi Gilad, and Nickolai Zeldovich. 2018. Karaoke: Distributed Private Messaging Immune to Passive Traffic Analysis. In Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 711--726."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359648"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 571--586","author":"Lazar David","year":"2016","unstructured":"David Lazar and Nickolai Zeldovich. 2016. Alpenhorn: Bootstrapping Secure Communication Without Leaking Metadata. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 571--586."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564246.3585175"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15802-5_26"},{"key":"e_1_3_2_1_34_1","volume-title":"Measurement Lab: Measure the Internet, save the data, and make it universally accessible and useful. https:\/\/www.measurementlab.net\/.","year":"2023","unstructured":"M-Lab. 2023. Measurement Lab: Measure the Internet, save the data, and make it universally accessible and useful. https:\/\/www.measurementlab.net\/."},{"key":"e_1_3_2_1_35_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Madathil Varun","year":"2022","unstructured":"Varun Madathil, Alessandra Scafuro, Istv\u00e1n Andr\u00e1s Seres, Omer Shlomovits, and Denis Varlakov. 2022. Private signaling. In 31st USENIX Security Symposium (USENIX Security 22). 3309--3326."},{"key":"e_1_3_2_1_36_1","unstructured":"Riana Pfefferkorn. 2021. We Now Know What Information the FBI Can Obtain from Encrypted Messaging Apps. justsecurity.org. https:\/\/www.justsecurity.org\/79549\/we-now-know-what-informationthe- fbi-can-obtain-from-encrypted-messaging-apps\/."},{"key":"e_1_3_2_1_37_1","unstructured":"Andreas Pfitzmann and Marit Hansen. 2010. A terminology for talking about privacy by data minimization: Anonymity Unlinkability Undetectability Unobservability Pseudonymity and Identity Management. https:\/\/api. semanticscholar.org\/CorpusID:150929990"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Tim Ruffing Pedro Moreno-Sanchez and Aniket Kate. 2017. P2P Mixing and Unlinkable Bitcoin Transactions. In NDSS.","DOI":"10.14722\/ndss.2017.23415"},{"key":"e_1_3_2_1_39_1","volume-title":"The Snowden leaks and the public","author":"Rusbridger Alan","unstructured":"Alan Rusbridger. 2013. The Snowden leaks and the public. The New York Review of Books."},{"key":"e_1_3_2_1_40_1","volume-title":"SoK: Metadata-Protecting Communication Systems. Cryptology ePrint Archive","author":"Sasy Sajin","year":"2023","unstructured":"Sajin Sasy and Ian Goldberg. 2023. SoK: Metadata-Protecting Communication Systems. Cryptology ePrint Archive (2023)."},{"key":"e_1_3_2_1_41_1","volume-title":"https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research","author":"SEAL","unstructured":"SEAL 2022. Microsoft SEAL (release 4.0). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research, Redmond, WA.."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11145-7_33"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","unstructured":"Elkana Tovey Jonathan Weiss and Yossi Gilad. 2024. Distributed PIR: Scaling Private Messaging via the Users' Machines. Cryptology ePrint Archive Paper 2024\/978. https:\/\/doi.org\/10.1145\/3658644.3670350 https:\/\/eprint.iacr.org\/2024\/ 978.","DOI":"10.1145\/3658644.3670350"},{"key":"e_1_3_2_1_44_1","unstructured":"Elkana Tovey Jonathan Weiss and Yossi Gilad. 2024. DPIR. https:\/\/doi.org\/10. 5281\/zenodo.11115954"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132783"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833601"},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 179--192","author":"Wolinsky David Isaac","year":"2012","unstructured":"David Isaac Wolinsky, Henry Corrigan-Gibbs, Bryan Ford, and Aaron Johnson. 2012. Dissent in Numbers: Making Strong Anonymity Scale. In Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 179--192."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670350","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670350","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:52:48Z","timestamp":1755841968000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670350"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":47,"alternative-id":["10.1145\/3658644.3670350","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670350","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}