CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Communications of the ACM
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Efficient oblivious transfer protocols
SODA '01 Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms
The free haven project: distributed anonymous storage service
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Tangler: a censorship-resistant publishing system based on document entanglements
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Tarzan: a peer-to-peer anonymizing network layer
Proceedings of the 9th ACM conference on Computer and communications security
Protecting Free Expression Online with Freenet
IEEE Internet Computing
Repudiative information retrieval
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
FOCS '02 Proceedings of the 43rd Symposium on Foundations of Computer Science
Oblivious Transfer with Adaptive Queries
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Non-Interactive Oblivious Transfer and Spplications
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Infranet: Circumventing Web Censorship and Surveillance
Proceedings of the 11th USENIX Security Symposium
All-or-Nothing Encryption and the Package Transform
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Mnemosyne: Peer-to-Peer Steganographic Storage
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
FOCS '95 Proceedings of the 36th Annual Symposium on Foundations of Computer Science
Replication is not needed: single database, computationally-private information retrieval
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Off-the-record communication, or, why not to use PGP
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
A data-oriented (and beyond) network architecture
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Towards a theory of data entanglement
Theoretical Computer Science
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Computationally private information retrieval with polylogarithmic communication
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Arguments for an information-centric internetworking architecture
ACM SIGCOMM Computer Communication Review
Information-centric networking: seeing the forest for the trees
Proceedings of the 10th ACM Workshop on Hot Topics in Networks
A survey of mobility in information-centric networks: challenges and research directions
Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design - Architecture, Algorithms, and Applications
Privacy risks in named data networking: what is the cost of performance?
ACM SIGCOMM Computer Communication Review
Protecting access privacy of cached contents in information centric networks
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Less pain, most of the gain: incrementally deployable ICN
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Proceedings of the 22nd international conference on World Wide Web companion
PIT overload analysis in content centric networks
Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking
Privacy in content-oriented networking: threats and countermeasures
ACM SIGCOMM Computer Communication Review
Hi-index | 0.00 |
The recent literature has hailed the benefits of content-oriented network architectures. However, such designs pose a threat to privacy by revealing a user's content requests. In this paper, we study how to ameliorate privacy in such designs. We present an approach that does not require any special infrastructure or shared secrets between the publishers and consumers of content. In lieu of any informational asymmetry, the approach leverages computational asymmetry by forcing the adversary to perform sizable computations to reconstruct each request. This approach does not provide ideal privacy, but makes it hard for an adversary to effectively monitor the content requests of a large number of users.