This paper introduces protocols for _authenticated_ private information retrieval. These schemes enable a client
to fetch a record from a remote database server such that (a) the server does not learn which record the client reads,
and (b) the …
This paper introduces a new approach to reduce end-to-end costs in large-scale replicated systems built under a Byzantine fault model. Specifically, our approach transforms a given replicated state machine (RSM) to another RSM where nodes incur lower …
Software-update mechanisms are critical to the security of modern systems, but their typically centralized
design presents a lucrative and frequently attacked target. In this work, we propose CHAINIAC,
a decentralized software-update framework that …