Ian Goldberg

Orcid: 0000-0002-1176-2882

Affiliations:
  • University of Waterloo, Canada


According to our database1, Ian Goldberg authored at least 124 papers between 1996 and 2024.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Awards

ACM Fellow

ACM Fellow 2023, "For contributions to the development and deployment of privacy enhancing technologies".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SoK: Metadata-Protecting Communication Systems.
Proc. Priv. Enhancing Technol., January, 2024

Arctic: Lightweight and Stateless Threshold Schnorr Signatures.
IACR Cryptol. ePrint Arch., 2024

2023
Lox: Protecting the Social Graph in Bridge Distribution.
Proc. Priv. Enhancing Technol., January, 2023

PRAC: Round-Efficient 3-Party MPC for Dynamic Data Structures.
IACR Cryptol. ePrint Arch., 2023

Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks.
IACR Cryptol. ePrint Arch., 2023

A Formal Treatment of Distributed Key Generation, and New Constructions.
IACR Cryptol. ePrint Arch., 2023

Grading on a Curve: How Rust can Facilitate New Contributors while Decreasing Vulnerabilities.
Proceedings of the IEEE Secure Development Conference, 2023

Investigating Membership Inference Attacks under Data Dependencies.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

2022
Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation.
IACR Cryptol. ePrint Arch., 2022

Fast Fully Oblivious Compaction and Shuffling.
IACR Cryptol. ePrint Arch., 2022

Improving the Privacy of Tor Onion Services.
IACR Cryptol. ePrint Arch., 2022

Astrape: Anonymous Payment Channels with Boring Cryptography.
IACR Cryptol. ePrint Arch., 2022

PRSONA: Private Reputation Supporting Ongoing Network Avatars.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022

2021
SoK: Privacy-Preserving Reputation Systems.
Proc. Priv. Enhancing Technol., 2021

Do you feel a chill? Using PIR against chilling effects for censorship-resistant publishing.
IACR Cryptol. ePrint Arch., 2021

ZXAD: Zero-knowledge Exit Abuse Detection for Tor.
IACR Cryptol. ePrint Arch., 2021

ZXAD: High-volume Attack Mitigation for Tor.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

OUStralopithecus: Overt User Simulation for Censorship Circumvention.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation.
Proceedings of the 30th USENIX Security Symposium, 2021

Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved Throughput.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Mitigator: Privacy policy compliance using trusted hardware.
Proc. Priv. Enhancing Technol., 2020

Mind the Gap: Ceremonies for Applied Secret Sharing.
Proc. Priv. Enhancing Technol., 2020

FROST: Flexible Round-Optimized Schnorr Threshold Signatures.
IACR Cryptol. ePrint Arch., 2020

Differentially Private Learning Does Not Bound Membership Inference.
CoRR, 2020

Walking Onions: Scaling Anonymity Networks while Protecting Users.
Proceedings of the 29th USENIX Security Symposium, 2020

Augmented Unlocking Techniques for Smartphones Using Pre-Touch Information.
Proceedings of the SUI '20: Symposium on Spatial User Interaction, Virtual Event, Canada, October 31, 2020

2019
ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments.
Proc. Priv. Enhancing Technol., 2019

2018
Some Results on the Existence of t-All-or-Nothing Transforms Over Arbitrary Alphabets.
IEEE Trans. Inf. Theory, 2018

Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging.
Proc. Priv. Enhancing Technol., 2018

Privacy Pass: Bypassing Internet Challenges Anonymously.
Proc. Priv. Enhancing Technol., 2018

Secure asymmetry and deployability for decoy routing systems.
Proc. Priv. Enhancing Technol., 2018

Style Counsel: Seeing the (Random) Forest for the Trees in Adversarial Code Stylometry.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

High Performance Tor Experimentation from the Magic of Dynamic ELFs.
Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test, 2018

Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion).
Proceedings of the Security Protocols XXVI, 2018

Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices.
Proceedings of the Security Protocols XXVI, 2018

Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Robot Social Engineering: Attacking Human Factors with Non-Human Actors.
Proceedings of the Companion of the 2018 ACM/IEEE International Conference on Human-Robot Interaction, 2018

2017
Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks.
Proceedings of the 26th USENIX Security Symposium, 2017

Live Lesson: Netsim: Network simulation and hacking for high schoolers.
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017

Lavinia: An Audit-Payment Protocol for Censorship-Resistant Storage.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
On Realistically Attacking Tor with Website Fingerprinting.
Proc. Priv. Enhancing Technol., 2016

Lower-Cost ∈-Private Information Retrieval.
Proc. Priv. Enhancing Technol., 2016

SoK: Making Sense of Censorship Resistance Systems.
Proc. Priv. Enhancing Technol., 2016

A Framework for the Game-theoretic Analysis of Censorship Resistance.
Proc. Priv. Enhancing Technol., 2016

Performance and Security Improvements for Tor: A Survey.
ACM Comput. Surv., 2016

Lower-Cost epsilon-Private Information Retrieval.
CoRR, 2016

Elxa: Scalable Privacy-Preserving Plagiarism Detection.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

Red Button and Yellow Button: Usable Security for Lost Security Tokens.
Proceedings of the Security Protocols XXIV, 2016

Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
DP5: A Private Presence Service.
Proc. Priv. Enhancing Technol., 2015

SoK: Secure Messaging.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Leading Johnny to Water: Designing for Usability and Trust.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Sublinear Scaling for Multi-Client Private Information Retrieval.
Proceedings of the Financial Cryptography and Data Security, 2015

Deniable Key Exchanges for Secure Messaging.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Censorship Resistance: Let a Thousand Flowers Bloom?
CoRR, 2014

Effective Attacks and Provable Defenses for Website Fingerprinting.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Electronic privacy and surveillance.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Towards Practical Communication in Byzantine-Resistant DHTs.
IEEE/ACM Trans. Netw., 2013

Anonymity and one-way authentication in key exchange protocols.
Des. Codes Cryptogr., 2013

Improved website fingerprinting on Tor.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Outsourced private information retrieval.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Thinking inside the BLAC box: smarter protocols for faster anonymous blacklisting.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

One (Block) Size Fits All: PIR and SPIR with Variable-Length Records via Multi-Block Queries.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Batch Proofs of Partial Knowledge.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Distributed Key Generation in the Wild.
IACR Cryptol. ePrint Arch., 2012

Optimally Robust Private Information Retrieval.
IACR Cryptol. ePrint Arch., 2012

Changing of the guards: a framework for understanding and improving entry guard selection in tor.
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

Congestion-Aware Path Selection for Tor.
Proceedings of the Financial Cryptography and Data Security, 2012

SkypeMorph: protocol obfuscation for Tor bridges.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Adding query privacy to robust DHTs.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Enhancing Tor's performance using real-time traffic classification.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Generalizing cryptosystems based on the subset sum problem.
Int. J. Inf. Sec., 2011

Provably Secure and Practical Onion Routing.
IACR Cryptol. ePrint Arch., 2011

BridgeSPA: improving Tor bridges with single packet authorization.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

SPEcTRe: spot-checked private ecash tolling at roadside.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Telex: Anticensorship in the Network Infrastructure.
Proceedings of the 20th USENIX Security Symposium, 2011

PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval.
Proceedings of the 20th USENIX Security Symposium, 2011

Extending Nymble-like Systems.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Formalizing Anonymous Blacklisting Systems.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

DefenestraTor: Throwing Out Windows in Tor.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Revisiting the Computational Practicality of Private Information Retrieval.
Proceedings of the Financial Cryptography and Data Security, 2011

Practical PIR for electronic commerce.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Pairing-Based Onion Routing with Improved Forward Secrecy.
ACM Trans. Inf. Syst. Secur., 2010

On message recognition protocols: recoverability and explicit confirmation.
Int. J. Appl. Cryptogr., 2010

Distributed Private-Key Generators for Identity-Based Cryptography.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

Achieving Efficient Query Privacy for Location Based Services.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

Privacy-Preserving Queries over Relational Databases.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

Making a Nymbler Nymble Using VERBS.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

Practical Robust Communication in DHTs Tolerating a Byzantine Adversary.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

An improved algorithm for tor circuit scheduling.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Constant-Size Commitments to Polynomials and Their Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
Using Sphinx to Improve Onion Routing Circuit Construction.
IACR Cryptol. ePrint Arch., 2009

Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography.
IACR Cryptol. ePrint Arch., 2009

Plinko: polling with a physical implementation of a noisy channel.
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009

Improving Tor using a TCP-over-DTLS Tunnel.
Proceedings of the 18th USENIX Security Symposium, 2009

Distributed Key Generation for the Internet.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

Multi-party off-the-record messaging.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
Sphinx: A Compact and Provably Secure Mix Format.
IACR Cryptol. ePrint Arch., 2008

A user study of off-the-record messaging.
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

2007
Improved user authentication in off-the-record messaging.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

Improving the Robustness of Private Information Retrieval.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Louis, Lester and Pierre: Three Protocols for Location Privacy.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

Pairing-Based Onion Routing.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

2006
On the Security of the Tor Authentication Protocol.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

2004
Off-the-record communication, or, why not to use PGP.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

2002
Privacy-Enhancing Technologies for the Internet, II: Five Years Later.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002

Privacy Tradeoffs: Myth or Reality? Panel.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

2001
A Description of Protocols for Private Credentials.
IACR Cryptol. ePrint Arch., 2001

Intercepting mobile communications: the insecurity of 802.11.
Proceedings of the MOBICOM 2001, 2001

A Cryptanalysis of the High-Bandwidth Digital Content Protection System.
Proceedings of the Security and Privacy in Digital Rights Management, 2001

2000
How not to design a privacy system: reflections on the process behind the Freedom product.
Proceedings of the Tenth Conference on Computers, 2000

Proofs of Security for the Unix Password Hashing Algorithm.
Proceedings of the Advances in Cryptology, 2000

1999
The Ninja Jukebox.
Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems, 1999

Reaction Attacks against several Public-Key Cryptosystems.
Proceedings of the Information and Communication Security, Second International Conference, 1999

1998
TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web.
First Monday, 1998

1997
Privacy-enhancing technologies for the Internet.
Proceedings of the Proceedings IEEE COMPCON 97, 1997

1996
A Secure Environment for Untrusted Helper Applications.
Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996, 1996


  Loading...