放屁多是什么原因呢| 谷字五行属什么| 迎合是什么意思| 甲功五项能查出什么病| 胡人是什么民族| 胃不好喝什么茶好| saucony是什么牌子| 脊柱侧弯是什么原因引起的| 钙化淋巴结是什么意思| 梦见打仗是什么意思| 表哥的儿子叫什么| 手脚心发热是什么原因| 米白色是什么颜色| 耳朵发烫是什么征兆| 囊中之物是什么意思| 4.28是什么星座| 男孩什么时候开始发育| 肠澼是什么意思| 什么的杏花| 辩证思维是什么意思| 宜家宜室什么意思| 强颜欢笑是什么意思| 小儿惊风是什么症状| 流连忘返的返是什么意思| 军长是什么军衔| 童心未眠什么意思| 7月17日是什么日子| 意什么深什么| 红点是什么原因引起的| 脚围指的是什么| 性激素六项什么时候查| 小巧玲珑是什么意思| 下雨为什么会打雷闪电| 脑供血不足做什么检查能查出来| 赞字五行属什么| 什么药可以当饭吃| 跳脱是什么意思| 屁股有痣代表什么| 砧板是什么工作| 不时之需是什么意思| 拔罐对身体有什么好处| 胃发胀是什么原因| 看舌头挂什么科| 宝宝低烧是什么原因引起的| 去新加坡买什么| 锲而不舍是什么生肖| 子宫糜烂有什么症状| t2是什么意思| 2021属什么生肖| 季度是什么意思| 地区和市有什么区别| 酒精过敏是什么症状| 肚脐下三寸是什么位置| cm3是什么单位| 宫缩是什么感觉| 治疗肺部气肿有什么方法| 什么爱心| 一条线是什么意思| 孱弱是什么意思| 手脚抽筋是什么原因| 女性生活疼痛什么原因| 子宫内膜异位是什么原因造成的| 胃体息肉是什么意思| 犹豫不决是什么生肖| 90年属马的是什么命| 乳晕是什么意思| 刚怀孕有什么特征| 头发发黄是什么原因造成的| 三伏是什么时候| 支气管炎用什么药| 吃什么可以补血| 群众路线是什么| 刘禹锡是什么朝代的| 尿酸高有什么症状| 老妈子是什么意思| 手上的三条线分别代表什么| 做梦梦见老婆出轨是什么意思| 目敢念什么| 水饮是什么意思| 作奸犯科是什么意思| 属龙和什么属相相冲| 梦见娃娃是什么意思| 龟头炎看什么科| eft是什么意思| 小便短赤是什么意思| 红配什么颜色最好看| 扁桃体发炎吃什么药好得快| 梦见吃西瓜是什么征兆| 喝温开水有什么好处| cpu是什么意思| 相招是什么意思| 小孩出汗多是什么原因| 什么人不能种生基| 什么是公因数| 孤单是什么意思| 肺不好有什么症状| 奇异果是什么| 敢爱敢恨是什么意思| 慢性咽喉炎吃什么药好| 赵国是现在的什么地方| 吃饭快了有什么坏处| 母子健康手册有什么用| 第一次见家长送什么礼物好| fw什么意思| 脑震荡挂什么科| 白居易是诗什么| 密云有什么好玩的地方| 转移是什么意思| 人潮涌动是什么意思| 以身相许什么意思| 大土土什么字| 不近女色是什么意思| 山楂和什么泡水喝降血压| 血虚是什么原因造成的| 唯心是什么意思| 胸膜炎是什么症状| 六月六吃什么| 吃芒果过敏是什么症状| 170是什么号码| 不什么不| 胸小是缺少什么营养| 比熊吃什么牌子的狗粮好| 古尔邦节什么意思| 抽烟对身体有什么危害| 发offer是什么意思| 胃老是恶心想吐是什么原因| ny是什么品牌| 什么颜色有助于睡眠| 空心人是什么意思| 什么食物可以化解结石| 最近老是犯困想睡觉是什么原因| 被电击后身体会有什么后遗症| 左下腹疼痛挂什么科| 乳房胀痛是什么原因| 孕妇适合喝什么茶| 雅五行属什么| 蚕蛹过敏什么办法最快| 不规则抗体筛查是什么意思| 嘴唇干燥是什么原因| 什么食物属于发物| 夜盲症是什么| 盆底肌高张是什么意思| 春什么秋什么| 做一半就软了是什么原因| 面膜什么时候敷效果最好| 腹部胀气吃什么药| 吃什么补维生素a| 补铁有什么作用和功效| 血糖高可以喝什么饮料| 月经期间适合吃什么食物| alin是什么意思| 多吃玉米有什么好处和坏处| 什么是甲醛| 咳嗽嗓子有痰吃什么药| 婴儿打嗝是什么原因| 癞蛤蟆长什么样| 下嘴唇起泡是什么原因| 做梦流产了是什么意思| 麦克白夫人什么意思| 青核桃皮的功效与作用是什么| 梦见蔬菜是什么预兆| 腰疼挂什么科| 牛油果不能和什么一起吃| 错位是什么意思| 维u是什么药| 荨麻疹吃什么药好| 梦见买鸡蛋是什么意思周公解梦| 为什么会卵巢早衰| 雄激素过高是什么意思| hello什么意思| 脊柱侧弯是什么原因引起的| 大牛是什么意思| 白癜风是什么原因引起的| 都市丽人是什么意思| 中药地龙是什么| 6.3是什么星座| 代谢慢吃什么效果最快| 表头是什么| 炎症是什么意思| 孕妇有血窦要注意什么| 同型半胱氨酸高有什么症状| 做ct挂什么科| 基因突变发生在什么时期| 涤纶是什么面料| pph是什么材料| 哈密瓜为什么叫哈密瓜| 牛尾炖什么最好| 月经期间吃什么水果好| 迷津是什么意思| 什么叫自负| 过期的酸奶有什么用| 什么是笑气| 水肿是什么病| 肌肤之钥是什么档次| 心慌意乱是什么意思| 2020年属什么| c02是什么意思| 什么的饰品| 小孩下半夜咳嗽是什么原因| 糖尿病人吃什么水果最好| dw手表属于什么档次| 同位分是什么意思| 自信是什么| 不什么一什么| 鸡杂是什么| 肾结石可以喝什么饮料| 纹理是什么意思| 胰腺炎是什么引起的| 八月八日是什么星座| 6.29什么星座| 栩是什么意思| 吞咽困难是什么原因造成的| 什么是穿刺| 心梗吃什么药效果好| 临床医学是干什么的| 鸵鸟心态什么意思| 罕见是什么意思| 经典什么意思| 糖尿病早期什么症状| 不什么其什么| 激光是什么| 女人40不惑什么意思| 舌头干是什么原因| 十指连心是什么意思| 胃窦在胃的什么位置| 四月23日是什么星座| 丝状疣是什么原因长出来的| 六月十二日是什么日子| 什么是黑咖啡| 上腹疼是什么原因| 止境是什么意思| 溃疡性结肠炎吃什么药| 女人消瘦应该检查什么| 一路繁花的意思是什么| 孕早期吃什么有利于胎心胎芽发育| hbeag是什么意思| 旦角是什么意思| 什么什么欲什么成语| 嘴唇发紫黑是什么原因| 项羽是什么生肖| 奇花初胎矞矞皇皇是什么意思| 验孕棒两条杠什么意思| 杏仁有什么作用和功效| 漏斗胸是什么病| 六六无穷是什么意思| 尿检蛋白质弱阳性是什么意思| 鱼什么时候产卵| 10.8号是什么星座| 肺活量是什么意思| 肝脏b超能检查出什么| 体检前三天不能吃什么| 结肠ca是什么意思| 吃完头孢不能吃什么| 牙龈上火肿痛吃什么药| 阳历5月20日是什么星座| 预后是什么意思| 断头婚是什么意思| 性生活频繁有什么危害| 前列腺肥大是什么症状| 火乐念什么| 甜菜根在中国叫什么| 11月7日什么星座| 女性尿频尿急吃什么药| 高压低是什么原因引起的| 百度
Skip to main content

Eighth Beijing Intl Film Festival jury includes Wong Kar

Meeting Minutes Privacy Enhancements and Assessments Research Group (pearg) RG
Date and time 2025-08-05 04:00
Title Minutes IETF116: pearg: Wed 04:00
State Active
Other versions markdown
Last updated 2025-08-05
百度 交行必须坚持总行党委总揽全局、协调各方的作用,落实好总行党委和各级党委脱贫攻坚一把手负责制,总分行扶贫工作领导小组成员单位要落实好工作职责,加强部门联动、行际联动,层层压实脱贫攻坚责任,确保各项扶贫工作落到实处。

minutes-116-pearg-202303290400-00

Chair welcome ("PearG"):
Note well / Wear masks, in person.

Draft updates (5 mins)

  • RG draft statuses

    • IP Address Privacy Considerations:

      • No recent updates since the last meeting, but updates coming
        soon
    • Censorship:

      • Recent update
    • Numeric IDs

      • Sent to RFC editor
    • Safe Internet measurements:

      • Review
      • Maybe interesting for PPM, as well

Presentations (100 mins)

  • Interoperable Private Attribution (Martin Thomson) - 30 mins

    • Attribtion: important piece of the ad industry
    • Trains!
    • Let's talk about the Tokyo subway system
    • Actually, let's talk about identifiers, like access cards (e.g.,
      PASMO)
    • Using passenger tracking for the purpose of capacity planning,
      performance, etc.
    • Specifically, for systems that track when a person enters the
      system and when the person exits
    • But logs are a privacy risk and can be used for other purposes,
      even if they are inherently pseudonymous - identities could be
      linked.
    • Can we create a design that aggregates the data that's
      interesting, and provides individual privacy?
    • One design is using tokens with buckets
    • Tokens need to be:

      • anonymous
      • authenticated
      • time-delayed "opening"/redemption
      • ephemeral
    • Moving on to advertising

    • Attribution: information from one context and linking it in a
      different context
    • Answer a question: "How many people saw the ad, then came to the
      show?"
    • Understanding whether certain advertising is working:

      • good placment
      • creatives
      • how much to spend
      • how long to run campaigns
    • Current, cross-context attribution allows linking people across
      contexts

    • With advertising, the context is everything:

      • Whether an ad was shown, and if that ad was clicked
      • Was a product puchased, or not
      • where was the ad shown
    • Interoperable Private Attribtion (IPA)

      • People have an identifier (significant protections against
        revealing the identifier)
      • Sites can request an encrypted and secret-share of that
        identifier
      • Sites have a view of the identifier, but it's not linkable
        cross-site
    • Attribution in MPC (multi-party computation)

      • sites gather events
      • MPC decrypts identifiers and performs attribution
      • aggregated results are the output (histogram)
    • MPC does not, itself, see the original query

    • MPC:

      • Any computation if you only need addition and multiplication
      • It can be expensive
      • IPA uses a three-party, honest-majority threat model
    • Differential Privacy

      • (epsilon, delta)-DP for hiding individual contributions
      • Every site gets a query budget that renews each epoch (e.g.,
        week)
      • This does provide leakage across time (epochs), more
        research needed in this area
      • Parameters are not fixed yet
    • Client's encrypted identifiers are bound to a site, they are
      bound to:

      • the site that requested them
      • the epoch/week they are requested
      • the type of event: source (ad), trigger (purchase)
    • IPA: advances and challenges

      • IPA's flexibility provides somewhat of a drop-in replacment
        for current anti-fraud systems
      • IPA's flexibility hurts accountability

        • Existing challenge in making the system auditable
      • MPC performance is a challenge, especially at the scale of
        10s of billions

    • Status: Good progress, overall, but still requires research in
      some areas

    • Currently running some synthetic trials
    • Ongoing work in W3C working groups, protocol may come to PPM in
      the future

    • Brian Trammel: MPC performance is a challenge. Computation or
      communication complexity?

    • MT: A lot is algorithmic (linear), but some of that will likely
      improved, but much of it is communication cost. Originally,
      records were working on the order of ~40GB, but it's still
      mutli-gigabytes in size
    • Chris Wood: 1) What was the MPC functionality you needed (as
      defined by the existing adtech industry), 2) Now that
      functionality is defined, and how you implement. How did you
      reach this design?
    • MT: Need more time. Lots of people took the steps to get here.
      Apple's PCM took an initial approach. This is mostly about
      understanding how the advertising industry uses measurement as a
      core part of their processes. There is a "need" vs. "want"
      different of perspective by different parties, and those
      discussions are on-going. If you add cross-device attribution,
      it gets more complicated.
    • CW: There is an academic research community that has spent a lot
      of time designing MPC protocols. There seems to be some overlap
      and collaboration opportunity here.
    • Shivan: Who would run the servers in the MPC protocol?
    • MT: We need to trust them to not collude - to be determined
    • Jonathan Hoyland: If it's run by a third-party that is running
      an auction, what are the guarantees that they're actually
      running the MPC protocol
    • MT: Currently leaning on the oversight / auditing.
    • JH: Can the response include a proof?
    • MT: Recently asked if Verifiable MPC was considered - but VMPC
      is not ready yet. So, "trust and verify" is the current approach
  • Secure Partitioning Protocols (Phillipp Schoppmann) - 20 mins

    • Let's go more into details for scaling aggregation computations
    • Billions of impressions from billions of clients
    • ALl clients submit their reports to the MPC cluster
    • MPC outputs the aggregate results
    • Goals

      • When sharding the MPC cluster, every client must use the
        same shard
      • We need a private mechanism for mapping one client to the
        same shard
      • This should have low communication cost
      • "correctness" must not be affected
    • Assumptions:

      • Bound on the number of contribitions
      • Many clients, fewer shards
    • Blueprint: partitioning from distributed OPRFs

      • client has an index (i), and payload (v)
      • One server has an OPRF key (server 1)
      • Other server (server 2) will learn the result of OPRF
        computation
      • server 1 must add some padding queries
      • Server 2's output of OPRF is used for mapping client to
        target partition
    • Dense Partitioning: OPRF Output = Shard ID

    • If there are only a small set of shards, then this is reasonable
    • Sparse Partitioning: OPRF Output = Random Client ID

      • Can the client's reports be aggregated before the MPC
        computation?
      • This doesn't result in creating a client identifier because
        server 1 pads the set of known client identifier if dummy
        values, so server 2 can't distinguish between real users and
        fake users
    • How can the sparse histogram be private without seeing the
      actual histogram?

      • View the output of the OPRF as a histogram
      • Make sure frequency can't be linked to specific users
      • Choose a threshold, below threshold add dummy values, above
        threshold [..] (?)
    • Conclusion: efficient for these use cases

    • Next steps: Is there general interest? Are there other protocols
      where this might be useful? Are there other properties that are
      needed?

    • Chris Patton: Definitely interesting, but maybe not as an
      independent draft

    • PS: So, add this into individual drafts, instead of making a
      general purpose protocol
    • CP: Yes
    • Martin Thomson: The bounds seem to be fundemental. How confident
      are you that these are required costs?
    • PS: The numbers are not the absolute lower bound, they are based
      on the curent design described in this presentation
    • MT: IPA may not be able to set an upper bound on the number of
      contributions, for example due to a Sybil attack
    • PS: While any party can create reports, but fraudulent reports
      may be able to be filtered downstream
  • DP3T: Deploying decentralized, privacy-preserving proximity tracing
    (Wouter Lueks) - 25 mins

    • D3-PT, started back in March 2020, first draft in May 2020,
      September 2020 - Summer 2021 working on presence tracing
    • Non-traditional academic environment - scaling to millions of
      users on a small timescale
    • Relying on existing infrastructure had a large impact
    • The system was designed that they were purpose-built and
      couldn't be re-used for other purposes
    • Risks associated with digital contact tracing:

      • Must embed social contact / graph
      • location tracing
      • medical information
      • social interactions
      • social control risk
    • Time has shown what can go wrong with designs/deployments like
      this

      • Police departments in crime solving
      • data leaks
      • harassment of specific subgroups
    • It is very important that systems should be designed with
      purpose-limitations in mind, so they can't be easily abused in
      other ways

    • Relying on existing infrastructure, using phones with BTLE
      sending beacons
    • Proximity can be derived based on the beacons they saw
    • Exposure notification works by the set intersection of beacons
      the person (who tested positive) saw and all of the identifiers
      that another person broadcast
    • The design of these beacon broadcasts required that the OS
      vendor must be involved
    • While the design was relatively simple, relying on existing
      hardware made the situation more difficult/complicated
    • The result of collaboration with Google/Apple, was the
      Google/Apple Exposure Notification (GAEN) Framework/API
    • For full effect, you need privacy at all layers of the stack,
      including the bluetooth protocl stack

      • MAC address must rotate at the same time as the beacons
    • Similarly, at the network layer, a network adversary can detect
      uploading the report of seen beacon identifiers (when reporting
      covid positive) - CH used dummy uploads to hide

    • Lessons learned:

      • Purpose limitations
      • context matters (how/where they are deployed)
      • Privacy at all layers
    • Tommy Pauly: More comment than questions: for privacy at all
      layers, Apple is routing upload report through iCPR

    • WL: While this is great, there might be other sidechannels we
      need to look at
    • XXX: How do you authenticate IDs?
    • WL: There isn't any binding, but the upload requires knowing the
      underlying seed from which the beacon was derived
    • Chris Wood: What would've an ideal interface looked like, and
      how would you've designed it differently?
    • WL: The strictness provided protections, but it introduced
      challenges, as well. There isn't an easy answer.
  • LogPicker: Strengthening Certificate Transparency Against Covert
    Adversaries (Alexandra Dirksen) - 25 mins

    • HTTPS is mostly a default now (90%+ of all page loads are http
      in chrome)
    • CAs are the trust anchors of the Web PKI
    • There are recent illicit certificate creations, and seemingly
      increasing

      • WoSign
      • Digicert
      • Diginotar
      • Comodo
      • TurkTrust
    • For rogue certificates, where you get a certificate for a domain
      that you don't own (e.g., HTTPS interception)

    • In the attacker scenario, a covert attacker obtaining a rogue
      certificate
    • Certificate transparency overview
    • CT is still vulnerable to this attack

      • All logs belong to a CA vendor
      • First compromise was in 2020
      • vulnerable to collaboration attacks
      • vulnerable to split view attack
    • Gossip is proposed as a mitigation for Split View attacks

    • LogPicker: a decentralized approach

      • CA contacts one log (leader) from a large set of logs (log
        pool)
      • Leader then contacts the other logs in the pool
      • the pool then selects one log, at random
      • The selected log includes the certificate in its merkle tree
      • The logs that participated in choosing the log create a
        proof, and that proof is aggregated and sent back to the CA
        for inclusion in the certificate
    • This design meets the goals

    • Chris Wood: The log pool uses an election protocol?
    • AD: Yes, two protocols
    • CW: Have you looked at alternative solutions that use threshold
      signing?
    • AD: The aggregated signature uses BLS, but which signature
      scheme is used is not strictly defined
一什么嘴巴 鱼生是什么 岳云鹏什么学历 脚底灼热是什么原因 什么是丹凤眼
亲故是什么意思 包皮长什么样 坐骨神经吃什么药效果最好 脑血管痉挛是什么症状 阿奇霉素主治什么
阴茎硬度不够吃什么药 滴虫是什么 剑桥英语和新概念英语有什么区别 白加黑是什么药 五一广场有什么好玩的
炼乳是什么东西 窘迫是什么意思 ige是什么 杀阴虱用什么药最好 补充公积金是什么意思
心血管堵塞吃什么药hcv7jop6ns6r.cn 鸡婆什么意思hcv9jop6ns0r.cn 看心脏挂什么科hcv9jop6ns7r.cn 嘴巴里面起泡是什么原因引起的liaochangning.com 头皮痒用什么药hcv9jop1ns4r.cn
比基尼是什么意思inbungee.com 印尼用什么货币hcv9jop8ns2r.cn 天气一热身上就痒是什么原因hcv7jop5ns0r.cn 头上爱出汗是什么原因beikeqingting.com 风风火火是什么生肖hcv7jop4ns6r.cn
肝阴虚吃什么中成药hcv7jop9ns7r.cn 什么的小学生hcv9jop0ns9r.cn 美国为什么不敢动朝鲜hcv8jop1ns5r.cn 月经有黑色血块是什么原因hcv7jop5ns0r.cn 蛇吃什么东西hcv9jop5ns3r.cn
梅毒和艾滋病有什么区别hcv8jop9ns1r.cn 肌层回声不均匀是什么意思xinjiangjialails.com 不停的打嗝是什么原因hcv8jop1ns4r.cn 明天属什么生肖tiangongnft.com 身体发凉是什么原因hcv8jop7ns6r.cn
百度