爱哭的人是什么性格| 涸的意思是什么| 莳字五行属什么| 盗汗吃什么药| 做ct挂什么科| 脑多普勒检查什么| 副省长是什么级别| 小腿肌肉痛什么原因| 巫是什么意思| 肿瘤病人不能吃什么| 冰箱为什么不制冷了| 应激是什么意思| 为什么拉绿色的屎| 用进废退是什么意思| 一月十七是什么星座| 梦见好多葡萄是什么意思| 老舍的原名是什么| 李维斯属于什么档次| 牙疼吃什么药好| 6是什么意思网络语言| 10.30什么星座| 三十六计最后一计是什么| 反流性食管炎吃什么中药| 开字五行属什么| col是什么的缩写| 三五成群十双在是什么生肖| 皮肤变白是什么原因| 五戒十善是什么| 为什么喜欢你| 有胃病的人吃什么最养胃| 教唆是什么意思| rp是什么意思| 甲减挂什么科| Mo什么元素| 什么品牌镜片好| 注解是什么意思| 梦见偷菜是什么意思| 口臭吃什么药效果最好| 上火吃什么食物| 牛油果有什么营养| 临床是什么意思| 疑虑是什么意思| 左腹部是什么器官| 左眼跳女人是什么预兆| 跛行是什么意思| 荨麻疹能吃什么食物| gold是什么意思| puppies什么意思| 泌尿是什么意思| 985是什么意思| 眼拙是什么意思| 风向是什么意思| 绿色食品是什么| 奔走相告的走是什么意思| 层峦叠翠的意思是什么| 喝藿香正气水不能吃什么| 脚麻木是什么原因引起的| 小孩打喷嚏流鼻涕吃什么药| 骨相美是什么意思| 看痔疮挂什么科| 什么叫支原体阳性| 衣带渐宽终不悔是什么意思| 下颌关节紊乱挂什么科| 介入室是干什么的| 用什么泡脚可以活血化瘀疏通经络| 一百万存款算什么水平| 治标不治本是什么意思| 打强心针意味着什么| 4月1日什么星座| 铎读什么| 安阳车牌号是豫什么| 鸭肉和什么不能一起吃| 肝不好吃什么中成药| 脑干堵塞什么症状| 棉涤是什么面料| 感冒适合吃什么水果| 瞳距是什么意思| 吃什么最补血| 做什么运动能瘦肚子| 福州立冬吃什么| 面部痉挛是什么原因引起的| 大头菜是什么菜| 喝什么能减肥| 红花跟藏红花有什么区别| iu是什么意思| 死鬼什么意思| 妨父母痣是什么意思| 万力什么字| 以纯属于什么档次| 什么是棱长| 血气分析是检查什么的| sama是什么药| 男人硬不起来该吃什么药| 丁克是什么| 减肥期间吃什么最好| 办幼儿园需要什么证| 懋是什么意思| 怀孕感冒可以吃什么药| 黑裙配什么颜色的上衣| 柯基犬为什么要断尾巴| 什么是寓言故事| 布洛芬起什么作用| 抄送和密送是什么意思| dcr是什么意思| gl值是什么意思| 斐乐什么档次| 女生学什么专业好| 什么人不能摆放大象| 俄罗斯是什么洲| 火旺是什么意思| 白头翁幼鸟吃什么| 疲软是什么意思| 男人蛋皮痒用什么药| 为什么说尽量不戴脚链| 葡萄糖高是什么原因| 岳飞是什么生肖| 高血压挂什么科| 脂肪瘤去医院挂什么科| 久视伤血是什么意思| 卫衣是什么| 什么叫环比什么叫同比| 睡眠时间短早醒是什么原因| 血糖血脂挂什么科| 柒牌男装什么档次| 晓五行属性是什么| 寒战是什么症状| hz是什么意思| 有编制是什么意思| 睡莲为什么叫睡莲| 饮用水是什么水| 暨怎么读什么意思| 小肝功能是检查什么| 穷凶极恶是什么生肖| 肾炎是什么原因引起的| 秦二世为什么姓胡| 里急后重吃什么药最好| 开黑是什么意思| 女人吃什么养颜又美白| 男人耳朵大代表什么| 糜烂型脚气用什么药最好| 火耗归公是什么意思| 总胆固醇高忌口什么| 月和什么有关| 幽门螺旋杆菌是什么| 虫加合念什么| sherpa是什么面料| 复方乙酰水杨酸片是什么药| 内热是什么原因引起的怎么调理| 绕行是什么意思| 什么的兵马俑| 发烧吃什么退烧药| 国家副主席是什么级别| 人为什么| 农历5月20日是什么星座| prada是什么品牌| 传教士是什么姿势| 六字真言是什么| 鸡肉不能和什么一起吃| 霍山石斛有什么功效| 全职太太是什么意思| 梦见买面条有什么预兆| 手心有痣代表什么意思| 裙带菜是什么菜| 月经没来吃什么药可以催月经来| 升米恩斗米仇是什么意思| 鸽子拉绿稀便是什么病| 梦见莲藕是什么意思| 房颤与早搏有什么区别| 颈动脉斑块挂什么科| 小龙女叫什么名字| 什么细节能感动摩羯男| 回光返照是什么意思| 冤家路窄是什么生肖| 精神内科一般检查什么| 中医四诊指的是什么| 准生证需要什么材料| 舌苔白吃什么药| 宫颈炎吃什么药最好| 太极是什么| 大便出血什么原因| 胃囊肿是什么病严重吗| t是什么火车| 血管瘤是什么病严重吗| 玛瑙五行属什么| 哼唧是什么意思| 健身前吃什么比较好| 清风明月是什么意思| 接待是什么意思| 什么样的贝壳| 痰是棕色的是什么原因| 胃痛去药店买什么药| 过敏性紫癜千万不能用什么药| 头晕为什么做眼震检查| 如火如荼是什么意思| 医院体检挂什么科| 农历今天属什么生肖| 章鱼吃什么食物| 消融术是什么手术| 巳时是什么时辰| 补休是什么意思| 大肠头是什么部位| 万劫不复什么意思| xyz是什么意思| 中耳炎不能吃什么食物| 阿司匹林什么时候吃最好| 为什么不建议打水光针| 恩师是什么意思| 刘备是什么样的人| 禁的拼音是什么| 难以启齿是什么意思| ym是什么衣服品牌| 毕业穿的衣服叫什么| 避孕药什么时候吃有效| 公积金取出来有什么影响| 久字五行属什么| 堂哥的女儿叫什么| vintage什么意思| 癫是什么意思| 石五行属什么| 怀孕肚子疼是什么原因| 白球比低是什么原因| 边缘是什么意思| 鸡蛋胶是什么鱼胶| 全青皮是什么皮| 什么是鼻息肉| 小孩发烧吃什么药| 梅花代表什么象征意义| 高铁与动车有什么区别| 屌丝男是什么意思| 放荡不羁爱自由什么意思| 不疼不痒的红疹是什么| 烤瓷牙和全瓷牙有什么区别| aape是什么牌子| 三竖一横念什么| 八岁属什么生肖| 总警司相当于大陆什么官| 车加昆念什么| 蒙古族的那达慕大会是在什么时候| birads3类是什么意思| 心脏疼痛挂什么科| 脑干出血是什么原因| 豆支念什么| 打呼噜的原因是什么| 一月来两次月经是什么原因| 啼笑皆非的意思是什么| 农村一般喂金毛吃什么| 1991年什么命| 无异于是什么意思| 割韭菜什么意思| 溜车是什么意思| 月桂酰两性基乙酸钠是什么| 绿杨春属于什么茶| 痛经吃什么药好| 黄雀是什么鸟| 小孩嗓子哑了吃什么药| 肝低回声结节是什么意思| 什么是初吻| 尿素氮偏低是什么意思| 荷花是什么季节| 固涩是什么意思| 梦见捡钱是什么预兆| 消停是什么意思| 西席是什么意思| 河豚是什么意思| 百度
Skip to main content

探访中古友谊眼科医院:古巴医生的“中国情”

Meeting Minutes Privacy Enhancements and Assessments Research Group (pearg) RG
Date and time 2025-08-07 04:00
Title Minutes IETF116: pearg: Wed 04:00
State Active
Other versions markdown
Last updated 2025-08-07
百度 一场败仗对于摆烂的湖人实则是好事,毕竟灰熊、公牛等球队的疯狂摆烂态势更加丧心病狂,但库兹马也抓住英格拉姆养伤间隙,继续在首发之位打出给力表现,同时也是不断创造属于他的荣耀纪录,从而确定未来在湖人阵容当中的主力地位。

minutes-116-pearg-202303290400-00

Chair welcome ("PearG"):
Note well / Wear masks, in person.

Draft updates (5 mins)

  • RG draft statuses

    • IP Address Privacy Considerations:

      • No recent updates since the last meeting, but updates coming
        soon
    • Censorship:

      • Recent update
    • Numeric IDs

      • Sent to RFC editor
    • Safe Internet measurements:

      • Review
      • Maybe interesting for PPM, as well

Presentations (100 mins)

  • Interoperable Private Attribution (Martin Thomson) - 30 mins

    • Attribtion: important piece of the ad industry
    • Trains!
    • Let's talk about the Tokyo subway system
    • Actually, let's talk about identifiers, like access cards (e.g.,
      PASMO)
    • Using passenger tracking for the purpose of capacity planning,
      performance, etc.
    • Specifically, for systems that track when a person enters the
      system and when the person exits
    • But logs are a privacy risk and can be used for other purposes,
      even if they are inherently pseudonymous - identities could be
      linked.
    • Can we create a design that aggregates the data that's
      interesting, and provides individual privacy?
    • One design is using tokens with buckets
    • Tokens need to be:

      • anonymous
      • authenticated
      • time-delayed "opening"/redemption
      • ephemeral
    • Moving on to advertising

    • Attribution: information from one context and linking it in a
      different context
    • Answer a question: "How many people saw the ad, then came to the
      show?"
    • Understanding whether certain advertising is working:

      • good placment
      • creatives
      • how much to spend
      • how long to run campaigns
    • Current, cross-context attribution allows linking people across
      contexts

    • With advertising, the context is everything:

      • Whether an ad was shown, and if that ad was clicked
      • Was a product puchased, or not
      • where was the ad shown
    • Interoperable Private Attribtion (IPA)

      • People have an identifier (significant protections against
        revealing the identifier)
      • Sites can request an encrypted and secret-share of that
        identifier
      • Sites have a view of the identifier, but it's not linkable
        cross-site
    • Attribution in MPC (multi-party computation)

      • sites gather events
      • MPC decrypts identifiers and performs attribution
      • aggregated results are the output (histogram)
    • MPC does not, itself, see the original query

    • MPC:

      • Any computation if you only need addition and multiplication
      • It can be expensive
      • IPA uses a three-party, honest-majority threat model
    • Differential Privacy

      • (epsilon, delta)-DP for hiding individual contributions
      • Every site gets a query budget that renews each epoch (e.g.,
        week)
      • This does provide leakage across time (epochs), more
        research needed in this area
      • Parameters are not fixed yet
    • Client's encrypted identifiers are bound to a site, they are
      bound to:

      • the site that requested them
      • the epoch/week they are requested
      • the type of event: source (ad), trigger (purchase)
    • IPA: advances and challenges

      • IPA's flexibility provides somewhat of a drop-in replacment
        for current anti-fraud systems
      • IPA's flexibility hurts accountability

        • Existing challenge in making the system auditable
      • MPC performance is a challenge, especially at the scale of
        10s of billions

    • Status: Good progress, overall, but still requires research in
      some areas

    • Currently running some synthetic trials
    • Ongoing work in W3C working groups, protocol may come to PPM in
      the future

    • Brian Trammel: MPC performance is a challenge. Computation or
      communication complexity?

    • MT: A lot is algorithmic (linear), but some of that will likely
      improved, but much of it is communication cost. Originally,
      records were working on the order of ~40GB, but it's still
      mutli-gigabytes in size
    • Chris Wood: 1) What was the MPC functionality you needed (as
      defined by the existing adtech industry), 2) Now that
      functionality is defined, and how you implement. How did you
      reach this design?
    • MT: Need more time. Lots of people took the steps to get here.
      Apple's PCM took an initial approach. This is mostly about
      understanding how the advertising industry uses measurement as a
      core part of their processes. There is a "need" vs. "want"
      different of perspective by different parties, and those
      discussions are on-going. If you add cross-device attribution,
      it gets more complicated.
    • CW: There is an academic research community that has spent a lot
      of time designing MPC protocols. There seems to be some overlap
      and collaboration opportunity here.
    • Shivan: Who would run the servers in the MPC protocol?
    • MT: We need to trust them to not collude - to be determined
    • Jonathan Hoyland: If it's run by a third-party that is running
      an auction, what are the guarantees that they're actually
      running the MPC protocol
    • MT: Currently leaning on the oversight / auditing.
    • JH: Can the response include a proof?
    • MT: Recently asked if Verifiable MPC was considered - but VMPC
      is not ready yet. So, "trust and verify" is the current approach
  • Secure Partitioning Protocols (Phillipp Schoppmann) - 20 mins

    • Let's go more into details for scaling aggregation computations
    • Billions of impressions from billions of clients
    • ALl clients submit their reports to the MPC cluster
    • MPC outputs the aggregate results
    • Goals

      • When sharding the MPC cluster, every client must use the
        same shard
      • We need a private mechanism for mapping one client to the
        same shard
      • This should have low communication cost
      • "correctness" must not be affected
    • Assumptions:

      • Bound on the number of contribitions
      • Many clients, fewer shards
    • Blueprint: partitioning from distributed OPRFs

      • client has an index (i), and payload (v)
      • One server has an OPRF key (server 1)
      • Other server (server 2) will learn the result of OPRF
        computation
      • server 1 must add some padding queries
      • Server 2's output of OPRF is used for mapping client to
        target partition
    • Dense Partitioning: OPRF Output = Shard ID

    • If there are only a small set of shards, then this is reasonable
    • Sparse Partitioning: OPRF Output = Random Client ID

      • Can the client's reports be aggregated before the MPC
        computation?
      • This doesn't result in creating a client identifier because
        server 1 pads the set of known client identifier if dummy
        values, so server 2 can't distinguish between real users and
        fake users
    • How can the sparse histogram be private without seeing the
      actual histogram?

      • View the output of the OPRF as a histogram
      • Make sure frequency can't be linked to specific users
      • Choose a threshold, below threshold add dummy values, above
        threshold [..] (?)
    • Conclusion: efficient for these use cases

    • Next steps: Is there general interest? Are there other protocols
      where this might be useful? Are there other properties that are
      needed?

    • Chris Patton: Definitely interesting, but maybe not as an
      independent draft

    • PS: So, add this into individual drafts, instead of making a
      general purpose protocol
    • CP: Yes
    • Martin Thomson: The bounds seem to be fundemental. How confident
      are you that these are required costs?
    • PS: The numbers are not the absolute lower bound, they are based
      on the curent design described in this presentation
    • MT: IPA may not be able to set an upper bound on the number of
      contributions, for example due to a Sybil attack
    • PS: While any party can create reports, but fraudulent reports
      may be able to be filtered downstream
  • DP3T: Deploying decentralized, privacy-preserving proximity tracing
    (Wouter Lueks) - 25 mins

    • D3-PT, started back in March 2020, first draft in May 2020,
      September 2020 - Summer 2021 working on presence tracing
    • Non-traditional academic environment - scaling to millions of
      users on a small timescale
    • Relying on existing infrastructure had a large impact
    • The system was designed that they were purpose-built and
      couldn't be re-used for other purposes
    • Risks associated with digital contact tracing:

      • Must embed social contact / graph
      • location tracing
      • medical information
      • social interactions
      • social control risk
    • Time has shown what can go wrong with designs/deployments like
      this

      • Police departments in crime solving
      • data leaks
      • harassment of specific subgroups
    • It is very important that systems should be designed with
      purpose-limitations in mind, so they can't be easily abused in
      other ways

    • Relying on existing infrastructure, using phones with BTLE
      sending beacons
    • Proximity can be derived based on the beacons they saw
    • Exposure notification works by the set intersection of beacons
      the person (who tested positive) saw and all of the identifiers
      that another person broadcast
    • The design of these beacon broadcasts required that the OS
      vendor must be involved
    • While the design was relatively simple, relying on existing
      hardware made the situation more difficult/complicated
    • The result of collaboration with Google/Apple, was the
      Google/Apple Exposure Notification (GAEN) Framework/API
    • For full effect, you need privacy at all layers of the stack,
      including the bluetooth protocl stack

      • MAC address must rotate at the same time as the beacons
    • Similarly, at the network layer, a network adversary can detect
      uploading the report of seen beacon identifiers (when reporting
      covid positive) - CH used dummy uploads to hide

    • Lessons learned:

      • Purpose limitations
      • context matters (how/where they are deployed)
      • Privacy at all layers
    • Tommy Pauly: More comment than questions: for privacy at all
      layers, Apple is routing upload report through iCPR

    • WL: While this is great, there might be other sidechannels we
      need to look at
    • XXX: How do you authenticate IDs?
    • WL: There isn't any binding, but the upload requires knowing the
      underlying seed from which the beacon was derived
    • Chris Wood: What would've an ideal interface looked like, and
      how would you've designed it differently?
    • WL: The strictness provided protections, but it introduced
      challenges, as well. There isn't an easy answer.
  • LogPicker: Strengthening Certificate Transparency Against Covert
    Adversaries (Alexandra Dirksen) - 25 mins

    • HTTPS is mostly a default now (90%+ of all page loads are http
      in chrome)
    • CAs are the trust anchors of the Web PKI
    • There are recent illicit certificate creations, and seemingly
      increasing

      • WoSign
      • Digicert
      • Diginotar
      • Comodo
      • TurkTrust
    • For rogue certificates, where you get a certificate for a domain
      that you don't own (e.g., HTTPS interception)

    • In the attacker scenario, a covert attacker obtaining a rogue
      certificate
    • Certificate transparency overview
    • CT is still vulnerable to this attack

      • All logs belong to a CA vendor
      • First compromise was in 2020
      • vulnerable to collaboration attacks
      • vulnerable to split view attack
    • Gossip is proposed as a mitigation for Split View attacks

    • LogPicker: a decentralized approach

      • CA contacts one log (leader) from a large set of logs (log
        pool)
      • Leader then contacts the other logs in the pool
      • the pool then selects one log, at random
      • The selected log includes the certificate in its merkle tree
      • The logs that participated in choosing the log create a
        proof, and that proof is aggregated and sent back to the CA
        for inclusion in the certificate
    • This design meets the goals

    • Chris Wood: The log pool uses an election protocol?
    • AD: Yes, two protocols
    • CW: Have you looked at alternative solutions that use threshold
      signing?
    • AD: The aggregated signature uses BLS, but which signature
      scheme is used is not strictly defined
查岗是什么意思 什么叫生化 寓言故事有什么特点 pv是什么材质 结核病是什么病
沉香是什么味道 脚发胀是什么前兆 6月6日是什么星座 内裤上有黄色分泌物是什么原因 麦是什么意思
直男癌是什么意思 胃疼吃什么药效果好 老年人心慌是什么原因 血压低吃什么好 爱是什么排比句
老鼠喜欢吃什么 飞机下降时耳朵疼是什么原因 带状疱疹长什么样 烂嘴角是缺什么维生素 女生私处长什么样
低密度脂蛋白高的原因是什么hcv7jop4ns5r.cn 麦是什么意思hcv8jop7ns8r.cn 骨钙素低是什么原因youbangsi.com 小猫的特点是什么0297y7.com 胸口闷挂什么科hcv9jop2ns1r.cn
除湿气喝什么茶hcv7jop4ns7r.cn 嗓子哑了吃什么药hcv8jop9ns5r.cn 日本人为什么喜欢喝冰水hcv9jop3ns4r.cn 葵瓜子吃多了有什么危害hcv7jop5ns6r.cn 什么的春天hcv9jop3ns9r.cn
社区医院属于什么级别hcv8jop8ns7r.cn 肌酐高不能吃什么hcv8jop1ns4r.cn 蜥蜴什么动物baiqunet.com 什么样的充电宝能带上飞机hcv7jop6ns1r.cn 天空蓝是什么颜色1949doufunao.com
b族维生素什么时候吃效果最好hcv8jop5ns9r.cn 十月份出生的是什么星座hcv7jop4ns7r.cn 槟榔肝是由什么引起的hcv9jop2ns1r.cn 眼皮为什么会跳hcv8jop8ns7r.cn 赵丽颖原名叫什么hcv7jop6ns3r.cn
百度