Discussion & Related
Cipher Maps: When Category Theory Meets Oblivious Computing
Using category theory to formalize oblivious computing through cipher maps and algebraic cipher types, enabling functorial composition of privacy-preserving transformations.
October 14, 2025 · 5 min read
Rethinking Encrypted Search: From Access Pattern Leakage to Information-Theoretic Privacy
Rethinking encrypted search through oblivious types that provide information-theoretic privacy guarantees against access pattern leakage, without relying on computational hardness assumptions.
October 14, 2025 · 4 min read