Discussion & Related
Cipher Maps: Category Theory Meets Oblivious Computing
Formalizing oblivious computing through cipher maps and algebraic cipher types, using category theory for functorial composition of privacy-preserving transformations.
October 14, 2025 · 4 min read
Encrypted Search and Oblivious Types
Oblivious types give encrypted search information-theoretic privacy against access pattern leakage. No ORAM, no computational hardness assumptions. Here's how.
October 14, 2025 · 4 min read