Discussion & Related

Cipher Maps: When Category Theory Meets Oblivious Computing

Using category theory to formalize oblivious computing through cipher maps and algebraic cipher types, enabling functorial composition of privacy-preserving transformations.

October 14, 2025 · 5 min read

Rethinking Encrypted Search: From Access Pattern Leakage to Information-Theoretic Privacy

Rethinking encrypted search through oblivious types that provide information-theoretic privacy guarantees against access pattern leakage, without relying on computational hardness assumptions.

October 14, 2025 · 4 min read

Discussion