Discussion & Related

Cipher Maps: Category Theory Meets Oblivious Computing

Formalizing oblivious computing through cipher maps and algebraic cipher types, using category theory for functorial composition of privacy-preserving transformations.

October 14, 2025 · 4 min read

Encrypted Search and Oblivious Types

Oblivious types give encrypted search information-theoretic privacy against access pattern leakage. No ORAM, no computational hardness assumptions. Here's how.

October 14, 2025 · 4 min read

Discussion