Overview
Syllabus
Intro
When an application consumes resources...
Attack on anonymous messengers [WPES '18]
Other examples of resource allocation
Allocation indistinguishability
Avoiding trivial allocators
Easy to distinguish FIFO allocator
Easy to distinguish Random allocator
Giving up work conservation is not enough
It is impossible for an allocator to be private and live unless the number of processes is bounded a priori
Slot-based allocator (bounded universe)
Random w/ dummies (bounded active proc.)
In many settings it is hard to bound #active processes due to, e.g., sybils
Diff. private allocator (bounded active honest)
Comparison of PRA efficiency
Our paper also describes
Taught by
IEEE Symposium on Security and Privacy