Search engines and recommendation systems are central to how we interact in the Internet, but they pose significant privacy risks. Even when they are assumed secure, information (such as search queries, click behavior, and recommendation interactions) can be used to track, profile, and infer sensitive information. Private Information Retrieval (PIR) offers a promising solution, enabling users to query and retrieve information without revealing their interests.

This talk will explore the foundations of PIR, its recent advancements, and its practical applications in search engines and recommendation systems. We will discuss how PIR can be integrated into large-scale systems while balancing efficiency and usability. We will also outline key challenges (such as deployment barriers, economic feasibility, and open research problems) that need to be addressed for PIR to become a widely adopted privacy-enhancing technology.

Speaker's Biography: Sofía Celi is a Senior Cryptography Researcher at Brave, specializing in privacy-enhancing technologies, post-quantum cryptography, and secure communication systems. She is a member of the Advisory Council at the Open Technology Fund (OTF) and holds leadership roles within the IETF, IRTF, and W3C. Sofía has also provided expert consultations for the United Nations and human rights organizations, focusing on the intersection of emerging technologies and digital rights.

As a co-founder of Criptolatinos and Women in Cryptography, Sofía is committed to fostering diversity in cryptography and security. She is actively engaged in the academic community, serving as a member of the Latincrypt Steering Committee, Publicity Co-Chair of the PETS Symposium, IACR ePrint Co-Editor, and IEEE Security & Privacy Ethics Co-Chair.
Sofía has received the Distinguished Paper Award at IEEE S&P, was a runner-up for the Best Paper Award at ESORICS and for the Pwnie Award.

Sofía lives with her amazing partner, Jurre van Bergen, and has two beloved dogs.

View More Papers

TZ-DATASHIELD: Automated Data Protection for Embedded Systems via Data-Flow-Based...

Zelun Kong (University of Texas at Dallas), Minkyung Park (University of Texas at Dallas), Le Guan (University of Georgia), Ning Zhang (Washington University in St. Louis), Chung Hwan Kim (University of Texas at Dallas)

Read More

RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial...

Dzung Pham (University of Massachusetts Amherst), Shreyas Kulkarni (University of Massachusetts Amherst), Amir Houmansadr (University of Massachusetts Amherst)

Read More

Be Careful of What You Embed: Demystifying OLE Vulnerabilities

Yunpeng Tian (Huazhong University of Science and Technology), Feng Dong (Huazhong University of Science and Technology), Haoyi Liu (Huazhong University of Science and Technology), Meng Xu (University of Waterloo), Zhiniang Peng (Huazhong University of Science and Technology; Sangfor Technologies Inc.), Zesen Ye (Sangfor Technologies Inc.), Shenghui Li (Huazhong University of Science and Technology), Xiapu Luo…

Read More

Work-in-Progress: Detecting Browser-in-the-Browser Attacks from Their Behaviors and DOM...

Ryusei Ishikawa, Soramichi Akiyama, and Tetsutaro Uehara (Ritsumeikan University)

Read More