Search engines and recommendation systems are central to how we interact in the Internet, but they pose significant privacy risks. Even when they are assumed secure, information (such as search queries, click behavior, and recommendation interactions) can be used to track, profile, and infer sensitive information. Private Information Retrieval (PIR) offers a promising solution, enabling users to query and retrieve information without revealing their interests.

This talk will explore the foundations of PIR, its recent advancements, and its practical applications in search engines and recommendation systems. We will discuss how PIR can be integrated into large-scale systems while balancing efficiency and usability. We will also outline key challenges (such as deployment barriers, economic feasibility, and open research problems) that need to be addressed for PIR to become a widely adopted privacy-enhancing technology.

Speaker's Biography: Sofía Celi is a Senior Cryptography Researcher at Brave, specializing in privacy-enhancing technologies, post-quantum cryptography, and secure communication systems. She is a member of the Advisory Council at the Open Technology Fund (OTF) and holds leadership roles within the IETF, IRTF, and W3C. Sofía has also provided expert consultations for the United Nations and human rights organizations, focusing on the intersection of emerging technologies and digital rights.

As a co-founder of Criptolatinos and Women in Cryptography, Sofía is committed to fostering diversity in cryptography and security. She is actively engaged in the academic community, serving as a member of the Latincrypt Steering Committee, Publicity Co-Chair of the PETS Symposium, IACR ePrint Co-Editor, and IEEE Security & Privacy Ethics Co-Chair.
Sofía has received the Distinguished Paper Award at IEEE S&P, was a runner-up for the Best Paper Award at ESORICS and for the Pwnie Award.

Sofía lives with her amazing partner, Jurre van Bergen, and has two beloved dogs.

View More Papers

The Skeleton Keys: A Large Scale Analysis of Credential...

Yizhe Shi (Fudan University), Zhemin Yang (Fudan University), Kangwei Zhong (Fudan University), Guangliang Yang (Fudan University), Yifan Yang (Fudan University), Xiaohan Zhang (Fudan University), Min Yang (Fudan University)

Read More

Probe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing

Ruyi Ding (Northeastern University), Tong Zhou (Northeastern University), Lili Su (Northeastern University), Aidong Adam Ding (Northeastern University), Xiaolin Xu (Northeastern University), Yunsi Fei (Northeastern University)

Read More

ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted...

Myungsuk Moon (Yonsei University), Minhee Kim (Yonsei University), Joonkyo Jung (Yonsei University), Dokyung Song (Yonsei University)

Read More

Try to Poison My Deep Learning Data? Nowhere to...

Yansong Gao (The University of Western Australia), Huaibing Peng (Nanjing University of Science and Technology), Hua Ma (CSIRO's Data61), Zhi Zhang (The University of Western Australia), Shuo Wang (Shanghai Jiao Tong University), Rayne Holland (CSIRO's Data61), Anmin Fu (Nanjing University of Science and Technology), Minhui Xue (CSIRO's Data61), Derek Abbott (The University of Adelaide, Australia)

Read More