Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where T.-H. Hubert Chan is active.

Publication


Featured researches published by T.-H. Hubert Chan.


international conference on the theory and application of cryptology and information security | 2011

Oblivious RAM with o((logn) 3 ) worst-case cost

Elaine Shi; T.-H. Hubert Chan; Emil Stefanov; Mingfei Li

Oblivious RAM is a useful primitive that allows a client to hide its data access patterns from an untrusted server in storage outsourcing applications. Until recently, most prior works on Oblivious RAM aim to optimize its amortized cost, while suffering from linear or even higher worst-case cost. Such poor worst-case behavior renders these schemes impractical in realistic settings, since a data access request can occasionally be blocked waiting for an unreasonably large number of operations to complete. This paper proposes novel Oblivious RAM constructions that achieves poly-logarithmic worst-case cost, while consuming constant client-side storage. To achieve the desired worst-case asymptotic performance, we propose a novel technique in which we organize the O-RAM storage into a binary tree over data buckets, while moving data blocks obliviously along tree edges.


ACM Transactions on Information and System Security | 2011

Private and Continual Release of Statistics

T.-H. Hubert Chan; Elaine Shi; Dawn Song

We ask the question: how can Web sites and data aggregators continually release updated statistics, and meanwhile preserve each individual user’s privacy? Suppose we are given a stream of 0’s and 1’s. We propose a differentially private continual counter that outputs at every time step the approximate number of 1’s seen thus far. Our counter construction has error that is only poly-log in the number of time steps. We can extend the basic counter construction to allow Web sites to continually give top-k and hot items suggestions while preserving users’ privacy.


symposium on discrete algorithms | 2005

On hierarchical routing in doubling metrics

T.-H. Hubert Chan; Anupam Gupta; Bruce M. Maggs; Shuheng Zhou

We study the problem of routing in doubling metrics, and show how to perform hierarchical routing in such metrics with small stretch and compact routing tables (i.e., with small amount of routing information stored at each vertex). We say that a metric (<i>X, d</i>) has <i>doubling dimension</i> dim(<i>X</i>) at most α if every set of diameter <i>D</i> can be covered by 2<sup>α</sup> sets of diameter <i>D</i>/2. (A <i>doubling metric</i> is one whose doubling dimension dim(<i>X</i>) is a constant.) We show how to perform (1 + τ)-stretch routing on metrics for any 0 < <i>T</i> ≤ 1 with routing tables of size at most (α/τ)<sup><i>O</i>(α)</sup> log<sup>2</sup> Δ bits with only (α/τ)<sup><i>O</i>(α)</sup> log Δ <i>entries</i>, where Δ is the diameter of the graph; hence the number of routing table entries is just τ<sup>-<i>O</i>(1)</sup> log Δ for doubling metrics. These results extend and improve on those of Talwar (2004).We also give better constructions of sparse <i>spanners</i> for doubling metrics than those obtained from the routing tables above; for τ > 0, we give algorithms to construct (1 + τ)-stretch spanners for a metric (<i>X, d</i>) with maximum degree at most (2 + 1/τ)<sup><i>O</i>(dim(<i>X</i>))</sup>, matching the results of Das et al. for Euclidean metrics.


financial cryptography | 2012

Privacy-Preserving Stream Aggregation with Fault Tolerance

T.-H. Hubert Chan; Elaine Shi; Dawn Song

We consider applications where an untrusted aggregator would like to collect privacy sensitive data from users, and compute aggregate statistics periodically. For example, imagine a smart grid operator who wishes to aggregate the total power consumption of a neighborhood every ten minutes; or a market researcher who wishes to track the fraction of population watching ESPN on an hourly basis.


Journal of the ACM | 2018

Path ORAM: An Extremely Simple Oblivious RAM Protocol

Emil Stefanov; Marten van Dijk; Elaine Shi; T.-H. Hubert Chan; Christopher W. Fletcher; Ling Ren; Xiangyao Yu; Srinivas Devadas

We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme known to date with small client storage. We formally prove that Path ORAM has a O(log N) bandwidth cost for blocks of size B = Ω (log2 N) bits. For such block sizes, Path ORAM is asymptotically better than the best-known ORAM schemes with small client storage. Due to its practicality, Path ORAM has been adopted in the design of secure processors since its proposal.


computer and communications security | 2015

Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound

Xiao Wang; T.-H. Hubert Chan; Elaine Shi

We propose a new tree-based ORAM scheme called Circuit ORAM. Circuit ORAM makes both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM shows that the well-known Goldreich-Ostrovsky logarithmic ORAM lower bound is tight under certain parameter ranges, for several performance metrics. Therefore, we are the first to give an answer to a theoretical challenge that remained open for the past twenty-seven years. Second, Circuit ORAM earns its name because it achieves (almost) optimal circuit size both in theory and in practice for realistic choices of block sizes. We demonstrate compelling practical performance and show that Circuit ORAM is an ideal candidate for secure multi-party computation applications.


privacy enhancing technologies | 2012

Differentially private continual monitoring of heavy hitters from distributed streams

T.-H. Hubert Chan; Mingfei Li; Elaine Shi; Wenchang Xu

We consider applications scenarios where an untrusted aggregator wishes to continually monitor the heavy-hitters across a set of distributed streams. Since each stream can contain sensitive data, such as the purchase history of customers, we wish to guarantee the privacy of each stream, while allowing the untrusted aggregator to accurately detect the heavy hitters and their approximate frequencies. Our protocols are scalable in settings where the volume of streaming data is large, since we guarantee low memory usage and processing overhead by each data source, and low communication overhead between the data sources and the aggregator.


international conference on database theory | 2010

Aggregate queries for discrete and continuous probabilistic XML

Serge Abiteboul; T.-H. Hubert Chan; Evgeny Kharlamov; Pierre Senellart

Sources of data uncertainty and imprecision are numerous. A way to handle this uncertainty is to associate probabilistic annotations to data. Many such probabilistic database models have been proposed, both in the relational and in the semi-structured setting. The latter is particularly well adapted to the management of uncertain data coming from a variety of automatic processes. An important problem, in the context of probabilistic XML databases, is that of answering aggregate queries (count, sum, avg, etc.), which has received limited attention so far. In a model unifying the various (discrete) semi-structured probabilistic models studied up to now, we present algorithms to compute the distribution of the aggregation values (exploiting some regularity properties of the aggregate functions) and probabilistic moments (especially, expectation and variance) of this distribution. We also prove the intractability of some of these problems and investigate approximation techniques. We finally extend the discrete model to a continuous one, in order to take into account continuous data values, such as measurements from sensor networks, and present algorithms to compute distribution functions and moments for various classes of continuous distributions of data values.


ACM Transactions on Database Systems | 2011

Capturing continuous data and answering aggregate queries in probabilistic XML

Serge Abiteboul; T.-H. Hubert Chan; Evgeny Kharlamov; Pierre Senellart

Sources of data uncertainty and imprecision are numerous. A way to handle this uncertainty is to associate probabilistic annotations to data. Many such probabilistic database models have been proposed, both in the relational and in the semi-structured setting. The latter is particularly well adapted to the management of uncertain data coming from a variety of automatic processes. An important problem, in the context of probabilistic XML databases, is that of answering aggregate queries (count, sum, avg, etc.), which has received limited attention so far. In a model unifying the various (discrete) semi-structured probabilistic models studied up to now, we present algorithms to compute the distribution of the aggregation values (exploiting some regularity properties of the aggregate functions) and probabilistic moments (especially expectation and variance) of this distribution. We also prove the intractability of some of these problems and investigate approximation techniques. We finally extend the discrete model to a continuous one, in order to take into account continuous data values, such as measurements from sensor networks, and extend our algorithms and complexity results to the continuous case.


SIAM Journal on Computing | 2009

Metric Embeddings with Relaxed Guarantees

T.-H. Hubert Chan; Kedar Dhamdhere; Anupam Gupta; Jon M. Kleinberg; Aleksandrs Slivkins

We consider the problem of embedding finite metrics with slack: We seek to produce embeddings with small dimension and distortion while allowing a (small) constant fraction of all distances to be arbitrarily distorted. This definition is motivated by recent research in the networking community, which achieved striking empirical success at embedding Internet latencies with low distortion into low-dimensional Euclidean space, provided that some small slack is allowed. Answering an open question of Kleinberg, Slivkins, and Wexler [in Proceedings of the 45th IEEE Symposium on Foundations of Computer Science, 2004], we show that provable guarantees of this type can in fact be achieved in general: Any finite metric space can be embedded, with constant slack and constant distortion, into constant-dimensional Euclidean space. We then show that there exist stronger embeddings into

Collaboration


Dive into the T.-H. Hubert Chan's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dawn Song

University of California

View shared research outputs
Top Co-Authors

Avatar

Li Ning

University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar

Mingfei Li

University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar

Xiaowei Wu

University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Anupam Gupta

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Chenzi Zhang

University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar

Emil Stefanov

University of California

View shared research outputs
Researchain Logo
Decentralizing Knowledge