Searchable symmetric encryption: Designs and challenges

GS Poh, JJ Chin, WC Yau, KKR Choo… - ACM Computing …, 2017 - dl.acm.org
Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query
encrypted data without the risk of data leakage. Despite the widespread interest, existing …

New constructions for forward and backward private symmetric searchable encryption

J Ghareh Chamani, D Papadopoulos… - Proceedings of the …, 2018 - dl.acm.org
We study the problem of dynamic symmetric searchable encryption. In that setting, it is
crucial to minimize the information revealed to the server as a result of update operations …

Generic attacks on secure outsourced databases

G Kellaris, G Kollios, K Nissim, A O'neill - Proceedings of the 2016 ACM …, 2016 - dl.acm.org
Recently, various protocols have been proposed for securely outsourcing database storage
to a third party server, ranging from systems with" full-fledged" security based on strong …

Searchable symmetric encryption with forward search privacy

J Li, Y Huang, Y Wei, S Lv, Z Liu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Searchable symmetric encryption (SSE) has been widely applied in the encrypted database
for queries in practice. Although SSE is powerful and feature-rich, it is always plagued by …

Result pattern hiding searchable encryption for conjunctive queries

S Lai, S Patranabis, A Sakzad, JK Liu… - Proceedings of the …, 2018 - dl.acm.org
The recently proposed Oblivious Cross-Tags (OXT) protocol (CRYPTO 2013) has broken
new ground in designing efficient searchable symmetric encryption (SSE) protocol with …

Querying in internet of things with privacy preserving: Challenges, solutions and opportunities

H Ren, H Li, Y Dai, K Yang, X Lin - IEEE Network, 2018 - ieeexplore.ieee.org
IoT is envisioned as the next stage of the information revolution, enabling various daily
applications and providing better service by conducting a deep fusion with cloud and fog …

Computationally volume-hiding structured encryption

S Kamara, T Moataz - Advances in Cryptology–EUROCRYPT 2019: 38th …, 2019 - Springer
We initiate the study of structured encryption schemes with computationally-secure leakage.
Specifically, we focus on the design of volume-hiding encrypted multi-maps; that is, of …

Dynamic searchable encryption with small client storage

I Demertzis, JG Chamani, D Papadopoulos… - Cryptology ePrint …, 2019 - eprint.iacr.org
We study the problem of dynamic searchable encryption (DSE) with forward-and-backward
privacy. Many DSE schemes have been proposed recently but the most efficient ones have …

Sok: Cryptographically protected database search

B Fuller, M Varia, A Yerukhimovich… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Protected database search systems cryptographically isolate the roles of reading from,
writing to, and administering the database. This separation limits unnecessary administrator …

Leakage inversion: Towards quantifying privacy in searchable encryption

EM Kornaropoulos, N Moyer, C Papamanthou… - Proceedings of the …, 2022 - dl.acm.org
Searchable encryption (SE) provides cryptographic guarantees that a user can efficiently
search over encrypted data while only disclosing patterns about the data, also known as …