Searchable symmetric encryption: Designs and challenges
Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query
encrypted data without the risk of data leakage. Despite the widespread interest, existing …
encrypted data without the risk of data leakage. Despite the widespread interest, existing …
New constructions for forward and backward private symmetric searchable encryption
We study the problem of dynamic symmetric searchable encryption. In that setting, it is
crucial to minimize the information revealed to the server as a result of update operations …
crucial to minimize the information revealed to the server as a result of update operations …
Generic attacks on secure outsourced databases
Recently, various protocols have been proposed for securely outsourcing database storage
to a third party server, ranging from systems with" full-fledged" security based on strong …
to a third party server, ranging from systems with" full-fledged" security based on strong …
Searchable symmetric encryption with forward search privacy
Searchable symmetric encryption (SSE) has been widely applied in the encrypted database
for queries in practice. Although SSE is powerful and feature-rich, it is always plagued by …
for queries in practice. Although SSE is powerful and feature-rich, it is always plagued by …
Result pattern hiding searchable encryption for conjunctive queries
The recently proposed Oblivious Cross-Tags (OXT) protocol (CRYPTO 2013) has broken
new ground in designing efficient searchable symmetric encryption (SSE) protocol with …
new ground in designing efficient searchable symmetric encryption (SSE) protocol with …
Querying in internet of things with privacy preserving: Challenges, solutions and opportunities
IoT is envisioned as the next stage of the information revolution, enabling various daily
applications and providing better service by conducting a deep fusion with cloud and fog …
applications and providing better service by conducting a deep fusion with cloud and fog …
Computationally volume-hiding structured encryption
We initiate the study of structured encryption schemes with computationally-secure leakage.
Specifically, we focus on the design of volume-hiding encrypted multi-maps; that is, of …
Specifically, we focus on the design of volume-hiding encrypted multi-maps; that is, of …
Dynamic searchable encryption with small client storage
We study the problem of dynamic searchable encryption (DSE) with forward-and-backward
privacy. Many DSE schemes have been proposed recently but the most efficient ones have …
privacy. Many DSE schemes have been proposed recently but the most efficient ones have …
Sok: Cryptographically protected database search
Protected database search systems cryptographically isolate the roles of reading from,
writing to, and administering the database. This separation limits unnecessary administrator …
writing to, and administering the database. This separation limits unnecessary administrator …
Leakage inversion: Towards quantifying privacy in searchable encryption
Searchable encryption (SE) provides cryptographic guarantees that a user can efficiently
search over encrypted data while only disclosing patterns about the data, also known as …
search over encrypted data while only disclosing patterns about the data, also known as …