Revisiting leakage abuse attacks

L Blackstone, S Kamara, T Moataz - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Encrypted search algorithms (ESA) are cryptographic algorithms that support search over
encrypted data. ESAs can be designed with various primitives including …

Dynamic searchable encryption with small client storage

I Demertzis, JG Chamani, D Papadopoulos… - Cryptology ePrint …, 2019 - eprint.iacr.org
We study the problem of dynamic searchable encryption (DSE) with forward-and-backward
privacy. Many DSE schemes have been proposed recently but the most efficient ones have …

Dynamic searchable encryption with optimal search in the presence of deletions

JG Chamani, D Papadopoulos… - 31st USENIX Security …, 2022 - usenix.org
We focus on the problem of Dynamic Searchable Encryption (DSE) with efficient
(optimal/quasi-optimal) search in the presence of deletions. Towards that end, we first …

Omnes pro uno: Practical {Multi-Writer} encrypted database

J Wang, SSM Chow - … USENIX Security Symposium (USENIX Security 22 …, 2022 - usenix.org
Multi-writer encrypted databases allow a reader to search over data contributed by multiple
writers securely. Public-key searchable encryption (PKSE) appears to be the right primitive …

Multi-user dynamic searchable symmetric encryption with corrupted participants

JG Chamani, Y Wang, D Papadopoulos… - … on Dependable and …, 2021 - ieeexplore.ieee.org
We study the problem of multi-user dynamic searchable symmetric encryption (DMUSSE)
where a data owner stores its encrypted documents on an untrusted remote server and …

Multi-user collusion-resistant searchable encryption with optimal search time

Y Wang, D Papadopoulos - Proceedings of the 2021 ACM Asia …, 2021 - dl.acm.org
The continued development of cloud computing requires technologies that protect users'
data privacy even from the cloud providers themselves. Multi-user searchable encryption is …

Multi-user collusion-resistant searchable encryption for cloud storage

Y Wang, D Papadopoulos - IEEE Transactions on Cloud …, 2023 - ieeexplore.ieee.org
The continued development of cloud computing requires technologies protecting users' data
privacy even from the cloud providers themselves, such as Multi-user searchable encryption …

Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems

W Li, L Xu, Y Wen, F Zhang - Computer Standards & Interfaces, 2022 - Elsevier
With the growing demands of online access to health services, multiple medical institutions
store their encrypted electronic health records (EHR) on the cloud and share them with the …

Anonymous tokens with private metadata bit

B Kreuter, T Lepoint, M Orrù, M Raykova - … , CA, USA, August 17–21, 2020 …, 2020 - Springer
We present a cryptographic construction for anonymous tokens with private metadata bit,
called PMBTokens. This primitive enables an issuer to provide a user with a lightweight …

Tokenised multi-client provisioning for dynamic searchable encryption with forward and backward privacy

A Bag, S Patranabis, D Mukhopadhyay - Proceedings of the 19th ACM …, 2024 - dl.acm.org
Searchable Symmetric Encryption (SSE) has opened up an attractive avenue for privacy-
preserved processing of outsourced data on the untrusted cloud infrastructure. SSE aims to …