Revisiting leakage abuse attacks
Encrypted search algorithms (ESA) are cryptographic algorithms that support search over
encrypted data. ESAs can be designed with various primitives including …
encrypted data. ESAs can be designed with various primitives including …
Dynamic searchable encryption with small client storage
We study the problem of dynamic searchable encryption (DSE) with forward-and-backward
privacy. Many DSE schemes have been proposed recently but the most efficient ones have …
privacy. Many DSE schemes have been proposed recently but the most efficient ones have …
Dynamic searchable encryption with optimal search in the presence of deletions
We focus on the problem of Dynamic Searchable Encryption (DSE) with efficient
(optimal/quasi-optimal) search in the presence of deletions. Towards that end, we first …
(optimal/quasi-optimal) search in the presence of deletions. Towards that end, we first …
Omnes pro uno: Practical {Multi-Writer} encrypted database
Multi-writer encrypted databases allow a reader to search over data contributed by multiple
writers securely. Public-key searchable encryption (PKSE) appears to be the right primitive …
writers securely. Public-key searchable encryption (PKSE) appears to be the right primitive …
Multi-user dynamic searchable symmetric encryption with corrupted participants
We study the problem of multi-user dynamic searchable symmetric encryption (DMUSSE)
where a data owner stores its encrypted documents on an untrusted remote server and …
where a data owner stores its encrypted documents on an untrusted remote server and …
Multi-user collusion-resistant searchable encryption with optimal search time
The continued development of cloud computing requires technologies that protect users'
data privacy even from the cloud providers themselves. Multi-user searchable encryption is …
data privacy even from the cloud providers themselves. Multi-user searchable encryption is …
Multi-user collusion-resistant searchable encryption for cloud storage
The continued development of cloud computing requires technologies protecting users' data
privacy even from the cloud providers themselves, such as Multi-user searchable encryption …
privacy even from the cloud providers themselves, such as Multi-user searchable encryption …
Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems
W Li, L Xu, Y Wen, F Zhang - Computer Standards & Interfaces, 2022 - Elsevier
With the growing demands of online access to health services, multiple medical institutions
store their encrypted electronic health records (EHR) on the cloud and share them with the …
store their encrypted electronic health records (EHR) on the cloud and share them with the …
Anonymous tokens with private metadata bit
We present a cryptographic construction for anonymous tokens with private metadata bit,
called PMBTokens. This primitive enables an issuer to provide a user with a lightweight …
called PMBTokens. This primitive enables an issuer to provide a user with a lightweight …
Tokenised multi-client provisioning for dynamic searchable encryption with forward and backward privacy
Searchable Symmetric Encryption (SSE) has opened up an attractive avenue for privacy-
preserved processing of outsourced data on the untrusted cloud infrastructure. SSE aims to …
preserved processing of outsourced data on the untrusted cloud infrastructure. SSE aims to …