Exploiting Update Leakage in Searchable Symmetric Encryption
J Haltiwanger, T Hoang - … of the Fourteenth ACM Conference on Data …, 2024 - dl.acm.org
Dynamic Searchable Symmetric Encryption (DSSE) provides efficient techniques for
securely searching and updating an encrypted database. However, efficient DSSE schemes …
securely searching and updating an encrypted database. However, efficient DSSE schemes …
{MUSES}: Efficient {Multi-User} Searchable Encrypted Database
Searchable encrypted systems enable privacy-preserving keyword search on encrypted
data. Symmetric systems achieve high efficiency (eg, sublinear search), but they mostly …
data. Symmetric systems achieve high efficiency (eg, sublinear search), but they mostly …
Searchable encryption for conjunctive queries with extended forward and backward privacy
Recent developments in the field of Dynamic Searchable Symmetric Encryption (DSSE) with
forward and backward privacy have attracted much attention from both research and …
forward and backward privacy have attracted much attention from both research and …
The statistical nature of leakage in SSE schemes and its role in passive attacks
Encrypted search schemes have been proposed to address growing privacy concerns.
However, several leakage-abuse attacks have highlighted the shortcomings of these …
However, several leakage-abuse attacks have highlighted the shortcomings of these …
Query Correlation Attack against Searchable Symmetric Encryption with Supporting for Conjunctive Queries
Searchable symmetric encryption (SSE) supporting conjunctive queries has garnered
significant attention over the past decade due to its practicality and wide applicability. While …
significant attention over the past decade due to its practicality and wide applicability. While …
When Differential Privacy Meets Query Control: a Hybrid Framework for Practical Range Query Leakage Quantification and Mitigation
X Li, Y Du, C Wang - IEEE Transactions on Services Computing, 2024 - ieeexplore.ieee.org
Encrypted range schemes are becoming increasingly attractive for commercial databases,
as they allow for confidential query service on encrypted databases hosted on remote …
as they allow for confidential query service on encrypted databases hosted on remote …
[PDF][PDF] d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases
Abstract Dynamic Searchable Encryption (DSE) has emerged as a solution to efficiently
handle and protect large-scale data storage in encrypted databases (EDBs). Volume …
handle and protect large-scale data storage in encrypted databases (EDBs). Volume …
Evaluating Leakage Attacks Against Relational Encrypted Search
Encrypted Search Algorithms (ESAs) are a technique to encrypt data while the user can still
search over it. ESAs can protect privacy and ensure security of sensitive data stored on a …
search over it. ESAs can protect privacy and ensure security of sensitive data stored on a …
HORAM: A High-Performance Hierarchical Doubly Oblivious RAM
L Zheng, Z Zhang, W Dong, Y Zhang, Y Wu… - arxiv preprint arxiv …, 2024 - arxiv.org
The combination of Oblivious RAM (ORAM) with Trusted Execution Environments (TEE) has
found numerous real-world applications due to their complementary nature. TEEs alleviate …
found numerous real-world applications due to their complementary nature. TEEs alleviate …
Encrypted multi-map that hides query, access, and volume patterns
A Boldyreva, T Tang - … Conference on Security and Cryptography for …, 2024 - Springer
We present an encrypted multi-map, a fundamental data structure underlying searchable
encryption/structured encryption. Our protocol supports updates and is designed for …
encryption/structured encryption. Our protocol supports updates and is designed for …