Exploiting Update Leakage in Searchable Symmetric Encryption

J Haltiwanger, T Hoang - … of the Fourteenth ACM Conference on Data …, 2024 - dl.acm.org
Dynamic Searchable Symmetric Encryption (DSSE) provides efficient techniques for
securely searching and updating an encrypted database. However, efficient DSSE schemes …

{MUSES}: Efficient {Multi-User} Searchable Encrypted Database

T Le, R Behnia, J Guajardo, T Hoang - 33rd USENIX Security …, 2024 - usenix.org
Searchable encrypted systems enable privacy-preserving keyword search on encrypted
data. Symmetric systems achieve high efficiency (eg, sublinear search), but they mostly …

Searchable encryption for conjunctive queries with extended forward and backward privacy

C Zuo, S Lai, SF Sun, X Yuan, JK Liu… - Proceedings on …, 2025 - petsymposium.org
Recent developments in the field of Dynamic Searchable Symmetric Encryption (DSSE) with
forward and backward privacy have attracted much attention from both research and …

The statistical nature of leakage in SSE schemes and its role in passive attacks

M Damie, JB Leger, F Hahn, A Peter - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Encrypted search schemes have been proposed to address growing privacy concerns.
However, several leakage-abuse attacks have highlighted the shortcomings of these …

Query Correlation Attack against Searchable Symmetric Encryption with Supporting for Conjunctive Queries

H Liu, L Xu, X Liu, L Mei, C Xu - IEEE Transactions on …, 2025 - ieeexplore.ieee.org
Searchable symmetric encryption (SSE) supporting conjunctive queries has garnered
significant attention over the past decade due to its practicality and wide applicability. While …

When Differential Privacy Meets Query Control: a Hybrid Framework for Practical Range Query Leakage Quantification and Mitigation

X Li, Y Du, C Wang - IEEE Transactions on Services Computing, 2024 - ieeexplore.ieee.org
Encrypted range schemes are becoming increasingly attractive for commercial databases,
as they allow for confidential query service on encrypted databases hosted on remote …

[PDF][PDF] d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases

D Liu, W Wang, P Xu, LT Yang, B Luo… - arxiv preprint arxiv …, 2024 - usenix.org
Abstract Dynamic Searchable Encryption (DSE) has emerged as a solution to efficiently
handle and protect large-scale data storage in encrypted databases (EDBs). Volume …

Evaluating Leakage Attacks Against Relational Encrypted Search

P Ehrler, A Kati, T Schneider, A Treiber - Proceedings of the 2024 on …, 2024 - dl.acm.org
Encrypted Search Algorithms (ESAs) are a technique to encrypt data while the user can still
search over it. ESAs can protect privacy and ensure security of sensitive data stored on a …

HORAM: A High-Performance Hierarchical Doubly Oblivious RAM

L Zheng, Z Zhang, W Dong, Y Zhang, Y Wu… - arxiv preprint arxiv …, 2024 - arxiv.org
The combination of Oblivious RAM (ORAM) with Trusted Execution Environments (TEE) has
found numerous real-world applications due to their complementary nature. TEEs alleviate …

Encrypted multi-map that hides query, access, and volume patterns

A Boldyreva, T Tang - … Conference on Security and Cryptography for …, 2024 - Springer
We present an encrypted multi-map, a fundamental data structure underlying searchable
encryption/structured encryption. Our protocol supports updates and is designed for …