A survey on blockchain-based internet service architecture: requirements, challenges, trends, and future

W Yang, E Aghasian, S Garg, D Herbert, L Disiuta… - IEEE …, 2019 - ieeexplore.ieee.org
The emergence of Internet protocol suites and packet-switching technologies tends to the
considerations of security, privacy, scalability, and reliability in layered Internet service …

Searchable symmetric encryption: Designs and challenges

GS Poh, JJ Chin, WC Yau, KKR Choo… - ACM Computing …, 2017 - dl.acm.org
Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query
encrypted data without the risk of data leakage. Despite the widespread interest, existing …

Leakage-abuse attacks against searchable encryption

D Cash, P Grubbs, J Perry, T Ristenpart - Proceedings of the 22nd ACM …, 2015 - dl.acm.org
Schemes for secure outsourcing of client data with search capability are being increasingly
marketed and deployed. In the literature, schemes for accomplishing this efficiently are …

Oblix: An efficient oblivious search index

P Mishra, R Poddar, J Chen, A Chiesa… - 2018 IEEE symposium …, 2018 - ieeexplore.ieee.org
Search indices are fundamental building blocks of many systems, and there is great interest
in running them on encrypted data. Unfortunately, many known schemes that enable search …

Searchable symmetric encryption with forward search privacy

J Li, Y Huang, Y Wei, S Lv, Z Liu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Searchable symmetric encryption (SSE) has been widely applied in the encrypted database
for queries in practice. Although SSE is powerful and feature-rich, it is always plagued by …

Leakage-abuse attacks against order-revealing encryption

P Grubbs, K Sekniqi, V Bindschaedler… - … IEEE symposium on …, 2017 - ieeexplore.ieee.org
Order-preserving encryption and its generalization order-revealing encryption (OPE/ORE)
allow sorting, performing range queries, and filtering data-all while only having access to …

Revisiting leakage abuse attacks

L Blackstone, S Kamara, T Moataz - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Encrypted search algorithms (ESA) are cryptographic algorithms that support search over
encrypted data. ESAs can be designed with various primitives including …

Rethinking searchable symmetric encryption

Z Gui, KG Paterson, S Patranabis - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Symmetric Searchable Encryption (SSE) schemes enable keyword searches over encrypted
documents. To obtain efficiency, SSE schemes incur a certain amount of leakage. The vast …

The shadow nemesis: Inference attacks on efficiently deployable, efficiently searchable encryption

D Pouliot, CV Wright - Proceedings of the 2016 ACM SIGSAC conference …, 2016 - dl.acm.org
Encrypting Internet communications has been the subject of renewed focus in recent years.
In order to add end-to-end encryption to legacy applications without losing the convenience …

The tao of inference in privacy-protected databases

V Bindschaedler, P Grubbs, D Cash… - Cryptology ePrint …, 2017 - eprint.iacr.org
To protect database confidentiality even in the face of full compromise while supporting
standard functionality, recent academic proposals and commercial products rely on a mix of …