Generic attacks on secure outsourced databases

G Kellaris, G Kollios, K Nissim, A O'neill - Proceedings of the 2016 ACM …, 2016 - dl.acm.org
Recently, various protocols have been proposed for securely outsourcing database storage
to a third party server, ranging from systems with" full-fledged" security based on strong …

Preserving privacy while revealing thumbnail for content-based encrypted image retrieval in the cloud

X Chai, Y Wang, Z Gan, X Chen, Y Zhang - Information Sciences, 2022 - Elsevier
Owing to the rapid development of cloud services and personal privacy requirements,
content-based encrypted image retrieval in the cloud has been increasing. Outsourced …

An ideal-security protocol for order-preserving encoding

RA Popa, FH Li, N Zeldovich - 2013 IEEE Symposium on …, 2013 - ieeexplore.ieee.org
Order-preserving encryption-an encryption scheme where the sort order of ciphertexts
matches the sort order of the corresponding plaintexts-allows databases and other …

Multi-input functional encryption

S Goldwasser, SD Gordon, V Goyal, A Jain… - Advances in Cryptology …, 2014 - Springer
We introduce the problem of Multi-Input Functional Encryption, where a secret key sk f can
correspond to an n-ary function f that takes multiple ciphertexts as input. We formulate both …

Hiding the access pattern is not enough: Exploiting search pattern leakage in searchable encryption

S Oya, F Kerschbaum - 30th USENIX security symposium (USENIX …, 2021 - usenix.org
Recent Searchable Symmetric Encryption (SSE) schemes enable secure searching over an
encrypted database stored in a server while limiting the information leaked to the server …

Order-revealing encryption: New constructions, applications, and lower bounds

K Lewi, DJ Wu - Proceedings of the 2016 ACM SIGSAC Conference on …, 2016 - dl.acm.org
In the last few years, there has been significant interest in develo** methods to search
over encrypted data. In the case of range queries, a simple solution is to encrypt the contents …

Practical order-revealing encryption with limited leakage

N Chenette, K Lewi, SA Weis, DJ Wu - Fast Software Encryption: 23rd …, 2016 - Springer
In an order-preserving encryption scheme, the encryption algorithm produces ciphertexts
that preserve the order of their plaintexts. Order-preserving encryption schemes have been …

Function-hiding inner product encryption is practical

S Kim, K Lewi, A Mandal, H Montgomery, A Roy… - … Conference on Security …, 2018 - Springer
In a functional encryption scheme, secret keys are associated with functions and ciphertexts
are associated with messages. Given a secret key for a function f, and a ciphertext for a …

Frequency-hiding order-preserving encryption

F Kerschbaum - Proceedings of the 22nd ACM SIGSAC Conference on …, 2015 - dl.acm.org
Order-preserving encryption allows encrypting data, while still enabling efficient range
queries on the encrypted data. This makes its performance and functionality very suitable for …

Sok: Cryptographically protected database search

B Fuller, M Varia, A Yerukhimovich… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Protected database search systems cryptographically isolate the roles of reading from,
writing to, and administering the database. This separation limits unnecessary administrator …