Private web search with Tiptoe

A Henzinger, E Dauterman, H Corrigan-Gibbs… - Proceedings of the 29th …, 2023 - dl.acm.org
Tiptoe is a private web search engine that allows clients to search over hundreds of millions
of documents, while revealing no information about their search query to the search engine's …

{I/O-Efficient} Dynamic Searchable Encryption meets Forward & Backward Privacy

P Mondal, JG Chamani, I Demertzis… - 33rd USENIX Security …, 2024 - usenix.org
We focus on the problem of I/O-efficient Dynamic Searchable Encryption (DSE), ie, schemes
that perform well when executed with the dataset on-disk. Towards this direction, for HDDs …

Secret Key Recovery in a {Global-Scale}{End-to-End} Encryption System

G Connell, V Fang, R Schmidt, E Dauterman… - … USENIX Symposium on …, 2024 - usenix.org
End-to-end encrypted messaging applications ensure that an attacker cannot read a user's
message history without their decryption keys. While this provides strong privacy, it creates a …

Dynamic searchable encryption with optimal search in the presence of deletions

JG Chamani, D Papadopoulos… - 31st USENIX Security …, 2022 - usenix.org
We focus on the problem of Dynamic Searchable Encryption (DSE) with efficient
(optimal/quasi-optimal) search in the presence of deletions. Towards that end, we first …

Graphos: Towards oblivious graph processing

JG Chamani, I Demertzis, D Papadopoulos… - Cryptology ePrint …, 2024 - eprint.iacr.org
We propose GraphOS, a system that allows a client that owns a graph database to
outsource it to an untrusted server for storage and querying. It relies on doubly-oblivious …

Distributed & scalable oblivious sorting and shuffling

N Ngai, I Demertzis, JG Chamani… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Existing oblivious systems offer robust security by concealing memory access patterns, but
they encounter significant scalability and performance challenges. Recent efforts to enhance …

Waffle: An online oblivious datastore for protecting data access patterns

S Maiyya, SC Vemula, D Agrawal, A El Abbadi… - Proceedings of the …, 2023 - dl.acm.org
We present Waffle, a datastore that protects an application's data access patterns from a
passive persistent adversary. Waffle achieves this without prior knowledge of the input data …

Waks-on/waks-off: Fast oblivious offline/online shuffling and sorting with waksman networks

S Sasy, A Johnson, I Goldberg - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
As more privacy-preserving solutions leverage trusted execution environments (TEEs) like
Intel SGX, it becomes pertinent that these solutions can by design thwart TEE side-channel …

Confidential Computing or Cryptographic Computing? Tradeoffs between cryptography and hardware enclaves

RA Popa - Queue, 2024 - dl.acm.org
Secure computation via MPC/homomorphic encryption versus hardware enclaves presents
tradeoffs involving deployment, security, and performance. Regarding performance, it …

Boomerang:{Metadata-Private} Messaging under Hardware Trust

P Jiang, Q Wang, J Cheng, C Wang, L Xu… - … USENIX Symposium on …, 2023 - usenix.org
In end-to-end encrypted (E2EE) messaging systems, protecting communication metadata,
such as who is communicating with whom, at what time, etc., remains a challenging …