Breach-resistant structured encryption
… With this in mind, we deem that an encrypted structure should be regarded as breach-resistant
if its snapshot leakage is at most the size of the plaintext structure at the time the snapshot …
if its snapshot leakage is at most the size of the plaintext structure at the time the snapshot …
Limits of breach-resistant and snapshot-oblivious RAMs
G Persiano, K Yeo - Annual International Cryptology Conference, 2023 - Springer
… [AKM19] introduced the notion of a breach-resistant structured encryption. A structured
encryption … Their goal is to design breach breach-resistant multi-maps where only the size of the …
encryption … Their goal is to design breach breach-resistant multi-maps where only the size of the …
Structured encryption and leakage suppression
… Structured encryption (STE) schemes encrypt data structures … in the sense that the encrypted
structures it produces can be … the sense that it can encrypt any data structure) that leaks the …
structures it produces can be … the sense that it can encrypt any data structure) that leaks the …
Structured encryption and dynamic leakage suppression
… Structured encryption (STE) schemes encrypt data structures in such a way that they can
be … symmetric encryption (SSE) and graph encryption. Like all sub-linear encrypted search …
be … symmetric encryption (SSE) and graph encryption. Like all sub-linear encrypted search …
Encrypted databases for differential privacy
… structured encryption and differential privacy in a more careful manner. Our first step, is to
design an encrypted counter that supports an encrypted … encrypting it with a breach-resistant …
design an encrypted counter that supports an encrypted … encrypting it with a breach-resistant …
Computationally volume-hiding structured encryption
… structured encryption schemes with computationally-secure leakage. Specifically, we focus
on the design of volume-hiding encrypted multi-maps; that is, of encrypted … for encryption but, …
on the design of volume-hiding encrypted multi-maps; that is, of encrypted … for encryption but, …
Integration of IP-Cores for the M3 Architecture with Low Area Overhead: Accelerator Support Module
… , the need for robust, breach-resistant security architectures becomes paramount. Secure
tiled … Our implementation features two ASM tiles with example ACCs for encryption (AES) and …
tiled … Our implementation features two ASM tiles with example ACCs for encryption (AES) and …
Structured encryption for indirect addressing
… The Structured Encryption (StE) framework can be used to capture the encryption and … In
this work, we introduce a new type of StE called indirectly addressed multimap encryption (IA-…
this work, we introduce a new type of StE called indirectly addressed multimap encryption (IA-…
Revisiting leakage abuse attacks
… encrypted documents {cti}i∈ids(w) and the server receives ⊥. Structured ESAs are constructed
using structured encryption (… a multi-map or dictionary encryption schemes. We describe …
using structured encryption (… a multi-map or dictionary encryption schemes. We describe …
[PDF][PDF] Leakage Perturbation is Not Enough: Breaking Structured Encryption Using Simulated Annealing.
… Structured encryption (STE) is a form of database encryption that enables searching
directly over symmetrically encrypted “structured databases”. STE is known to be vulnerable to …
directly over symmetrically encrypted “structured databases”. STE is known to be vulnerable to …