Sok: Cryptanalysis of encrypted search with leaker–a framework for leakage attack evaluation on real-world data

S Kamara, A Kati, T Moataz, T Schneider… - 2022 IEEE 7th …, 2022 - ieeexplore.ieee.org
An encrypted search algorithm (ESA) allows a user to encrypt its data while preserving the
ability to search over it. As all practical solutions leak some information, cryptanalysis plays …

Full database reconstruction in two dimensions

F Falzon, EA Markatou, Akshima, D Cash… - Proceedings of the …, 2020 - dl.acm.org
In the past few years, we have seen multiple attacks on one-dimensional databases that
support range queries. These attacks achieve full database reconstruction by exploiting …

Reconstructing with less: Leakage abuse attacks in two dimensions

EA Markatou, F Falzon, R Tamassia… - Proceedings of the 2021 …, 2021 - dl.acm.org
Access and search pattern leakage from range queries are detrimental to the security of
encrypted databases, as evidenced by a large body of work on attacks that reconstruct one …

Improved structured encryption for SQL databases via hybrid indexing

D Cash, R Ng, A Rivkin - … conference on applied cryptography and network …, 2021 - Springer
We introduce a new technique for indexing joins in encrypted SQL databases called partially
precomputed joins which achieves lower leakage and bandwidth than those used in prior …

Synq: Public Policy Analytics Over Encrypted Data

Z Espiritu, M George, S Kamara… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
Data analytics is a core part of modern decision making, especially in public policy.
However, there exists a tension between data privacy and otherwise socially beneficial …

A Searchable Symmetric Encryption-Based Privacy Protection Scheme for Cloud-Assisted Mobile Crowdsourcing

X Fu, LT Yang, J Li, X Yang… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Mobile crowdsourcing (MC) has emerged as an efficient data collection and processing
technique with the growing use of mobile devices. Mobile devices typically have numerous …

Structured encryption for indirect addressing

R Ng, A Hoover, D Cash, E Ee - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Abstract The Structured Encryption (StE) framework can be used to capture the encryption
and querying of complex data structures on an honest-but-curious server. In this work, we …

Evaluating Leakage Attacks Against Relational Encrypted Search

P Ehrler, A Kati, T Schneider, A Treiber - Proceedings of the 2024 on …, 2024 - dl.acm.org
Encrypted Search Algorithms (ESAs) are a technique to encrypt data while the user can still
search over it. ESAs can protect privacy and ensure security of sensitive data stored on a …

Cryptography in business intelligence and data analytics

MA Al Khaldy, A Ishtaiwi, A Al-Qerem… - Innovations in Modern …, 2024 - igi-global.com
This chapter aims to determine the role of cryptography in the provision of secure
applications of business intelligence and data analytics. Through this, the legal implications …

基于STE 的减少查询泄露的关系数据库加密方案

苏雨晨, 马昌社 - 网络与信息安全学报, 2024 - infocomm-journal.com
近年提出的基于部分预计算的SQL 连接索引(PpSj) 方案是一种基于结构化加密技术的关系
数据库加密方案, 它利用部分预计算索引连接技术和过滤哈希集技术支持高效的连接查询和布尔 …