Sok: Cryptanalysis of encrypted search with leaker–a framework for leakage attack evaluation on real-world data
An encrypted search algorithm (ESA) allows a user to encrypt its data while preserving the
ability to search over it. As all practical solutions leak some information, cryptanalysis plays …
ability to search over it. As all practical solutions leak some information, cryptanalysis plays …
Full database reconstruction in two dimensions
In the past few years, we have seen multiple attacks on one-dimensional databases that
support range queries. These attacks achieve full database reconstruction by exploiting …
support range queries. These attacks achieve full database reconstruction by exploiting …
Reconstructing with less: Leakage abuse attacks in two dimensions
Access and search pattern leakage from range queries are detrimental to the security of
encrypted databases, as evidenced by a large body of work on attacks that reconstruct one …
encrypted databases, as evidenced by a large body of work on attacks that reconstruct one …
Improved structured encryption for SQL databases via hybrid indexing
We introduce a new technique for indexing joins in encrypted SQL databases called partially
precomputed joins which achieves lower leakage and bandwidth than those used in prior …
precomputed joins which achieves lower leakage and bandwidth than those used in prior …
Synq: Public Policy Analytics Over Encrypted Data
Data analytics is a core part of modern decision making, especially in public policy.
However, there exists a tension between data privacy and otherwise socially beneficial …
However, there exists a tension between data privacy and otherwise socially beneficial …
A Searchable Symmetric Encryption-Based Privacy Protection Scheme for Cloud-Assisted Mobile Crowdsourcing
Mobile crowdsourcing (MC) has emerged as an efficient data collection and processing
technique with the growing use of mobile devices. Mobile devices typically have numerous …
technique with the growing use of mobile devices. Mobile devices typically have numerous …
Structured encryption for indirect addressing
Abstract The Structured Encryption (StE) framework can be used to capture the encryption
and querying of complex data structures on an honest-but-curious server. In this work, we …
and querying of complex data structures on an honest-but-curious server. In this work, we …
Evaluating Leakage Attacks Against Relational Encrypted Search
Encrypted Search Algorithms (ESAs) are a technique to encrypt data while the user can still
search over it. ESAs can protect privacy and ensure security of sensitive data stored on a …
search over it. ESAs can protect privacy and ensure security of sensitive data stored on a …
Cryptography in business intelligence and data analytics
This chapter aims to determine the role of cryptography in the provision of secure
applications of business intelligence and data analytics. Through this, the legal implications …
applications of business intelligence and data analytics. Through this, the legal implications …
基于STE 的减少查询泄露的关系数据库加密方案
苏雨晨, 马昌社 - 网络与信息安全学报, 2024 - infocomm-journal.com
近年提出的基于部分预计算的SQL 连接索引(PpSj) 方案是一种基于结构化加密技术的关系
数据库加密方案, 它利用部分预计算索引连接技术和过滤哈希集技术支持高效的连接查询和布尔 …
数据库加密方案, 它利用部分预计算索引连接技术和过滤哈希集技术支持高效的连接查询和布尔 …