Obfuscated access and search patterns in searchable encryption
Searchable Symmetric Encryption (SSE) allows a data owner to securely outsource its
encrypted data to a cloud server while maintaining the ability to search over it and retrieve …
encrypted data to a cloud server while maintaining the ability to search over it and retrieve …
Constant-weight {PIR}: Single-round keyword {PIR} via constant-weight equality operators
RA Mahdavi, F Kerschbaum - 31st USENIX Security Symposium …, 2022 - usenix.org
Equality operators are an essential building block in tasks over secure computation such as
private information retrieval. In private information retrieval (PIR), a user queries a database …
private information retrieval. In private information retrieval (PIR), a user queries a database …
Pantheon: Private retrieval from public key-value store
Consider a cloud server that owns a key-value store and provides a private query service to
its clients. Preserving client privacy in this setting is difficult because the key-value store is …
its clients. Preserving client privacy in this setting is difficult because the key-value store is …
Compressed oblivious encoding for homomorphically encrypted search
Fully homomorphic encryption (FHE) enables a simple, attractive framework for secure
search. Compared to other secure search systems, no costly setup procedure is necessary; …
search. Compared to other secure search systems, no costly setup procedure is necessary; …
An efficient and privacy-preserving range query over encrypted cloud data
W Wang, Y Jin, B Cao - … Conference on Privacy, Security & Trust …, 2022 - ieeexplore.ieee.org
The growing power of cloud computing prompts data owners to outsource their databases to
the cloud. In order to meet the demand of multi-dimensional data processing in big data era …
the cloud. In order to meet the demand of multi-dimensional data processing in big data era …
VR-PEKS: A Verifiable and Resistant to Keyword Guess Attack Public Key Encryption with Keyword Search Scheme
Public key encryption with keyword search (PEKS) allows users to perform keyword
searches of ciphertext on untrusted cloud storage servers, protecting data privacy while …
searches of ciphertext on untrusted cloud storage servers, protecting data privacy while …
A privacy-preserving framework for conducting genome-wide association studies over outsourced patient data
Due to the sheer volume of data, data owners (eg, hospitals or other data collectors) tend to
outsource their data to cloud service providers (CSPs) for the purpose of storage and …
outsource their data to cloud service providers (CSPs) for the purpose of storage and …
Leaf: A faster secure search algorithm via localization, extraction, and reconstruction
Secure search looks for and retrieves records from a (possibly cloud-hosted) encrypted
database while ensuring the confidentiality of the queries. Researchers are paying …
database while ensuring the confidentiality of the queries. Researchers are paying …
A geometric approach to homomorphic secret sharing
Abstract An (n, m, t)-homomorphic secret sharing (HSS) scheme allows n clients to share
their inputs across m servers, such that the inputs are hidden from any t colluding servers …
their inputs across m servers, such that the inputs are hidden from any t colluding servers …
Homomorphic string search with constant multiplicative depth
C Bonte, I Iliashenko - Proceedings of the 2020 ACM SIGSAC …, 2020 - dl.acm.org
String search finds occurrences of patterns in a larger text. This general problem occurs in
various application scenarios, fe Internet search, text processing, DNA analysis, etc. Using …
various application scenarios, fe Internet search, text processing, DNA analysis, etc. Using …