Leakage inversion: Towards quantifying privacy in searchable encryption
Searchable encryption (SE) provides cryptographic guarantees that a user can efficiently
search over encrypted data while only disclosing patterns about the data, also known as …
search over encrypted data while only disclosing patterns about the data, also known as …
High recovery with fewer injections: Practical binary volumetric injection attacks against dynamic searchable encryption
Searchable symmetric encryption enables private queries over an encrypted database, but it
can also result in information leakages. Adversaries can exploit these leakages to launch …
can also result in information leakages. Adversaries can exploit these leakages to launch …
Leakage-abuse attacks against forward and backward private searchable symmetric encryption
Dynamic searchable symmetric encryption (DSSE) enables a server to efficiently search and
update over encrypted files. To minimize the leakage during updates, a security notion …
update over encrypted files. To minimize the leakage during updates, a security notion …
Rethinking searchable symmetric encryption
Symmetric Searchable Encryption (SSE) schemes enable keyword searches over encrypted
documents. To obtain efficiency, SSE schemes incur a certain amount of leakage. The vast …
documents. To obtain efficiency, SSE schemes incur a certain amount of leakage. The vast …
Sok: Content moderation for end-to-end encryption
S Scheffler, J Mayer - arXiv preprint arXiv:2303.03979, 2023 - arxiv.org
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and
E2EE data storage is becoming common. These important advances for security and privacy …
E2EE data storage is becoming common. These important advances for security and privacy …
Attacks on encrypted response-hiding range search schemes in multiple dimensions
In this work, we present the first database reconstruction attacks against response-hiding
private range search schemes on encrypted databases of arbitrary dimensions. Falzon et …
private range search schemes on encrypted databases of arbitrary dimensions. Falzon et …
SWiSSSE: System-wide security for searchable symmetric encryption
This paper initiates a new direction in the design and analysis of searchable symmetric
encryption (SSE) schemes. We provide the first comprehensive security model and definition …
encryption (SSE) schemes. We provide the first comprehensive security model and definition …
Menhir: an oblivious database with protection against access and volume pattern leakage
L Reichert, GR Chandran, P Schoppmann… - Proceedings of the 19th …, 2024 - dl.acm.org
Analyzing user data while protecting the privacy of individuals remains a big challenge.
Trusted execution environments (TEEs) are a possible solution as they protect processes …
Trusted execution environments (TEEs) are a possible solution as they protect processes …
PrivMail: A Privacy-Preserving Framework for Secure Emails
GR Chandran, R Nieminen, T Schneider… - European Symposium on …, 2023 - Springer
Emails have improved our workplace efficiency and communication. However, they are often
processed unencrypted by mail servers, leaving them open to data breaches on a single …
processed unencrypted by mail servers, leaving them open to data breaches on a single …
MAPLE: MArkov Process Leakage attacks on Encrypted Search
Encrypted search algorithms (ESAs) enable private search on encrypted data and can be
constructed from a variety of cryptographic primitives. All knownsub-linear ESA algorithms …
constructed from a variety of cryptographic primitives. All knownsub-linear ESA algorithms …