Practical non-interactive searchable encryption with forward and backward privacy
Abstract In Dynamic Symmetric Searchable Encryption (DSSE), forward privacy ensures that
previous search queries cannot be associated with future updates, while backward privacy …
previous search queries cannot be associated with future updates, while backward privacy …
Revisiting leakage abuse attacks
Encrypted search algorithms (ESA) are cryptographic algorithms that support search over
encrypted data. ESAs can be designed with various primitives including …
encrypted data. ESAs can be designed with various primitives including …
Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing
Volume leakage has recently been identified as a major threat to the security of
cryptographic cloud-based data structures by Kellaris\em et al. CCS'16 (see also the attacks …
cryptographic cloud-based data structures by Kellaris\em et al. CCS'16 (see also the attacks …
Computationally volume-hiding structured encryption
We initiate the study of structured encryption schemes with computationally-secure leakage.
Specifically, we focus on the design of volume-hiding encrypted multi-maps; that is, of …
Specifically, we focus on the design of volume-hiding encrypted multi-maps; that is, of …
Structured encryption and leakage suppression
Structured encryption (STE) schemes encrypt data structures in such a way that they can be
privately queried. One aspect of STE that is still poorly understood is its leakage. In this work …
privately queried. One aspect of STE that is still poorly understood is its leakage. In this work …
Structured encryption and dynamic leakage suppression
Structured encryption (STE) schemes encrypt data structures in such a way that they can be
privately queried. Special cases of STE include searchable symmetric encryption (SSE) and …
privately queried. Special cases of STE include searchable symmetric encryption (SSE) and …
Sok: Cryptanalysis of encrypted search with leaker–a framework for leakage attack evaluation on real-world data
An encrypted search algorithm (ESA) allows a user to encrypt its data while preserving the
ability to search over it. As all practical solutions leak some information, cryptanalysis plays …
ability to search over it. As all practical solutions leak some information, cryptanalysis plays …
Response-hiding encrypted ranges: Revisiting security via parametrized leakage-abuse attacks
EM Kornaropoulos, C Papamanthou… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Despite a growing body of work on leakage-abuse attacks for encrypted databases, attacks
on practical response-hiding constructions are yet to appear. Response-hiding constructions …
on practical response-hiding constructions are yet to appear. Response-hiding constructions …
Forward and backward private searchable encryption with SGX
Symmetric Searchable Encryption (SSE) schemes enable users to search over encrypted
data hosted on an untrusted server. Recently, there has been a lot of interest in forward and …
data hosted on an untrusted server. Recently, there has been a lot of interest in forward and …
Omnes pro uno: Practical {Multi-Writer} encrypted database
Multi-writer encrypted databases allow a reader to search over data contributed by multiple
writers securely. Public-key searchable encryption (PKSE) appears to be the right primitive …
writers securely. Public-key searchable encryption (PKSE) appears to be the right primitive …