Public-key authenticated encryption with keyword search supporting constant trapdoor generation and fast search

H Li, Q Huang, J Huang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
To improve the quality of medical care and reduce unnecessary medical errors, electronic
medical records (EMRs) are widely applied in hospital information systems. However …

New constructions for forward and backward private symmetric searchable encryption

J Ghareh Chamani, D Papadopoulos… - Proceedings of the …, 2018 - dl.acm.org
We study the problem of dynamic symmetric searchable encryption. In that setting, it is
crucial to minimize the information revealed to the server as a result of update operations …

Cloud computing security: foundations and research directions

A Chakraborti, R Curtmola, J Katz… - … and Trends® in …, 2022 - nowpublishers.com
Cloud services have revolutionized modern computing. The benefits of outsourcing data and
computation come with security and privacy concerns. This monograph explores the …

{DORY}: An encrypted search system with distributed trust

E Dauterman, E Feng, E Luo, RA Popa… - 14th USENIX Symposium …, 2020 - usenix.org
Efficient, leakage-free search on encrypted data has remained an unsolved problem for the
last two decades; efficient schemes are vulnerable to leakage-abuse attacks, and schemes …

Oblidb: Oblivious query processing for secure databases

S Eskandarian, M Zaharia - arXiv preprint arXiv:1710.00458, 2017 - arxiv.org
Hardware enclaves such as Intel SGX are a promising technology for improving the security
of databases outsourced to the cloud. These enclaves provide an execution environment …

Snoopy: Surpassing the scalability bottleneck of oblivious storage

E Dauterman, V Fang, I Demertzis, N Crooks… - Proceedings of the …, 2021 - dl.acm.org
Existing oblivious storage systems provide strong security by hiding access patterns, but do
not scale to sustain high throughput as they rely on a central point of coordination. To …

ROSE: Robust searchable encryption with forward and backward security

P Xu, W Susilo, W Wang, T Chen, Q Wu… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Dynamic searchable symmetric encryption (DSSE) has been widely recognized as a
promising technique to delegate update and search queries over an outsourced database to …

Forward and backward private searchable encryption with SGX

G Amjad, S Kamara, T Moataz - … of the 12th European Workshop on …, 2019 - dl.acm.org
Symmetric Searchable Encryption (SSE) schemes enable users to search over encrypted
data hosted on an untrusted server. Recently, there has been a lot of interest in forward and …

Doquet: Differentially Oblivious Range and Join Queries with Private Data Structures

L Qiu, G Kellaris, N Mamoulis, K Nissim… - Proceedings of the VLDB …, 2023 - dl.acm.org
Most cloud service providers offer limited data privacy guarantees, discouraging clients from
using them for managing their sensitive data. Cloud providers may use servers with Trusted …

Bringing decentralized search to decentralized services

M Li, J Zhu, T Zhang, C Tan, Y Xia, S Angel… - … USENIX} Symposium on …, 2021 - usenix.org
This paper addresses a key missing piece in the current ecosystem of decentralized
services and blockchain apps: the lack of decentralized, verifiable, and private search …