Public-key authenticated encryption with keyword search supporting constant trapdoor generation and fast search
To improve the quality of medical care and reduce unnecessary medical errors, electronic
medical records (EMRs) are widely applied in hospital information systems. However …
medical records (EMRs) are widely applied in hospital information systems. However …
New constructions for forward and backward private symmetric searchable encryption
J Ghareh Chamani, D Papadopoulos… - Proceedings of the …, 2018 - dl.acm.org
We study the problem of dynamic symmetric searchable encryption. In that setting, it is
crucial to minimize the information revealed to the server as a result of update operations …
crucial to minimize the information revealed to the server as a result of update operations …
Cloud computing security: foundations and research directions
Cloud services have revolutionized modern computing. The benefits of outsourcing data and
computation come with security and privacy concerns. This monograph explores the …
computation come with security and privacy concerns. This monograph explores the …
{DORY}: An encrypted search system with distributed trust
E Dauterman, E Feng, E Luo, RA Popa… - 14th USENIX Symposium …, 2020 - usenix.org
Efficient, leakage-free search on encrypted data has remained an unsolved problem for the
last two decades; efficient schemes are vulnerable to leakage-abuse attacks, and schemes …
last two decades; efficient schemes are vulnerable to leakage-abuse attacks, and schemes …
Oblidb: Oblivious query processing for secure databases
S Eskandarian, M Zaharia - arXiv preprint arXiv:1710.00458, 2017 - arxiv.org
Hardware enclaves such as Intel SGX are a promising technology for improving the security
of databases outsourced to the cloud. These enclaves provide an execution environment …
of databases outsourced to the cloud. These enclaves provide an execution environment …
Snoopy: Surpassing the scalability bottleneck of oblivious storage
Existing oblivious storage systems provide strong security by hiding access patterns, but do
not scale to sustain high throughput as they rely on a central point of coordination. To …
not scale to sustain high throughput as they rely on a central point of coordination. To …
ROSE: Robust searchable encryption with forward and backward security
Dynamic searchable symmetric encryption (DSSE) has been widely recognized as a
promising technique to delegate update and search queries over an outsourced database to …
promising technique to delegate update and search queries over an outsourced database to …
Forward and backward private searchable encryption with SGX
Symmetric Searchable Encryption (SSE) schemes enable users to search over encrypted
data hosted on an untrusted server. Recently, there has been a lot of interest in forward and …
data hosted on an untrusted server. Recently, there has been a lot of interest in forward and …
Doquet: Differentially Oblivious Range and Join Queries with Private Data Structures
Most cloud service providers offer limited data privacy guarantees, discouraging clients from
using them for managing their sensitive data. Cloud providers may use servers with Trusted …
using them for managing their sensitive data. Cloud providers may use servers with Trusted …
Bringing decentralized search to decentralized services
This paper addresses a key missing piece in the current ecosystem of decentralized
services and blockchain apps: the lack of decentralized, verifiable, and private search …
services and blockchain apps: the lack of decentralized, verifiable, and private search …