{Near-Optimal} Oblivious {Key-Value} Stores for Efficient {PSI},{PSU} and {Volume-Hiding}{Multi-Maps}

A Bienstock, S Patel, JY Seo, K Yeo - 32nd USENIX Security Symposium …, 2023 - usenix.org
In this paper, we study oblivious key-value stores (OKVS) that enable encoding n key-value
pairs into length m encodings while hiding the input keys. The goal is to obtain high rate …

High recovery with fewer injections: Practical binary volumetric injection attacks against dynamic searchable encryption

X Zhang, W Wang, P Xu, LT Yang, K Liang - 32nd USENIX Security …, 2023 - usenix.org
Searchable symmetric encryption enables private queries over an encrypted database, but it
can also result in information leakages. Adversaries can exploit these leakages to launch …

Leakage-abuse attacks against forward and backward private searchable symmetric encryption

L Xu, L Zheng, C Xu, X Yuan, C Wang - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
Dynamic searchable symmetric encryption (DSSE) enables a server to efficiently search and
update over encrypted files. To minimize the leakage during updates, a security notion …

Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage

Q Tong, X Li, Y Miao, Y Wang, X Liu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Boolean range query (BRQ) is a typical type of spatial keyword query that is widely used in
geographic information systems, location-based services and other applications. It retrieves …

Achieving efficient and privacy-preserving location-based task recommendation in spatial crowdsourcing

F Song, J Liang, C Zhang, Z Fu, Z Qin… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In spatial crowdsourcing, location-based task recommendation schemes are widely used to
match appropriate workers in desired geographic areas with relevant tasks from data …

Veil: A Storage and Communication Efficient Volume-Hiding Algorithm

S Han, V Chakraborty, MT Goodrich… - Proceedings of the …, 2023 - dl.acm.org
This paper addresses volume leakage (ie, leakage of the number of records in the answer
set) when processing keyword queries in encrypted key-value (KV) datasets. Volume …

Hiding Access-pattern is Not Enough! Veil: A Storage and Communication Efficient Volume-Hiding Algorithm

S Han, V Chakraborty, M Goodrich, S Mehrotra… - arXiv preprint arXiv …, 2023 - arxiv.org
This paper addresses volume leakage (ie, leakage of the number of records in the answer
set) when processing keyword queries in encrypted key-value (KV) datasets. Volume …

Owner-free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries

Q Tong, X Li, Y Miao, Y Wang, X Liu… - ACM Transactions on …, 2023 - dl.acm.org
Symmetric Searchable Encryption (SSE), as an ideal primitive, can ensure data privacy
while supporting retrieval over encrypted data. However, existing multi-user SSE schemes …

Efficient dynamic multi-client searchable encryption supporting fuzzy search

S Liu, X Liu, W Huang, K Du - Computer Standards & Interfaces, 2024 - Elsevier
Searchable symmetric encryption (SSE) enables the client to outsource its encrypted
database to the untrusted server, while maintaining the ability to efficiently search over it …

Toward full accounting for leakage exploitation and mitigation in dynamic encrypted databases

L Xu, A Zhou, H Duan, C Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Encrypted databases have garnered considerable attention for their ability to safeguard
sensitive data outsourced to third parties. However, recent studies have revealed the …