Revisiting leakage abuse attacks

L Blackstone, S Kamara, T Moataz - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Encrypted search algorithms (ESA) are cryptographic algorithms that support search over
encrypted data. ESAs can be designed with various primitives including …

Forward private searchable symmetric encryption with optimized I/O efficiency

X Song, C Dong, D Yuan, Q Xu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Recently, several practical attacks raised serious concerns over the security of searchable
encryption. The attacks have brought emphasis on forward privacy, which is the key concept …

{DORY}: An encrypted search system with distributed trust

E Dauterman, E Feng, E Luo, RA Popa… - 14th USENIX Symposium …, 2020 - usenix.org
Efficient, leakage-free search on encrypted data has remained an unsolved problem for the
last two decades; efficient schemes are vulnerable to leakage-abuse attacks, and schemes …

ROSE: Robust searchable encryption with forward and backward security

P Xu, W Susilo, W Wang, T Chen, Q Wu… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Dynamic searchable symmetric encryption (DSSE) has been widely recognized as a
promising technique to delegate update and search queries over an outsourced database to …

Lattice-based public key searchable encryption from experimental perspectives

R Behnia, MO Ozmen, AA Yavuz - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Public key Encryption with Keyword Search (PEKS) aims in mitigating the impacts of data
privacy versus utilization dilemma by allowing any user in the system to send encrypted files …

Bestie: Very practical searchable encryption with forward and backward security

T Chen, P Xu, W Wang, Y Zheng, W Susilo… - European Symposium on …, 2021 - Springer
Dynamic searchable symmetric-key encryption (DSSE) is a promising crypto-tool that
enables secure keyword searching over dynamically added or deleted ciphertexts …

Enabling efficient spatial keyword queries on encrypted data with strong security guarantees

X Wang, J Ma, F Li, X Liu, Y Miao… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Structured Encryption (STE), which allows a server to provide secure search services on
encrypted data structures, has been widely investigated in recent years. To meet expressive …

Hardware-supported ORAM in effect: Practical oblivious search and update on very large dataset

T Hoang, MO Ozmen, Y Jang, AA Yavuz - Proceedings on Privacy …, 2019 - par.nsf.gov
The ability to query and update over encrypted data is an essential feature to enable breach-
resilient cyber-infrastructures. Statistical attacks on searchable encryption (SE) have …

S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing

T Hoang, CD Ozkaptan, AA Yavuz, J Guajardo… - Proceedings of the …, 2017 - dl.acm.org
Oblivious Random Access Machine (ORAM) enables a client to access her data without
leaking her access patterns. Existing client-efficient ORAMs either achieve O (log N) client …

A secure searchable encryption framework for privacy-critical cloud storage services

T Hoang, AA Yavuz, J Guajardo - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Searchable encryption has received a significant attention from the research community with
various constructions being proposed, each achieving asymptotically optimal complexity for …