Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage
نویسندگان
چکیده
08:30 – 09:30 Powhiri welcome Registration 08:00 – 17:10 09:30 – 10:30 Jennifer Seberry Lecture: Prof. Clark Thomborson 10:30 – 10:50 Coffee break 11:50 – 12:30 Regular papers – Session 1A + 1B 12:30 – 13:20 Lunch 13:20 – 14:00 Invited Talk 1: A/Prof Henry B Wolfe 14:00 – 15:15 Regular papers – Session 2A + 2B 15:15 – 15:40 Coffee break 15:40 – 16:30 Regular papers Session 3A+ 3B 16:30 – 17:00 Short papers – Session 1A + 1B 17:00 – 17:30 Steering Committee meeting 17:30 Welcome reception
منابع مشابه
Dynamic Similarity Search over Encrypted Data with Low Leakage
Though cloud databases offer advantages in terms of maintenance cost, they require encryption in order to protect confidential records. Specialized searchable encryption schemes are needed to provide the functionality of privacy preserving search on encrypted data. In many use cases, a search which also returns the correct documents when the search term was misspelled is very desirable. Therefo...
متن کاملFuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملPractical Dynamic Searchable Encryption with Small Leakage
Dynamic Searchable Symmetric Encryption (DSSE) enables a client to encrypt his document collection in a way that it is still searchable and efficiently updatable. However, all DSSE constructions that have been presented in the literature so far come with several problems: Either they leak a significant amount of information (e.g., hashes of the keywords contained in the updated document) or are...
متن کاملBrowse searchable encryption schemes: Classification, methods and recent developments
With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...
متن کاملThe Fallacy of Composition of Oblivious RAM and Searchable Encryption
Oblivious RAM (ORAM) is a tool proposed to hide access pattern leakage, and there has been a lot of progress in the efficiency of ORAM schemes; however, less attention has been paid to study the applicability of ORAM for cloud applications such as symmetric searchable encryption (SSE). Although, searchable encryption is one of the motivations for ORAM research, no in-depth study of the applicab...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017