Private search in the real world

  title={Private search in the real world},
  author={Vasilis Pappas and Mariana Raykova and Binh Vo and Steven M. Bellovin and Tal Malkin},
Encrypted search --- performing queries on protected data --- has been explored in the past; however, its inherent inefficiency has raised questions of practicality. Here, we focus on improving the performance and extending its functionality enough to make it practical. We do this by optimizing the system, and by stepping back from the goal of achieving maximal privacy guarantees in an encrypted search scenario and consider efficiency and functionality as priorities. We design and analyze the… CONTINUE READING
Highly Cited
This paper has 27 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 13 extracted citations

Better Security for Queries on Encrypted Databases

IACR Cryptology ePrint Archive • 2016
View 1 Excerpt

Blind Seer: A Scalable Private DBMS

2014 IEEE Symposium on Security and Privacy • 2014
View 1 Excerpt

Trading Privacy in the Cloud: A Fairer Way to Share Private Information

2013 IEEE 10th International Conference on e-Business Engineering • 2013


Publications referenced by this paper.
Showing 1-6 of 6 references

Searchable symmetric encryption: improved definitions and efficient constructions

ACM Conference on Computer and Communications Security • 2006
View 4 Excerpts
Highly Influenced

Privacy Preserving Keyword Searches on Remote Encrypted Data

IACR Cryptology ePrint Archive • 2004
View 4 Excerpts
Highly Influenced

Public Key Encryption with keyword Search

IACR Cryptology ePrint Archive • 2003
View 4 Excerpts
Highly Influenced

Security and Composition of Multiparty Cryptographic Protocols

Journal of Cryptology • 1998
View 3 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…