The Many Faces of End-to-End Encryption and Their Security Analysis

@article{Nabeel2017TheMF,
  title={The Many Faces of End-to-End Encryption and Their Security Analysis},
  author={Mohamed Nabeel},
  journal={2017 IEEE International Conference on Edge Computing (EDGE)},
  year={2017},
  pages={252-259}
}
  • Mohamed Nabeel
  • Published 2017
  • Computer Science
  • 2017 IEEE International Conference on Edge Computing (EDGE)
Due to increased government surveillance as well as data breaches, end-to-end encryption has recently received an increasing attention as a way to protect against such threats. End-to-end (E2E) encryption preserve the confidentiality of data on the wire as well as from service providers by performing encryption/decryption at clients keeping the keys strictly within client devices. There are many variants of end-to-end encryption schemes for different communication patterns. In this paper, we… Expand
2 Citations

References

SHOWING 1-10 OF 48 REFERENCES
Leakage-Abuse Attacks Against Searchable Encryption
Breaking Web Applications Built On Top of Encrypted Data
Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions
Generic Attacks on Secure Outsourced Databases
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds
Inference Attacks on Property-Preserving Encrypted Databases
A Survey of Provably Secure Searchable Encryption
Practical Order-Revealing Encryption with Limited Leakage
Secure database-as-a-service with Cipherbase
...
1
2
3
4
5
...