resources

Surveys
  • Tutorial on Encrypted Search @ Selected Areas in Cryptography (SAC) ‘19


  • SoK: Cryptographically Protected Database Search
    B. Fuller, M. Varia, A. Yerukhimovich, E. Shen, A. Hamlin, V. Gadepally, R. Shay, J. Darby Mitchell and R. K. Cunningham
    IEEE Symposium on Security and Privacy, 2017

  • Encrypted Search
    Seny Kamara
    ACM XRDS, 2015

  • How to Search on Encrypted Data @ ESL Blog ‘13

    • Introduction (blog)
    • Deterministic encryption (blog)
    • Functional encryption (blog)
    • Oblivious RAM (blog)
    • Searchable symmetric encryption (blog)
Tools
  • LEAKER: A framework for LEakage AttacK Evaluation on Real-world data [paper, github]