An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Searchable Symmetric Encryption (SSE).
Thanks to all contributors, you're awesome and wouldn't be possible without you! Our goal is to build a categorized community-driven collection of very well-known resources.
Searchable symmetric encryption (SSE) is a form of encryption that allows one to efficiently search over a collection of encrypted documents or files without the ability to decrypt them.
- [Curtmola et al. 2006], Searchable symmetric encryption: improved definitions and efficient constructions
- [Chase et al. 2010], Structured Encryption and Controlled Disclosure
- [Cash et al. 2013], Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
- [Cash et al. 2014], Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
- [Bösch et al. 2015], A Survey of Provably Secure Searchable Encryption
- [Poh et al. 2017], Searchable Symmetric Encryption: Designs and Challenges
- [Fuller et al. 2017], SoK: Cryptographically Protected Database Search
- [Chang et al. 2005], Privacy Preserving Keyword Searches on Remote Encrypted Data.
- [Stefanov et al. 2014], Practical Dynamic Searchable Encryption with Small Leakage
- [Rafaël Bost. 2016], Σoφoς – Forward Secure Searchable Encryption
- [Bost et al. 2017], Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
- [Chamani et al. 2018], New Constructions for Forward and Backward Private Symmetric Searchable Encryption
- [Sun et al 2018], Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption
- [Cashe et al. 2013], Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
- [Kamara et al. 2017], Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear
- [Cash et al. 2014], The Locality of Searchable Symmetric Encryption
- [Asharov et al. 2016], Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations
- [Demertzis et al. 2017], Fast Searchable Encryption With Tunable Locality
- [Kurosowa et al. 2012], UC-Secure Searchable Symmetric Encryption
- [Bost et al. 2016], Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security
- [Mattew Green, 2019], Attack of the week: searchable encryption and the ever-expanding leakage function
- [Islam et al. 2012], Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation
- [Liu et al. 2013], Search Pattern Leakage in Searchable Encryption: Attacks and New Construction
- [Naveed et al. 2015], Inference Attacks on Property-Preserving Encrypted Databases, (slides)
- [Cash et al. 2015], Leakage-Abuse Attacks Against Searchable Encryption
- [Grubbs et al. 2016], Breaking Web Applications Built On Top of Encrypted Data
- [Zhang et al. 2016], All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption
- [Kellaris et al. 2016], Generic Attacks on Secure Outsourced Databases
- [Grubbs et al. 2017], Why Your Encrypted Database Is Not Secure
- [Giraud et al. 2017], Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption
- [Bost et al. 2017], Thwarting Leakage Abuse Attacks against Searchable Encryption -- A Formal Approach and Applications to Database Padding
- [Lacharité et al. 2017], Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage
- [Ning et al. 2018], Passive Attacks Against Searchable Encryption
- [Grubbs et al. 2019], Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
I would like to thank all the smart people who have started this exciting field of security and cryptography, and those who have contributed to this relatively young research area. We thank Fuller et al. 2017 and Raphael Bost (his website) whose work has motivated us to make this list.
MIT License & cc license
This work is licensed under a Creative Commons Attribution 4.0 International License.
To the extent possible under law, Paul Veillard has waived all copyright and related or neighboring rights to this work.