Organizing Committee
Abstract

The area of encrypted search focuses on the design and cryptanalysis of practical algorithms and systems that can search on end-to-end encrypted data. With encrypted search algorithms, data can remain encrypted even in use. As such, encrypted search algorithms have a wide array of applications including in data management, healthcare, cloud computing, mobile security, blockchains, and censorship- and surveillance-resistant systems.

Image for "Encrypted Search"

Confirmed Speakers & Participants

Talks will be presented virtually or in-person as indicated in the schedule below.

  • Speaker
  • Poster Presenter
  • Attendee
  • Virtual Attendee

Workshop Schedule

Monday, June 10, 2019
TimeEventLocationMaterials
8:30 - 8:55am EDTRegistration - ICERM 121 South Main Street, Providence RI 0290311th Floor Collaborative Space 
8:55 - 9:00am EDTWelcome - ICERM Director11th Floor Lecture Hall 
9:00 - 9:45am EDTLeakage in the Cell Probe Model - Lower Bounds for Response Hiding Encrypted Multi-Maps. - Giuseppe Persiano, U. Salerno11th Floor Lecture Hall
10:00 - 10:30am EDTCoffee/Tea Break11th Floor Collaborative Space 
10:30 - 11:15am EDTLeakage Suppression and Structured Encryption - Tarik Moataz, Brown University11th Floor Lecture Hall
11:30 - 12:15pm EDTUnderstanding and Mitigating Leakage-Abuse Attacks against Searchable Encryption - Raphael Bost, Direction Générale de l'Armement - Maitrise de l'Information11th Floor Lecture Hall
12:30 - 2:30pm EDTBreak for Lunch / Free Time  
2:30 - 3:15pm EDTMitigating Attacks on Encrypted Databases via Adjustable Leakage - Ioannis Demertzis, University of Maryland11th Floor Lecture Hall
3:30 - 4:00pm EDTCoffee/Tea Break11th Floor Collaborative Space 
4:00 - 4:45pm EDTPanORAMa - Oblivious RAM with Logarithmic Overhead - Mariana Raykova, Google11th Floor Lecture Hall
5:00 - 6:30pm EDTWelcome Reception11th Floor Collaborative Space 
Tuesday, June 11, 2019
TimeEventLocationMaterials
9:00 - 9:45am EDTPrivate DB - Big-size searching from (many) small-size MPC instances - Vlad Kolesnikov, Georgia Tech11th Floor Lecture Hall
10:00 - 10:30am EDTCoffee/Tea Break11th Floor Collaborative Space 
10:30 - 11:15am EDTDEX - an Encrypted Relational Database - Zheguang Zhao, Brown University11th Floor Lecture Hall
11:30 - 12:15pm EDTSimple searchable encryption framework for supporting complex queries - Murat Kantarcioglu, UT Dallas11th Floor Lecture Hall
12:30 - 2:30pm EDTBreak for Lunch / Free Time  
2:30 - 3:15pm EDTDemystifying Blockchains and the Challenges of Fault-tolerance, Transparency and Privacy in Large Scale Data. - Amr El Abbadi, University of California, Santa Barbara11th Floor Lecture Hall
3:30 - 4:00pm EDTCoffee/Tea Break11th Floor Collaborative Space 
4:00 - 4:45pm EDTOblix - An Efficient Oblivious Search Index - Raluca Ada Popa, UC Berkeley11th Floor Lecture Hall
Wednesday, June 12, 2019
TimeEventLocationMaterials
9:00 - 9:45am EDTOrder-Revealing Encryption - Definitions, Constructions, and Challenges - David Wu, University of Virginia11th Floor Lecture Hall
10:00 - 10:30am EDTCoffee/Tea Break11th Floor Collaborative Space 
10:30 - 11:15am EDTSupporting less-than queries on encrypted data using multi-server secret sharing and practical order-revealing encryption - Nathan Chenette, Rose-Hulman Institute of Technology11th Floor Lecture Hall
11:30 - 12:15pm EDTParameter-Hiding Order Revealing Encryption - Cong Zhang, Rutgers University11th Floor Lecture Hall
12:30 - 12:40pm EDTGroup Photo11th Floor Lecture Hall 
12:40 - 2:30pm EDTBreak for Lunch / Free Time  
2:30 - 3:15pm EDTRecent Developments in Format-Preserving Encryption - Stefano Tessaro, University of Washington11th Floor Lecture Hall
3:30 - 4:00pm EDTCoffee/Tea Break11th Floor Collaborative Space 
4:00 - 5:00pm EDTLightning Talks Session11th Floor Lecture Hall 
Thursday, June 13, 2019
TimeEventLocationMaterials
9:00 - 9:45am EDTHow To Build a Bad Database Out of Good Encryption - Vitaly Shmatikov, Cornell Tech11th Floor Lecture Hall
10:00 - 10:30am EDTCoffee/Tea Break11th Floor Collaborative Space 
10:30 - 11:15am EDTA Review of Database Reconstruction - Brice Minaud, Inria and ENS11th Floor Lecture Hall
11:30 - 12:15pm EDTLearning to Reconstruct - Statistical Learning Theory and Encrypted Database Attacks - Paul Grubbs, Cornell Tech11th Floor Lecture Hall
12:30 - 2:30pm EDTBreak for Lunch / Free Time  
2:30 - 3:15pm EDT Attacks on Encrypted Databases Beyond the Uniform Query Distribution - Evgenios Kornaropoulos, Brown University11th Floor Lecture Hall
3:30 - 4:00pm EDTCoffee/Tea Break11th Floor Collaborative Space 
4:00 - 4:45pm EDTPrivate Data Access via Function Secret Sharing - Elette Boyle, IDC Herzliya11th Floor Lecture Hall
Friday, June 14, 2019
TimeEventLocationMaterials
9:00 - 9:45am EDTPANDA- Private Anonymous Data Access - Ariel Hamlin, Northeastern University11th Floor Lecture Hall
10:00 - 10:30am EDTCoffee/Tea Break11th Floor Collaborative Space 
10:30 - 11:15am EDTPrivacy-Preserving Network Provenance - Adam O'Neill, University of Massachusetts Amherst11th Floor Lecture Hall
11:30 - 12:15pm EDTEncrypted Distributed Hash Tables - Archita Agarwal, Brown University11th Floor Lecture Hall
12:30 - 2:30pm EDTBreak for Lunch / Free Time  
2:30 - 3:15pm EDTWeakly Randomized Encryption - Charles Wright, Portland State University11th Floor Lecture Hall
3:30 - 4:00pm EDTCoffee/Tea Break11th Floor Collaborative Space 

Lecture Videos

Encrypted Distributed Hash Tables

Archita Agarwal
Brown University
June 14, 2019

PANDA- Private Anonymous Data Access

Ariel Hamlin
Northeastern University
June 14, 2019

A Review of Database Reconstruction

Brice Minaud
Inria and ENS
June 13, 2019

Recent Developments in Format-Preserving Encryption

Stefano Tessaro
University of Washington
June 12, 2019

Parameter-Hiding Order Revealing Encryption

Cong Zhang
Rutgers University
June 12, 2019

Oblix - An Efficient Oblivious Search Index

Raluca Ada Popa
UC Berkeley
June 11, 2019

Simple searchable encryption framework for supporting complex queries

Murat Kantarcioglu
University of Texas at Dallas
June 11, 2019

Private DB - Big-size searching from (many) small-size MPC instances

Vlad Kolesnikov
Georgia Institute of Technology
June 11, 2019

Mitigating Attacks on Encrypted Databases via Adjustable Leakage

Ioannis Demertzis
University of Maryland
June 10, 2019

Leakage Suppression and Structured Encryption

Tarik Moataz
Brown University
June 10, 2019