Organizing Committee
Abstract

The area of encrypted search focuses on the design and cryptanalysis of practical algorithms and systems that can search on end-to-end encrypted data. With encrypted search algorithms, data can remain encrypted even in use. As such, encrypted search algorithms have a wide array of applications including in data management, healthcare, cloud computing, mobile security, blockchains, and censorship- and surveillance-resistant systems.

Image for "Encrypted Search"

Confirmed Speakers & Participants

  • Speaker
  • Poster Presenter
  • Attendee
  • Virtual Attendee
  • Akshima -
    University of Chicago
  • Archita Agarwal
    Brown University
  • Elie Alhajjar
    US Military Academy
  • Amr Amr El Abadi
    UCSB
  • Megumi Ando
    Brown Univ. / MITRE
  • Dmytro Bogatov
    Boston University
  • Alexandra Boldyreva
    Georgia Tech
  • Raphael Bost
    Direction générale de l'armement
  • Elette Boyle
    IDC Herzliya
  • Chloe Cachet
    University of Connecticut
  • David Cash
    University of Chicago
  • Nathan Chenette
    Rose-Hulman
  • Ran Cohen
    NORTHEASTERN UNIVERSITY and Boston University
  • Luke Demarest
    University of Connecticut
  • Ioannis Demertzis
    University of Maryland
  • Francesca Falzon
    The University of Chicago
  • Peter Fenteany
    University of Connecticut
  • Benjamin Fuller
    University of Connecticut
  • Samprit Ghosh
    University of Toronto
  • Paul Grubbs
    Cornell University
  • Ariel Hamlin
    Northeastern University
  • David Heath
    Georgia Institute of Technology
  • Mireya Jurado
    Florida International University
  • Seny Kamara
    Brown University
  • Murat Kantarcioglu
    University of Texas at Dallas
  • Anurag Khandelwal
    UC Berkeley
  • Vlad Kolesnikov
    Georgia Institute of Technology
  • Evgenios Kornaropoulos
    Brown University
  • Hugo Krawczyk
    Algorand Foundation
  • George Markowsky
    Missouri University of Science & Technology
  • William Martin
    Worcester Polytechnic Institute
  • Brice Minaud
    Inria and ENS
  • Tarik Moataz
    Brown University
  • Adam O’Neill
    University of Massachusetts - Amherst
  • Charalampos Papamanthou
    University of Maryland
  • John Partridge
    Sifr Systems, Inc.
  • Giuseppe Persiano
    Universita di Salerno
  • Alexander Pilyavsky
    CUNY
  • Raluca Ada Popa
    UC Berkeley
  • Khem Poudel
    Middle Tenneessee State University
  • Lucy Qin
    Boston University
  • Mariana Raykova
    Google
  • Michael Rosenberg
    University of Maryland
  • Sarah Scheffler
    Boston University
  • Vitaly Shmatikov
    Cornell Tech
  • Jesse Stern
    Unviersity of Chicago
  • Tianxin Tang
    Georgia Tech
  • Stefano Tessaro
    University of Washington
  • Amos Treiber
    TU Darmstadt
  • Mayank Varia
    Boston University
  • Charles Wright
    Portland State University
  • David Wu
    University of Virginia
  • Arkady Yerukhimovich
    George Washington University
  • Li Zhang
    The Citadel
  • Cong Zhang
    Rutgers University
  • Zheguang Zhao
    Brown University

Workshop Schedule

Monday, June 10, 2019
TimeEventLocationMaterials
8:30 - 8:55am EDTRegistration - ICERM 121 South Main Street, Providence RI 0290311th Floor Collaborative Space 
8:55 - 9:00am EDTWelcome - ICERM Director11th Floor Lecture Hall 
9:00 - 9:45am EDTLeakage in the Cell Probe Model - Lower Bounds for Response Hiding Encrypted Multi-Maps. - Giuseppe Persiano, U. Salerno11th Floor Lecture Hall
10:00 - 10:30am EDTCoffee/Tea Break11th Floor Collaborative Space 
10:30 - 11:15am EDTLeakage Suppression and Structured Encryption - Tarik Moataz, Brown University11th Floor Lecture Hall
11:30 - 12:15pm EDTUnderstanding and Mitigating Leakage-Abuse Attacks against Searchable Encryption - Raphael Bost, Direction Générale de l'Armement - Maitrise de l'Information11th Floor Lecture Hall
12:30 - 2:30pm EDTBreak for Lunch / Free Time  
2:30 - 3:15pm EDTMitigating Attacks on Encrypted Databases via Adjustable Leakage - Ioannis Demertzis, University of Maryland11th Floor Lecture Hall
3:30 - 4:00pm EDTCoffee/Tea Break11th Floor Collaborative Space 
4:00 - 4:45pm EDTPanORAMa - Oblivious RAM with Logarithmic Overhead - Mariana Raykova, Google11th Floor Lecture Hall
5:00 - 6:30pm EDTWelcome Reception11th Floor Collaborative Space 
Tuesday, June 11, 2019
TimeEventLocationMaterials
9:00 - 9:45am EDTPrivate DB - Big-size searching from (many) small-size MPC instances - Vlad Kolesnikov, Georgia Tech11th Floor Lecture Hall
10:00 - 10:30am EDTCoffee/Tea Break11th Floor Collaborative Space 
10:30 - 11:15am EDTDEX - an Encrypted Relational Database - Zheguang Zhao, Brown University11th Floor Lecture Hall
11:30 - 12:15pm EDTSimple searchable encryption framework for supporting complex queries - Murat Kantarcioglu, UT Dallas11th Floor Lecture Hall
12:30 - 2:30pm EDTBreak for Lunch / Free Time  
2:30 - 3:15pm EDTDemystifying Blockchains and the Challenges of Fault-tolerance, Transparency and Privacy in Large Scale Data. - Amr El Abbadi, University of California, Santa Barbara11th Floor Lecture Hall
3:30 - 4:00pm EDTCoffee/Tea Break11th Floor Collaborative Space 
4:00 - 4:45pm EDTOblix - An Efficient Oblivious Search Index - Raluca Ada Popa, UC Berkeley11th Floor Lecture Hall
Wednesday, June 12, 2019
TimeEventLocationMaterials
9:00 - 9:45am EDTOrder-Revealing Encryption - Definitions, Constructions, and Challenges - David Wu, University of Virginia11th Floor Lecture Hall
10:00 - 10:30am EDTCoffee/Tea Break11th Floor Collaborative Space 
10:30 - 11:15am EDTSupporting less-than queries on encrypted data using multi-server secret sharing and practical order-revealing encryption - Nathan Chenette, Rose-Hulman Institute of Technology11th Floor Lecture Hall
11:30 - 12:15pm EDTParameter-Hiding Order Revealing Encryption - Cong Zhang, Rutgers University11th Floor Lecture Hall
12:30 - 12:40pm EDTGroup Photo11th Floor Lecture Hall 
12:40 - 2:30pm EDTBreak for Lunch / Free Time  
2:30 - 3:15pm EDTRecent Developments in Format-Preserving Encryption - Stefano Tessaro, University of Washington11th Floor Lecture Hall
3:30 - 4:00pm EDTCoffee/Tea Break11th Floor Collaborative Space 
4:00 - 5:00pm EDTLightning Talks Session11th Floor Lecture Hall 
Thursday, June 13, 2019
TimeEventLocationMaterials
9:00 - 9:45am EDTHow To Build a Bad Database Out of Good Encryption - Vitaly Shmatikov, Cornell Tech11th Floor Lecture Hall
10:00 - 10:30am EDTCoffee/Tea Break11th Floor Collaborative Space 
10:30 - 11:15am EDTA Review of Database Reconstruction - Brice Minaud, Inria and ENS11th Floor Lecture Hall
11:30 - 12:15pm EDTLearning to Reconstruct - Statistical Learning Theory and Encrypted Database Attacks - Paul Grubbs, Cornell Tech11th Floor Lecture Hall
12:30 - 2:30pm EDTBreak for Lunch / Free Time  
2:30 - 3:15pm EDT Attacks on Encrypted Databases Beyond the Uniform Query Distribution - Evgenios Kornaropoulos, Brown University11th Floor Lecture Hall
3:30 - 4:00pm EDTCoffee/Tea Break11th Floor Collaborative Space 
4:00 - 4:45pm EDTPrivate Data Access via Function Secret Sharing - Elette Boyle, IDC Herzliya11th Floor Lecture Hall
Friday, June 14, 2019
TimeEventLocationMaterials
9:00 - 9:45am EDTPANDA- Private Anonymous Data Access - Ariel Hamlin, Northeastern University11th Floor Lecture Hall
10:00 - 10:30am EDTCoffee/Tea Break11th Floor Collaborative Space 
10:30 - 11:15am EDTPrivacy-Preserving Network Provenance - Adam O'Neill, University of Massachusetts Amherst11th Floor Lecture Hall
11:30 - 12:15pm EDTEncrypted Distributed Hash Tables - Archita Agarwal, Brown University11th Floor Lecture Hall
12:30 - 2:30pm EDTBreak for Lunch / Free Time  
2:30 - 3:15pm EDTWeakly Randomized Encryption - Charles Wright, Portland State University11th Floor Lecture Hall
3:30 - 4:00pm EDTCoffee/Tea Break11th Floor Collaborative Space 

Lecture Videos

Encrypted Distributed Hash Tables

Archita Agarwal
Brown University
June 14, 2019

PANDA- Private Anonymous Data Access

Ariel Hamlin
Northeastern University
June 14, 2019

A Review of Database Reconstruction

Brice Minaud
Inria and ENS
June 13, 2019

Recent Developments in Format-Preserving Encryption

Stefano Tessaro
University of Washington
June 12, 2019

Parameter-Hiding Order Revealing Encryption

Cong Zhang
Rutgers University
June 12, 2019

Oblix - An Efficient Oblivious Search Index

Raluca Ada Popa
UC Berkeley
June 11, 2019

Simple searchable encryption framework for supporting complex queries

Murat Kantarcioglu
University of Texas at Dallas
June 11, 2019

Private DB - Big-size searching from (many) small-size MPC instances

Vlad Kolesnikov
Georgia Institute of Technology
June 11, 2019

Mitigating Attacks on Encrypted Databases via Adjustable Leakage

Ioannis Demertzis
University of Maryland
June 10, 2019

Leakage Suppression and Structured Encryption

Tarik Moataz
Brown University
June 10, 2019