Organizing Committee
Abstract

The area of encrypted search focuses on the design and cryptanalysis of practical algorithms and systems that can search on end-to-end encrypted data. With encrypted search algorithms, data can remain encrypted even in use. As such, encrypted search algorithms have a wide array of applications including in data management, healthcare, cloud computing, mobile security, blockchains, and censorship- and surveillance-resistant systems.

Confirmed Speakers & Participants

  • Speaker
  • Poster Presenter
  • Attendee
  • Akshima -
    University of Chicago
  • Archita Agarwal
    Brown University
  • Elie Alhajjar
    US Military Academy
  • Amr Amr El Abadi
    UCSB
  • Megumi Ando
    Brown Univ. / MITRE
  • Dmytro Bogatov
    Boston University
  • Alexandra Boldyreva
    Georgia Tech
  • Raphael Bost
    Direction générale de l'armement
  • Elette Boyle
    IDC Herzliya
  • Chloe Cachet
    University of Connecticut
  • David Cash
    University of Chicago
  • Nathan Chenette
    Rose-Hulman
  • Ran Cohen
    NORTHEASTERN UNIVERSITY and Boston University
  • Luke Demarest
    University of Connecticut
  • Ioannis Demertzis
    University of Maryland
  • Francesca Falzon
    The University of Chicago
  • Peter Fenteany
    University of Connecticut
  • Benjamin Fuller
    University of Connecticut
  • Samprit Ghosh
    University of Toronto
  • Paul Grubbs
    Cornell University
  • Ariel Hamlin
    Northeastern University
  • David Heath
    Georgia Institute of Technology
  • Mireya Jurado
    Florida International University
  • Seny Kamara
    Brown University
  • Murat Kantarcioglu
    University of Texas at Dallas
  • Anurag Khandelwal
    UC Berkeley
  • Vlad Kolesnikov
    Georgia Institute of Technology
  • Evgenios Kornaropoulos
    Brown University
  • Hugo Krawczyk
    Algorand Foundation
  • George Markowsky
    Missouri University of Science & Technology
  • William Martin
    Worcester Polytechnic Institute
  • Brice Minaud
    Inria and ENS
  • Tarik Moataz
    Brown University
  • Adam O’Neill
    University of Massachusetts - Amherst
  • Charalampos Papamanthou
    University of Maryland
  • John Partridge
    Sifr Systems, Inc.
  • Giuseppe Persiano
    Universita di Salerno
  • Alexander Pilyavsky
    CUNY
  • Raluca Ada Popa
    UC Berkeley
  • Khem Poudel
    Middle Tenneessee State University
  • Lucy Qin
    Boston University
  • Mariana Raykova
    Google
  • Michael Rosenberg
    University of Maryland
  • Sarah Scheffler
    Boston University
  • Vitaly Shmatikov
    Cornell Tech
  • Jesse Stern
    Unviersity of Chicago
  • Tianxin Tang
    Georgia Tech
  • Stefano Tessaro
    University of Washington
  • Amos Treiber
    TU Darmstadt
  • Mayank Varia
    Boston University
  • Charles Wright
    Portland State University
  • David Wu
    University of Virginia
  • Arkady Yerukhimovich
    George Washington University
  • Li Zhang
    The Citadel
  • Cong Zhang
    Rutgers University
  • Zheguang Zhao
    Brown University

Workshop Schedule

Monday, June 10, 2019
TimeEventLocationMaterials
8:30 - 8:55Registration - ICERM 121 South Main Street, Providence RI 0290311th Floor Collaborative Space 
8:55 - 9:00Welcome - ICERM Director11th Floor Lecture Hall 
9:00 - 9:45Leakage in the Cell Probe Model - Lower Bounds for Response Hiding Encrypted Multi-Maps. - Giuseppe Persiano, U. Salerno11th Floor Lecture Hall
10:00 - 10:30Coffee/Tea Break11th Floor Collaborative Space 
10:30 - 11:15Leakage Suppression and Structured Encryption - Tarik Moataz, Brown University11th Floor Lecture Hall
11:30 - 12:15Understanding and Mitigating Leakage-Abuse Attacks against Searchable Encryption - Raphael Bost, Direction Générale de l'Armement - Maitrise de l'Information11th Floor Lecture Hall
12:30 - 2:30Break for Lunch / Free Time  
2:30 - 3:15Mitigating Attacks on Encrypted Databases via Adjustable Leakage - Ioannis Demertzis, University of Maryland11th Floor Lecture Hall
3:30 - 4:00Coffee/Tea Break11th Floor Collaborative Space 
4:00 - 4:45PanORAMa - Oblivious RAM with Logarithmic Overhead - Mariana Raykova, Google11th Floor Lecture Hall
5:00 - 6:30Welcome Reception11th Floor Collaborative Space 
Tuesday, June 11, 2019
TimeEventLocationMaterials
9:00 - 9:45Private DB - Big-size searching from (many) small-size MPC instances - Vlad Kolesnikov, Georgia Tech11th Floor Lecture Hall
10:00 - 10:30Coffee/Tea Break11th Floor Collaborative Space 
10:30 - 11:15DEX - an Encrypted Relational Database - Zheguang Zhao, Brown University11th Floor Lecture Hall
11:30 - 12:15Simple searchable encryption framework for supporting complex queries - Murat Kantarcioglu, UT Dallas11th Floor Lecture Hall
12:30 - 2:30Break for Lunch / Free Time  
2:30 - 3:15Demystifying Blockchains and the Challenges of Fault-tolerance, Transparency and Privacy in Large Scale Data. - Amr El Abbadi, University of California, Santa Barbara11th Floor Lecture Hall
3:30 - 4:00Coffee/Tea Break11th Floor Collaborative Space 
4:00 - 4:45Oblix - An Efficient Oblivious Search Index - Raluca Ada Popa, UC Berkeley11th Floor Lecture Hall
Wednesday, June 12, 2019
TimeEventLocationMaterials
9:00 - 9:45Order-Revealing Encryption - Definitions, Constructions, and Challenges - David Wu, University of Virginia11th Floor Lecture Hall
10:00 - 10:30Coffee/Tea Break11th Floor Collaborative Space 
10:30 - 11:15Supporting less-than queries on encrypted data using multi-server secret sharing and practical order-revealing encryption - Nathan Chenette, Rose-Hulman Institute of Technology11th Floor Lecture Hall
11:30 - 12:15Parameter-Hiding Order Revealing Encryption - Cong Zhang, Rutgers University11th Floor Lecture Hall
12:30 - 12:40Group Photo11th Floor Lecture Hall 
12:40 - 2:30Break for Lunch / Free Time  
2:30 - 3:15Recent Developments in Format-Preserving Encryption - Stefano Tessaro, University of Washington11th Floor Lecture Hall
3:30 - 4:00Coffee/Tea Break11th Floor Collaborative Space 
4:00 - 5:00Lightning Talks Session11th Floor Lecture Hall 
Thursday, June 13, 2019
TimeEventLocationMaterials
9:00 - 9:45How To Build a Bad Database Out of Good Encryption - Vitaly Shmatikov, Cornell Tech11th Floor Lecture Hall
10:00 - 10:30Coffee/Tea Break11th Floor Collaborative Space 
10:30 - 11:15A Review of Database Reconstruction - Brice Minaud, Inria and ENS11th Floor Lecture Hall
11:30 - 12:15Learning to Reconstruct - Statistical Learning Theory and Encrypted Database Attacks - Paul Grubbs, Cornell Tech11th Floor Lecture Hall
12:30 - 2:30Break for Lunch / Free Time  
2:30 - 3:15 Attacks on Encrypted Databases Beyond the Uniform Query Distribution - Evgenios Kornaropoulos, Brown University11th Floor Lecture Hall
3:30 - 4:00Coffee/Tea Break11th Floor Collaborative Space 
4:00 - 4:45Private Data Access via Function Secret Sharing - Elette Boyle, IDC Herzliya11th Floor Lecture Hall
Friday, June 14, 2019
TimeEventLocationMaterials
9:00 - 9:45PANDA- Private Anonymous Data Access - Ariel Hamlin, Northeastern University11th Floor Lecture Hall
10:00 - 10:30Coffee/Tea Break11th Floor Collaborative Space 
10:30 - 11:15Privacy-Preserving Network Provenance - Adam O'Neill, University of Massachusetts Amherst11th Floor Lecture Hall
11:30 - 12:15Encrypted Distributed Hash Tables - Archita Agarwal, Brown University11th Floor Lecture Hall
12:30 - 2:30Break for Lunch / Free Time  
2:30 - 3:15Weakly Randomized Encryption - Charles Wright, Portland State University11th Floor Lecture Hall
3:30 - 4:00Coffee/Tea Break11th Floor Collaborative Space 

Request Reimbursement

Acceptable Costs
  • 1 roundtrip between your home institute and ICERM
  • Flights on U.S. or E.U. airlines – economy class to either Providence airport (PVD) or Boston airport (BOS)
  • Ground Transportation to and from airports and ICERM.
Unacceptable Costs
  • Flights on non-U.S. or non-E.U. airlines
  • Flights on U.K. airlines
  • Seats in economy plus, business class, or first class
  • Change ticket fees of any kind
  • Multi-use bus passes
  • Meals or incidentals
Advance Approval Required
  • Personal car travel to ICERM from outside New England
  • Multiple-destination plane ticket; does not include layovers to reach ICERM
  • Arriving or departing from ICERM more than a day before or day after the program
  • Multiple trips to ICERM
  • Rental car to/from ICERM
  • Flights on a Swiss, Japanese, or Australian airlines
  • Arriving or departing from airport other than PVD/BOS or home institution's local airport
  • 2 one-way plane tickets to create a roundtrip (often purchased from Expedia, Orbitz, etc.)
Reimbursement Request Form

https://icerm.brown.edu/money/

Refer to the back of your ID badge for more information. Checklists are available at the front desk.

Reimbursement Tips
  • Scanned original receipts are required for all expenses
  • Airfare receipt must show full itinerary and payment
  • ICERM does not offer per diem or meal reimbursement
  • Allowable mileage is reimbursed at prevailing IRS Business Rate and trip documented via pdf of Google Maps result
  • Keep all documentation until you receive your reimbursement!
Reimbursement Timing

6 - 8 weeks after all documentation is sent to ICERM. All reimbursement requests are reviewed by numerous central offices at Brown who may request additional documentation.

Reimbursement Deadline

Submissions must be received within 30 days of ICERM departure to avoid applicable taxes. Submissions after thirty days will incur applicable taxes. No submissions are accepted more than six months after the program end.

Lecture Videos

Encrypted Distributed Hash Tables

Archita Agarwal
Brown University
June 14, 2019

PANDA- Private Anonymous Data Access

Ariel Hamlin
Northeastern University
June 14, 2019

A Review of Database Reconstruction

Brice Minaud
Inria and ENS
June 13, 2019

Recent Developments in Format-Preserving Encryption

Stefano Tessaro
University of Washington
June 12, 2019

Parameter-Hiding Order Revealing Encryption

Cong Zhang
Rutgers University
June 12, 2019

Oblix - An Efficient Oblivious Search Index

Raluca Ada Popa
UC Berkeley
June 11, 2019

Simple searchable encryption framework for supporting complex queries

Murat Kantarcioglu
University of Texas at Dallas
June 11, 2019

Private DB - Big-size searching from (many) small-size MPC instances

Vlad Kolesnikov
Georgia Institute of Technology
June 11, 2019

Mitigating Attacks on Encrypted Databases via Adjustable Leakage

Ioannis Demertzis
University of Maryland
June 10, 2019

Leakage Suppression and Structured Encryption

Tarik Moataz
Brown University
June 10, 2019