Organizing Committee
- Alexandra Boldyreva
Georgia Tech - David Cash
University of Chicago - Seny Kamara
Brown University - Hugo Krawczyk
Algorand Foundation - Tarik Moataz
Brown University - Charalampos Papamanthou
University of Maryland
Abstract
The area of encrypted search focuses on the design and cryptanalysis of practical algorithms and systems that can search on end-to-end encrypted data. With encrypted search algorithms, data can remain encrypted even in use. As such, encrypted search algorithms have a wide array of applications including in data management, healthcare, cloud computing, mobile security, blockchains, and censorship- and surveillance-resistant systems.

Confirmed Speakers & Participants
Talks will be presented virtually or in-person as indicated in the schedule below.
- Speaker
- Poster Presenter
- Attendee
- Virtual Attendee
-
Akshima -
University of Chicago
-
Archita Agarwal
Brown University
-
Elie Alhajjar
US Military Academy
-
Amr Amr El Abadi
UCSB
-
Megumi Ando
Brown Univ. / MITRE
-
Dmytro Bogatov
Boston University
-
Alexandra Boldyreva
Georgia Tech
-
Raphael Bost
Direction générale de l'armement
-
Elette Boyle
IDC Herzliya
-
Chloe Cachet
University of Connecticut
-
David Cash
University of Chicago
-
Nathan Chenette
Rose-Hulman
-
Ran Cohen
NORTHEASTERN UNIVERSITY and Boston University
-
Luke Demarest
University of Connecticut
-
Ioannis Demertzis
University of Maryland
-
Francesca Falzon
The University of Chicago
-
Peter Fenteany
University of Connecticut
-
Benjamin Fuller
University of Connecticut
-
Samprit Ghosh
University of Toronto
-
Paul Grubbs
Cornell University
-
Ariel Hamlin
Northeastern University
-
David Heath
Georgia Institute of Technology
-
Mireya Jurado
Florida International University
-
Seny Kamara
Brown University
-
Murat Kantarcioglu
University of Texas at Dallas
-
Anurag Khandelwal
UC Berkeley
-
Vlad Kolesnikov
Georgia Institute of Technology
-
Evgenios Kornaropoulos
Brown University
-
Hugo Krawczyk
Algorand Foundation
-
George Markowsky
Missouri University of Science & Technology
-
William Martin
Worcester Polytechnic Institute
-
Brice Minaud
Inria and ENS
-
Tarik Moataz
Brown University
-
Adam O’Neill
University of Massachusetts - Amherst
-
Charalampos Papamanthou
University of Maryland
-
John Partridge
Sifr Systems, Inc.
-
Giuseppe Persiano
Universita di Salerno
-
Alexander Pilyavsky
CUNY
-
Raluca Ada Popa
UC Berkeley
-
Khem Poudel
Middle Tenneessee State University
-
Lucy Qin
Boston University
-
Mariana Raykova
Google
-
Michael Rosenberg
University of Maryland
-
Sarah Scheffler
Boston University
-
Vitaly Shmatikov
Cornell Tech
-
Jesse Stern
Unviersity of Chicago
-
Tianxin Tang
Georgia Tech
-
Stefano Tessaro
University of Washington
-
Amos Treiber
TU Darmstadt
-
Mayank Varia
Boston University
-
Charles Wright
Portland State University
-
David Wu
University of Virginia
-
Arkady Yerukhimovich
George Washington University
-
Cong Zhang
Rutgers University
-
Li Zhang
The Citadel
-
Zheguang Zhao
Brown University
Workshop Schedule
Monday, June 10, 2019
Tuesday, June 11, 2019
Wednesday, June 12, 2019
Thursday, June 13, 2019
Friday, June 14, 2019
Lecture Videos
Attacks on Encrypted Databases Beyond the Uniform Query Distribution
Evgenios Kornaropoulos
Brown University
June 13, 2019
Learning to Reconstruct - Statistical Learning Theory and Encrypted Database Attacks
Paul Grubbs
Cornell University
June 13, 2019
Recent Developments in Format-Preserving Encryption
Stefano Tessaro
University of Washington
June 12, 2019
Supporting less-than queries on encrypted data using multi-server secret sharing and practical order-revealing encryption
Nathan Chenette
Rose-Hulman
June 12, 2019
Order-Revealing Encryption - Definitions, Constructions, and Challenges
David Wu
University of Virginia
June 12, 2019
Demystifying Blockchains and the Challenges of Fault-tolerance, Transparency and Privacy in Large Scale Data
Amr Amr El Abadi
UCSB
June 11, 2019
Simple searchable encryption framework for supporting complex queries
Murat Kantarcioglu
University of Texas at Dallas
June 11, 2019
Private DB - Big-size searching from (many) small-size MPC instances
Vlad Kolesnikov
Georgia Institute of Technology
June 11, 2019
Mitigating Attacks on Encrypted Databases via Adjustable Leakage
Ioannis Demertzis
University of Maryland
June 10, 2019
Understanding and Mitigating Leakage-Abuse Attacks against Searchable Encryption
Raphael Bost
Direction générale de l'armement
June 10, 2019
Leakage in the Cell Probe Model - Lower Bounds for Response Hiding Encrypted Multi-Maps
Giuseppe Persiano
Universita di Salerno
June 10, 2019