CS 858: (Very Hot) Topics in Computing on Encrypted Data — F'16
Readings
Multi-Party Computation Protocols
Fully-homomorphic Encryption
- Fully Homomorphic Encryption over the Integers by Marten van Dijk, Craig Gentry, Shai Halevi, Vinod Vaikuntanathan. EUROCRYPT 2010.
- Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based by Craig Gentry, Amit Sahai, Brent Waters. CRYPTO 2013.
- Algorithms in HElib by Shai Halevi, Victor Shoup. CRYPTO 2014
- Homomorphic Evaluation of the AES Circuit by Craig Gentry, Shai Halevi, Nigel P. Smart. CRYPTO 2012.
Searchable Encryption
- Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions by Reza Curtmola, Juan Garay, Seny Kamara, Rafail Ostrovsky. CCS 2006.
- Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries by David Cash, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Rosu, Michael Steiner. CRYPTO 2013.
- Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation by David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel-Cătălin Roşu, Michael Steiner. NDSS 2014.
Order-Preserving Encryption
- Practical Order-Revealing Encryption with Limited Leakage by Nathan Chenette, Kevin Lewi, Stephen A. Weis and David J. Wu. In FSE 2016
- Order-Preserving Symmetric Encryption by Alexandra Boldyreva, Nathan Chenette, Younho Lee and Adam O’Neill. EUROCRYPT 2009.
- An Ideal-Security Protocol for Order-Preserving Encoding by Raluca Ada Popa, Frank H. Li, Nickolai Zeldovich.
- Inference Attacks on Property-Preserving Encrypted Databases by Muhammad Naveed, Seny Kamara, Charles V. Wright. CCS 2015
- What Else is Revealed by Order-Revealing Encryption? by F. Betül Durak, Thomas M. DuBuisson, David Cash. CCS 2016
Attribute-based and Functional Encryption
- Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data by Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters. CCS 2006.
- Ciphertext-Policy Attribute-Based Encryption by John Bethencourt, Amit Sahai, Brent Waters. In SP 2006.
- Attribute-Based Encryption for Circuits by Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee. STOC 2013.
- Outsourcing the Decryption of ABE Ciphertexts by Matthew Green, Susan Hohenberger, Brent Waters. In SEC 2011.
- On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud by William C. Garrison III, Adam Shull, Steven Myers, Adam J. Lee. In SP 2016.
- Worry-free encryption: functional encryption with public keys by Amit Sahai, Hakan Seyalioglu. In CCS 2010.
- Functional Encryption: Definitions and Challenges by Dan Boneh, Amit Sahai, Brent Waters. In TCC 2011.
Secure Hardware
- Innovative Instructions and Software Model for Isolated Execution by Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos Rozas, Hisham Shafi, Vedvyas Shanbhogue and Uday Savagaonkar.
- Intel Software Guard Extensions(Intel SGX) by Frank McKeen.
- Intel SGX Explained by Victor Costan and Srinivas Devadas.
- AMD Memory Encryption by David Kaplan, Jeremy Powell, Tom Woller.
- Secure Encrypted Virtualization Key Management. Technical Report.
- Shielding Applications from an
Untrusted Cloud with Haven by Andrew Baumann, Marcus Peinado, and Galen Hunt. In OSDI 2014.
- Town Crier: An Authenticated Data Feed for Smart Contracts by Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, and Elaine Shi.
Systems and Applications
- CryptDB: Protecting Confidentiality with Encrypted Query Processing by Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan. In SOSP 2011
- Orthogonal Security With Cipherbase by Arvind Arasu, Spyros Blanas, Ken Eguro, Raghav Kaushik, Donald Kossmann, Ravi Ramamurthy, Ramarathnam Venkatesan. In CIDR 2013.
- Building web applications on top of encrypted data using Mylar by Raluca Ada Popa, Emily Stark, Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, and Hari Balakrishnan. In NSDI 2014.
- Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds by Frank Wang, James Mickens, Nickolai Zeldovich, Vinod Vaikuntanathan. In NSDI 2016>