How to Search on Encrypted Data

  • Date
    September 17, 2013
  • Time
  • Location
    366 WVH


The problem of searching over encrypted data arises often and, most notably, in the design of secure database systems, file systems, cloud storage systems and in the design of cryptographic protocols. Many solutions to this problem have been proposed in the past, including searchable encryption, deterministic encryption, order preserving encryption, functional encryption, oblivious RAMs, secure two-party computation and fully-homomorphic encryption.

 In this talk, I will survey the different solutions to the encrypted search problem and discuss their various strengths and limitations, paying particularly close attention to the tradeoffs made between security, efficiency and functionality. I will then present recent advances in the area of searchable encryption and give an overview of the state-of-the art constructions and implementations. 

Brief Biography

Seny Kamara is a Researcher in the Cryptography Group at Microsoft Research. He received his Ph.D. in Computer Science from Johns Hopkins University. His research interests are primarily in cloud security and cryptography but he maintains interests in various aspects of theory and systems, including applied and theoretical cryptography, information security, technology policy, networking, algorithms and economics.