Rethinking Encrypted Search: From Access Pattern Leakage to Information-Theoretic Privacy

October 14, 2025 · 4 min read