January 24, 2026
Encrypted Search
Browse posts by tag
October 14, 2025
Cipher Maps: A Unified Framework for Oblivious Function Approximation Through Algebraic Structures and Bernoulli Models
October 14, 2025
Encrypted Search and Oblivious Types
Oblivious types give encrypted search information-theoretic privacy against access pattern leakage. No ORAM, no computational hardness assumptions. Here's how.
October 14, 2025
Encrypted Search with Oblivious Bernoulli Types: Information-Theoretic Privacy through Controlled Approximation
October 14, 2025
Maximizing Confidentiality in Encrypted Search Through Entropy Optimization
October 7, 2025
Algebraic Cipher Types: A Functorial Framework for Secure Computation
October 1, 2025
Apertures: Coordinated Partial Evaluation for Distributed Computation
February 15, 2024
Known Plaintext Attacks on Time Series Encryption
Why naive encryption of temporal data leaks more than you'd expect, and what to do about it.
January 1, 2024
Estimating Confidentiality of Encrypted Search Systems: A Probabilistic Framework
January 1, 2022
Boolean Algebra over Trapdoor Sets: A Practical Framework for Privacy-Preserving Set Operations with Probabilistic Guarantees
June 17, 2021
Rank-Ordered Encrypted Search
Rank-ordered search over encrypted documents using oblivious entropy maps, enabling relevance scoring without revealing document contents.
April 1, 2021
Time Series Analysis of Confidentiality Degradation in Encrypted Search Systems
November 2, 2016
Estimating How Confidential Encrypted Searches Are Using Moving Average Bootstrap Method
November 2, 2016
IEEE Paper: Estimating Encrypted Search Confidentiality via Bootstrap
My first IEEE publication. Using bootstrap methods to estimate how many queries an adversary needs to break encrypted search.
January 1, 2016
Estimating How Confidential Encrypted Searches Are Using Moving Average Bootstrap Method
May 1, 2015
Encrypted Search - Enabling Standard Information Retrieval Techniques for Several New Secure Index Types While Preserving Confidentiality Against an Adversary With Access to Query Histories and Secure Index Contents
May 1, 2015