<node id="641916">
  <nid>641916</nid>
  <type>event</type>
  <uid>
    <user id="27707"><![CDATA[27707]]></user>
  </uid>
  <created>1607380840</created>
  <changed>1607380840</changed>
  <title><![CDATA[PhD Proposal by Tianxin Tang]]></title>
  <body><![CDATA[<p><strong>Title:</strong> Searchable Encryption Revisited</p>

<p>&nbsp;</p>

<p>Tianxin Tang</p>

<p>Ph.D. Student in Computer Science</p>

<p>School of Computer Science</p>

<p>College of Computing</p>

<p>Georgia Institute of Technology</p>

<p>&nbsp;</p>

<p><strong>Date:</strong> Wed December 9 2020</p>

<p><strong>Time:</strong> 10:00 AM to 11:30 AM (EST)</p>

<p><strong>Location:</strong> (remote via Bluejeans) <a href="https://bluejeans.com/801214521" title="https://bluejeans.com/801214521">https://bluejeans.com/801214521</a></p>

<p>&nbsp;</p>

<p><strong>Committee</strong></p>

<p>&nbsp;</p>

<p>- Dr. Sasha Boldyreva (Advisor, School of Computer Science, Georgia Institute of Technology, US)</p>

<p>- Dr. Vlad Kolesnikov (School of Computer Science, Georgia Institute of Technology, US)</p>

<p>- Dr. Wenke Lee (School of Computer Science, Georgia Institute of Technology, US)</p>

<p>- Dr. Bogdan Warinschi (Department of Computer Science, University of Bristol, UK)</p>

<p>&nbsp;</p>

<p><strong>Abstract</strong></p>

<p>&nbsp;</p>

<p>The past decade has witnessed increasing demands from corporations and</p>

<p>individuals on data outsourcing to third-party cloud providers. How can the</p>

<p>service provider offer search functionality without sacrificing clients&#39; data</p>

<p>privacy remains an intriguing problem. Searchable encryption (SE), is an area</p>

<p>that explicitly targets the outsourced setting, offering privacy-preserving</p>

<p>solutions for accessing the encrypted data. We revisit SE and focus on more</p>

<p>versatile functionalities: first, similarity search in a keyless setting;</p>

<p>second, secure approximate k-NN search. Due to emerging leakage-abusing attacks</p>

<p>in SE, we also consider the third problem, constructing a practical SE</p>

<p>supporting keyword search with minimal leakage.</p>

<p>&nbsp;</p>

<p>We adopt a provable security approach attacking the above problems: define the</p>

<p>syntax, correctness, security sufficient for practice; propose constructions</p>

<p>meeting the correctness and security requirements, only relying on standard</p>

<p>cryptographic hardness assumptions. For the first problem, how to conduct</p>

<p>similarity search without the secret keys, we propose a non-interactive protocol</p>

<p>called keyless fuzzy search (KlFS). It masks public fuzzy-searchable databases</p>

<p>so that only users who possess close data to parts of the database can access</p>

<p>the masked contents. The security level of the construction relies on the</p>

<p>&quot;closeness-unpredictability&rdquo; property of the database. For the second problem,</p>

<p>secure approximate k-NN search, we show how to utilize ORAM techniques and</p>

<p>construct a privacy-preserving approximate k-NN protocol that hides the access</p>

<p>pattern, query pattern, and volume pattern. Finally, for the last problem, we</p>

<p>focus on a strong security notion of searchable encryption with keyword search</p>

<p>that hides access, query, and volume pattern. We propose a practical ORAM-based</p>

<p>construction, more efficient than known ORAM-based ones, and more secure than</p>

<p>available structured encryption schemes.</p>
]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Searchable Encryption Revisited]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2020-12-09T10:00:00-05:00]]></value>
      <value2><![CDATA[2020-12-09T12:00:00-05:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Faculty/Staff]]></value>
      </item>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
          <item>
        <value><![CDATA[Graduate students]]></value>
      </item>
          <item>
        <value><![CDATA[Undergraduate students]]></value>
      </item>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[https://bluejeans.com/801214521]]></url>
      <title><![CDATA[Bluejeans]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>221981</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Graduate Studies]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1788</tid>
        <value><![CDATA[Other/Miscellaneous]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>102851</tid>
        <value><![CDATA[Phd proposal]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
