Publications

  • Outside Looking In: Approaches to Content Moderation in End-to-End Encrypted Systems
    Seny Kamara, Mallory Knodel, Emma Llansó, Greg Nojeim, Lucy Qin, Dhanaraj Thakur, Caitlin Vogus
    Report for Center for Democracy and Technology ‘21
    (report pdf)

  • Cryptanalysis of Encrypted Search with LEAKER: A framework for LEakage AttacK Evaluation on Real-world data
    Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli
    IACR ePrint
    (full pdf)

  • Structured Encryption and Dynamic Leakage Suppression
    Marilyn George, Seny Kamara, Tarik Moataz
    Eurocrypt ‘21
    (proceedings pdf)

  • A Decentralized and Encrypted National Gun Registry
    Seny Kamara, Tarik Moataz, Andrew Park, Lucy Qin
    IEEE Symposium on Security and Privacy (Oakland) ‘21
    (full pdf)

  • Encrypted Databases: From Theory to Practice
    Zheguang Zhao, Seny Kamara, Tarik Moataz, Stan Zdonik
    Conference on Innovative Data Systems Research (CIDR) ‘21
    (proceedings pdf)

  • Adversarial Level Agreements for Two-Party Protocols
    Marilyn George, Seny Kamara
    IACR ePrint
    (full pdf)

  • Encrypted Key Value Stores
    Archita Agarwal, Seny Kamara Indocrypt ‘20
    (proceedings pdf)

  • Encrypted Blockchain Databases
    Daniel Adkins, Archita Agarwal, Seny Kamara, Tarik Moataz
    IACR ePrint
    (full pdf)

  • An Optimal Relational Database Encryption Scheme
    Seny Kamara, Tarik Moataz, Stan Zdonik, Zheguang Zhao
    IACR ePrint
    (full pdf)

  • Revisiting Leakage-Abuse Attacks
    Laura Blackstone, Seny Kamara, Tarik Moataz
    IACR ePrint
    (full pdf)

  • Encrypted Distributed Hash Tables
    Archita Agarwal, Seny Kamara
    IACR ePrint
    (full pdf)

  • Computationally Volume-Hiding Structured Encryption
    Seny Kamara, Tarik Moataz
    Eurocrypt ‘19
    (full pdf)

  • Forward and Backward Private Searchable Encryption with SGX
    Ghous Amjad, Seny Kamara, Tarik Moataz
    Eurosec ‘19
    (proceedings pdf)

  • Encrypted Databases for Differential Privacy
    Archita Agarwal, Maurice Herlihy, Seny Kamara, Tarik Moataz
    PETS ‘19
    (full pdf)

  • Breach-Resistant Structured Encryption
    Ghous Amjad, Seny Kamara, Tarik Moataz
    PETS ‘19
    (full pdf)

  • SQL on Structurally-Encrypted Databases
    Seny Kamara, Tarik Moataz
    Asiacrypt ‘18
    (full pdf)

  • Structured Encryption and Leakage Suppression
    Seny Kamara, Tarik Moataz, Olya Ohrimenko
    CRYPTO ‘18
    (proceedings pdf)

  • Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity
    Seny Kamara, Tarik Moataz
    Eurocrypt ‘17
    (proceedings pdf)

  • Inference Attacks Against Property-Preserving Encrypted Databases
    Muhammad Naveed, Seny Kamara, Charles Wright
    Conference on Computer and Communications Security (CCS ‘15)
    Invited to Real-World Crypto, 2016
    (proceedings pdf)

  • GRECS: Graph Encryption for Approximate Shortest Distance Queries
    Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios
    Conference on Computer and Communications Security (CCS ‘15)
    (full version pdf)

  • Encrypted Search
    Seny Kamara
    ACM XRDS
    (tech report pdf)

  • Restructuring the NSA Metadata Program
    Seny Kamara
    Workshop on Applied Homomorphic Cryptography (WAHC ‘14)
    (proceedings pdf)

  • Scaling Private Set Intersection to Billion Element Sets
    Seny Kamara, Payman Mohassel, Mariana Raykova and Saeed Sadeghian
    Financial Cryptography and Data Security (FC'14)
    (tech report pdf)

  • Garbled Circuits via Structured Encryption
    Seny Kamara and Lei Wei
    Workshop on Applied Homomorphic Cryptography (WAHC ‘13)
    (proceedings pdf)

  • Parallel Homomorphic Encryption (or MapReduce/Hadoop on Encrypted Data)
    Seny Kamara and Mariana Raykova
    Workshop on Applied Homomorphic Cryptography (WAHC ‘13)
    (proceedings pdf; full pdf)

  • Parallel and Dynamic Searchable Symmetric Encryption
    Seny Kamara and Charalampos Papamanthou
    Financial Cryptography and Data Security (FC ‘13)
    (full pdf)

  • Salus: A System for Server-Aided Secure Function Evaluation
    Seny Kamara, Payman Mohassel and Ben Riva
    Conference on Computer and Communications Security (CCS ‘12)
    (full pdf)

  • Dynamic Searchable Symmetric Encryption
    Seny Kamara, Charalampos Papamanthou and Tom Roeder
    Conference on Computer and Communications Security (CCS ‘12)
    (full pdf)

  • Cryptographic Cloud Storage
    Seny Kamara and Kristin Lauter
    Workshop on Real-Life Cryptographic Protocols and Standardization, 2010
    (proceedings pdf)

  • Structured Encryption and Controlled Disclosure
    Melissa Chase and Seny Kamara
    Advances in Cryptology - ASIACRYPT ‘10
    (full pdf)

  • Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions
    Reza Curtmola, Juan Garay, Seny Kamara and Rafail Ostrovsky.
    Conference on Computer and Communications Security (CCS ‘06)
    Journal of Computer Security
    (full pdf)