papers

  • Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Encrypted Search
    Seny Kamara and Tarik Moataz
    IACR ePrint
    (full pdf)

  • MAPLE: MArkov Process Leakage attacks on Encrypted Search
    Seny Kamara, MongoDB, Abdelkarim Kati, Tarik Moataz, Jamie DeMaria, Andrew Park, Amos Treiber
    Privacy Enhancing Technologies (PETS) ‘24
    (full pdf)

  • Injection-Secure Structured and Searchable Symmetric Encryption.
    Ghous Amjad, Seny Kamara and Tarik Moataz
    Asiacrypt ‘23
    (full pdf)

  • Synq: Public Policy Analytics Over Encrypted Data
    Zachary Espiritu, Marilyn George, Seny Kamara, Lucy Qin
    IEEE Security & Privacy (Oakland) ‘24
    (proceedings pdf)

  • Outside Looking In: Approaches to Content Moderation in End-to-End Encrypted Systems
    Seny Kamara, Mallory Knodel, Emma Llansó, Greg Nojeim, Lucy Qin, Dhanaraj Thakur, Caitlin Vogus
    Report for Center for Democracy and Technology ‘21
    (report pdf)

  • Cryptanalysis of Encrypted Search with LEAKER: A framework for LEakage AttacK Evaluation on Real-world data
    Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli
    IACR ePrint
    (full pdf)

  • Structured Encryption and Dynamic Leakage Suppression
    Marilyn George, Seny Kamara, Tarik Moataz
    Eurocrypt ‘21
    (proceedings pdf)

  • A Decentralized and Encrypted National Gun Registry
    Seny Kamara, Tarik Moataz, Andrew Park, Lucy Qin
    IEEE Symposium on Security and Privacy (Oakland) ‘21
    (full pdf)

  • Encrypted Databases: From Theory to Practice
    Zheguang Zhao, Seny Kamara, Tarik Moataz, Stan Zdonik
    Conference on Innovative Data Systems Research (CIDR) ‘21
    (proceedings pdf)

  • Adversarial Level Agreements for Two-Party Protocols
    Marilyn George, Seny Kamara
    IACR ePrint
    (full pdf)

  • Encrypted Key Value Stores
    Archita Agarwal, Seny Kamara
    Indocrypt ‘20
    (proceedings pdf)

  • Encrypted Blockchain Databases
    Daniel Adkins, Archita Agarwal, Seny Kamara, Tarik Moataz
    Advances in Financial Technologies ‘20
    (full pdf, blog)

  • Towards Untrusted Social Video Verification to Combat Deepfakes via Face Geometry Consistency
    Eleanor Tursman, Marilyn George, Seny Kamara, James Tompkin
    Media Forensics CVPR Workshop ‘20
    (proceedings pdf, Eleanor’s Talk)

  • An Optimal Relational Database Encryption Scheme
    Seny Kamara, Tarik Moataz, Stan Zdonik, Zheguang Zhao
    IACR ePrint
    (full pdf)

  • Encrypted Distributed Dictionaries
    Archita Agarwal, Seny Kamara
    IACR ePrint
    (full pdf, blog, Archita’s talk)

  • Revisiting Leakage-Abuse Attacks
    Laura Blackstone, Seny Kamara, Tarik Moataz
    NDSS ‘20
    (full pdf)

  • Computationally Volume-Hiding Structured Encryption
    Seny Kamara, Tarik Moataz
    Eurocrypt ‘19
    (full pdf)

  • Forward and Backward Private Searchable Encryption with SGX
    Ghous Amjad, Seny Kamara, Tarik Moataz
    Eurosec ‘19
    (proceedings pdf)

  • Encrypted Databases for Differential Privacy
    Archita Agarwal, Maurice Herlihy, Seny Kamara, Tarik Moataz
    PETS ‘19
    (full pdf)

  • Breach-Resistant Structured Encryption
    Ghous Amjad, Seny Kamara, Tarik Moataz
    PETS ‘19
    (full pdf)

  • SQL on Structurally-Encrypted Databases
    Seny Kamara, Tarik Moataz
    Asiacrypt ‘18
    (full pdf)

  • Structured Encryption and Leakage Suppression
    Seny Kamara, Tarik Moataz, Olya Ohrimenko
    CRYPTO ‘18
    (proceedings pdf)

  • Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity
    Seny Kamara, Tarik Moataz
    Eurocrypt ‘17
    (proceedings pdf)

  • Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
    G. Ateniese, A. Faonio, S. Kamara
    IMA International Conference on Cryptography and Coding (IMACC ‘15)

  • Inference Attacks Against Property-Preserving Encrypted Databases
    Muhammad Naveed, Seny Kamara, Charles Wright
    Conference on Computer and Communications Security (CCS ‘15)
    Invited to Real-World Crypto, 2016
    (proceedings pdf)

  • GRECS: Graph Encryption for Approximate Shortest Distance Queries
    Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios
    Conference on Computer and Communications Security (CCS ‘15)
    (full version pdf)

  • Co-Location-Resistant Clouds
    Y. Azar, S. Kamara, I. Menache, M. Raykova and B. Shepherd
    ACM Cloud Computing Security Workshop (CCSW ‘14)
    (full version pdf)

  • Encrypted Search
    Seny Kamara
    ACM XRDS
    (tech report pdf)

  • Restructuring the NSA Metadata Program
    Seny Kamara
    Workshop on Applied Homomorphic Cryptography (WAHC ‘14)
    (proceedings pdf)

  • Scaling Private Set Intersection to Billion Element Sets
    Seny Kamara, Payman Mohassel, Mariana Raykova and Saeed Sadeghian
    Financial Cryptography and Data Security (FC’14)
    (proceedings pdf)

  • Tight Bounds for Online Vector Bin Packing
    Y. Azar, I. Cohen, S. Kamara and B. Shepherd
    ACM Symposium on the Theory of Computing (STOC ‘13)

  • Garbled Circuits via Structured Encryption
    Seny Kamara and Lei Wei
    Workshop on Applied Homomorphic Cryptography (WAHC ‘13)
    (proceedings pdf)

  • Parallel Homomorphic Encryption (or MapReduce/Hadoop on Encrypted Data)
    Seny Kamara and Mariana Raykova
    Workshop on Applied Homomorphic Cryptography (WAHC ‘13)
    (proceedings pdf; full pdf)

  • Parallel and Dynamic Searchable Symmetric Encryption
    Seny Kamara and Charalampos Papamanthou
    Financial Cryptography and Data Security (FC ‘13)
    (full pdf)

  • Salus: A System for Server-Aided Secure Function Evaluation
    Seny Kamara, Payman Mohassel and Ben Riva
    Conference on Computer and Communications Security (CCS ‘12)
    (full pdf)

  • Dynamic Searchable Symmetric Encryption
    Seny Kamara, Charalampos Papamanthou and Tom Roeder
    Conference on Computer and Communications Security (CCS ‘12)
    (full pdf)

  • Secure Outsourced Computation in a Multi-Tenant Cloud
    S. Kamara and M. Raykova
    Workshop on Cryptography and Security in Clouds, 2011
    (proceedings pdf)

  • Cryptographic Cloud Storage
    Seny Kamara and Kristin Lauter
    Workshop on Real-Life Cryptographic Protocols and Standardization, 2010
    (proceedings pdf)

  • An Inspection-Resistant On-Chip Memory Architecture
    M. Chase, S. Kamara, A. Putnam, T. Sherwood, D. Shumow and V. Vaikuntanathan International Symposium on Computer Architecture (ISCA ‘12)
    IEEE Micro Top Picks in Computer Architecture 2013

  • Trustworthy from Silicon Up
    M. Chase, S. Kamara, A. Putnam, T. Sherwood, D. Shumow and V. Vaikuntanathan
    New Directions in Computer Architecture, 2011

  • Structured Encryption and Controlled Disclosure
    Melissa Chase and Seny Kamara
    Advances in Cryptology - ASIACRYPT ‘10
    (full pdf)

  • Proofs of Storage from Homomorphic Identification Protocols
    G. Ateniese, S. Kamara, J. Katz
    ASIACRYPT ‘09

  • Towards Practical Biometric Key Generation with Randomized Biometric Templates
    L. Ballard, S. Kamara, F. Monrose, M. Reiter
    ACM Conference on Computer and Communications Security (CCS ‘08)

  • The Practical Subtleties of Biometric Key Generation
    L. Ballard, S. Kamara, F. Monrose, M. Reiter
    USENIX Security Symposium (Usenix ‘08)

  • How to Encrypt with a Malicious Random Number Generator
    S. Kamara, J. Katz
    Workshop on Fast Software Encryption (FSE ‘08)

  • Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions
    Reza Curtmola, Juan Garay, Seny Kamara and Rafail Ostrovsky.
    Conference on Computer and Communications Security (CCS ‘06)
    Journal of Computer Security
    (full pdf)

  • A Mechanism for Communication-Efficient Broadcast Encryption Over Wireless Ad-Hoc Networks
    R. Curtmola, S. Kamara
    Workshop on Cryptography in Ad Hoc Networks (WCAN ‘06)

  • Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage
    K. Fu, S. Kamara, T. Kohno
    Network and Distributed System Security Symposium (NDSS ‘06)

  • Achieving Secure Conjunctive Searches over Encrypted Data
    L. Ballard, S. Kamara, F. Monrose
    International Conference on Information and Communicationis Security (ICICS ‘05)

  • Secret Locking: A New Approach to Biometric Key Encapsulation
    S. Kamara, B. de Medeiros, S. Wetzel
    International Conference on E-business and Telecommunication Networks (ICETE 2005)

  • An Extensible Platform for Evaluating Security Protocols
    S. Kamara, D. Davis, L. Ballard, R. Caudy, F. Monrose
    Annual IEEE Simulation Symposium (IEEE ANSS ‘05)

  • ActiveSync, TCP/IP and 802.11 Wireless Vulnerabilities of WinCE-based PDAs P. Meunier, S. Nystrom, S. Kamara, S. Yost, K. Alexander, D. Noland, J. Crane.
    IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 02)