scispace - formally typeset
Search or ask a question

Showing papers by "Michael Steiner published in 2015"


Posted Content
TL;DR: The SSE protocol is extended, adding support for range, substring, wildcard, and phrase queries, in addition to the Boolean queries supported in the original protocol, to extend the performance results of [Cash et al., NDSS’14] to these rich and comprehensive query types.
Abstract: We extend the searchable symmetric encryption (SSE) protocol of [Cash et al., Crypto’13] adding support for range, substring, wildcard, and phrase queries, in addition to the Boolean queries supported in the original protocol. Our techniques apply to the basic single-client scenario underlying the common SSE setting as well as to the more complex Multi-Client and Outsourced Symmetric PIR extensions of [Jarecki et al., CCS’13]. We provide performance information based on our prototype implementation, showing the practicality and scalability of our techniques to very large databases, thus extending the performance results of [Cash et al., NDSS’14] to these rich and comprehensive query types.

130 citations


Book ChapterDOI
21 Sep 2015
TL;DR: In this article, the authors extend the searchable symmetric encryption (SSE) protocol by adding support for range, substring, wildcard, and phrase queries, in addition to the Boolean queries supported in the original protocol.
Abstract: We extend the searchable symmetric encryption (SSE) protocol of [Cash et al., Crypto’13] adding support for range, substring, wildcard, and phrase queries, in addition to the Boolean queries supported in the original protocol. Our techniques apply to the basic single-client scenario underlying the common SSE setting as well as to the more complex Multi-Client and Outsourced Symmetric PIR extensions of [Jarecki et al., CCS’13]. We provide performance information based on our prototype implementation, showing the practicality and scalability of our techniques to very large databases, thus extending the performance results of [Cash et al., NDSS’14] to these rich and comprehensive query types.

128 citations


Patent
13 Mar 2015
TL;DR: In this article, the authors present a policy service that applies a policy for the segregating and governed routing of data flows from the enterprise network and the non-enterprise network.
Abstract: Methods and arrangements for protecting enterprise data with respect to a hybrid application in a mobile device that accesses a global computer information network using enterprise infrastructure A hybrid application is recognized in a mobile device, the hybrid application being configured to communicate with an enterprise network and a non-enterprise network There are provided, in communication with the hybrid application, controls for segregating data flows from the enterprise network and non-enterprise network A policy service is provided, which applies a policy for the segregating and governed routing of data flows from the enterprise network and the non-enterprise network Other variants and embodiments are broadly contemplated herein

2 citations