Which encryption technique should be adopted to keep the search functionalities? [closed]

I am in exactly the same situation as described in this post. I must be able to encrypt data from a client workstation then send it to an untrusted server (encrypted at rest), then decrypt it only on the same client workstation. However, t… Continue reading Which encryption technique should be adopted to keep the search functionalities? [closed]

How secure is the Ciphersweet library for searchable encryption, and why is a duplicate entry leak not a problem?

I’m currently managing a code base in which we’ve got a mysql database with all records encrypted using the php-encryption library. This works well for our current setup. We now got a new business requirement that should make… Continue reading How secure is the Ciphersweet library for searchable encryption, and why is a duplicate entry leak not a problem?

What is currently the best Searchable Encryption (SE) algorithm that works in practice?

I’m struggling to find good literature on Searchable Encryption. There are of course a few student papers written in LaTeX using Computer Modern that has some nice Greek soups in them, but none with any actual concrete exampl… Continue reading What is currently the best Searchable Encryption (SE) algorithm that works in practice?