Data Processing

Since the cloud provider possesses plenty of computational resources that the lay customer does not, it can perform complex operations on data very fast. This encourages customers not only to outsource storage but also to outsource data processing. To facilitate the adoption of TREDISEC security services, we should focus on how to reconcile existing data processing functionalities and the pressing requirements of data confidentiality and computation integrity.

Authenticated Encryption

Authenticated encryption with new security model and construction. StoA authenticated encryption with variable stretch is vulnerable to some attacks that misuse the variable stretch. A new security definition is proposed and followed by a new construction.

MUSE

A multi-user searchable encryption solution that allows users (called writers) to outsource their encrypted documents. Afterwards, other users (called readers) can perform some word search operations without the need of re-downloading the entire document and only if they are authorized to do so.