{"id":"https://openalex.org/W4405114684","doi":"https://doi.org/10.1145/3707460","title":"End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage","display_name":"End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage","publication_year":2024,"publication_date":"2024-12-06","ids":{"openalex":"https://openalex.org/W4405114684","doi":"https://doi.org/10.1145/3707460"},"language":"en","primary_location":{"id":"doi:10.1145/3707460","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3707460","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3707460","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3707460","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101673199","display_name":"Long Chen","orcid":"https://orcid.org/0000-0003-3183-158X"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Long Chen","raw_affiliation_strings":["Institute of Software Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066974281","display_name":"Ya\u2010Nan Li","orcid":"https://orcid.org/0000-0002-1413-7273"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"The University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ya-Nan Li","raw_affiliation_strings":["School of Computer Science, The University of Sydney, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, The University of Sydney, Sydney, Australia","institution_ids":["https://openalex.org/I129604602"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103196800","display_name":"Qiang Tang","orcid":"https://orcid.org/0000-0003-1113-6352"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"The University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Qiang Tang","raw_affiliation_strings":["School of Computer Science, The University of Sydney, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, The University of Sydney, Sydney, Australia","institution_ids":["https://openalex.org/I129604602"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030243906","display_name":"Moti Yung","orcid":"https://orcid.org/0000-0003-0848-0873"},"institutions":[{"id":"https://openalex.org/I1291425158","display_name":"Google (United States)","ror":"https://ror.org/00njsd438","country_code":"US","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210128969"]},{"id":"https://openalex.org/I78577930","display_name":"Columbia University","ror":"https://ror.org/00hj8s172","country_code":"US","type":"education","lineage":["https://openalex.org/I78577930"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Moti Yung","raw_affiliation_strings":["Google Inc., New York, United States and Columbia University, New York, USA","Columbia University, New York, USA"],"affiliations":[{"raw_affiliation_string":"Google Inc., New York, United States and Columbia University, New York, USA","institution_ids":["https://openalex.org/I1291425158","https://openalex.org/I78577930"]},{"raw_affiliation_string":"Columbia University, New York, USA","institution_ids":["https://openalex.org/I78577930"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101673199"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210128818"],"apc_list":null,"apc_paid":null,"fwci":2.3383,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.91518452,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"28","issue":"2","first_page":"1","last_page":"35"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6067892909049988},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5272159576416016},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4426569640636444},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.36261141300201416},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.34709784388542175}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6067892909049988},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5272159576416016},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4426569640636444},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.36261141300201416},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34709784388542175}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3707460","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3707460","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3707460","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3707460","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3707460","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3707460","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6700000166893005}],"awards":[{"id":"https://openalex.org/G4385366482","display_name":null,"funder_award_id":"2021YFB3100100","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4405114684.pdf"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W126396346","https://openalex.org/W1889757464","https://openalex.org/W2102349355","https://openalex.org/W2107506969","https://openalex.org/W2112995928","https://openalex.org/W2153041122","https://openalex.org/W2411725940","https://openalex.org/W2503779953","https://openalex.org/W2733529322","https://openalex.org/W2744999500","https://openalex.org/W2916399511","https://openalex.org/W2999209598","https://openalex.org/W3111756912","https://openalex.org/W4205480687","https://openalex.org/W4292084264","https://openalex.org/W6743073161"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4244478748","https://openalex.org/W3150465815","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W1997222214","https://openalex.org/W2560439919"],"abstract_inverted_index":{"The":[0,206],"cloud":[1,12,16,24,84,97,104,119,143],"has":[2,28],"become":[3],"pervasive,":[4],"and":[5,62,148,200,213],"we":[6,10,107],"ask:":[7],"how":[8],"can":[9,155],"protect":[11],"data":[13,46,116,136,158],"against":[14,139],"the":[15,48,54,76,90,103,122,130,142,145,152,157,173,184,197],"itself?":[17],"For":[18],"secure":[19,44,138],"user-to-user":[20],"communication":[21],"via":[22],"a":[23,109,125,163,225],"server,":[25,144,147],"End-to-End":[26],"encryption":[27],"been":[29],"formally":[30],"studied,":[31],"building":[32],"on":[33,59,102,159,221,229],"existing":[34,60,83,96,118,185],"TLS":[35],"channels":[36],"without":[37,99],"requiring":[38,100],"new":[39],"primitives.":[40],"However,":[41],"enabling":[42],"user-to-same-user":[43],"outsourced":[45],"storage\u2013solving":[47],"analogous":[49],"problem":[50],"of":[51,124,244,246],"\u201cprivacy":[52],"from":[53,141,203],"server\u201d":[55],"while":[56],"(1)":[57],"relying":[58],"infrastructure":[61],"(2)":[63],"supporting":[64],"user":[65,135,154],"mobility,":[66],"remains":[67,201],"open.":[68],"Existing":[69],"proposals,":[70],"like":[71],"password-protected":[72],"secret":[73],"sharing,":[74],"target":[75],"same":[77],"goal":[78],"but":[79],"are":[80],"incompatible":[81],"with":[82,121],"storage":[85,98,120,174],"services.":[86],"Specifically,":[87],"they":[88],"lack":[89],"simplicity":[91],"needed":[92],"to":[93,176],"directly":[94],"utilize":[95],"changes":[101],"side.":[105],"Here,":[106],"propose":[108],"novel":[110],"system":[111,169,189],"for":[112],"securely":[113],"storing":[114],"private":[115],"in":[117,236],"help":[123],"key":[126,146],"server":[127,175],"(necessary,":[128],"given":[129],"requirements).":[131],"In":[132],"our":[133,168,188,230],"system,":[134],"is":[137,208,216],"threats":[140],"illegitimate":[149],"users.":[150],"Only":[151,240],"legitimate":[153],"access":[156],"any":[160,178],"device":[161,199],"using":[162],"correct":[164],"passphrase.":[165],"Most":[166],"importantly,":[167],"does":[170],"not":[171],"require":[172],"support":[177],"newly":[179],"programmable":[180],"operations.":[181],"Moreover,":[182],"leveraging":[183],"App":[186],"login,":[187],"requires":[190],"only":[191],"one":[192],"passphrase,":[193],"which":[194],"never":[195],"leaves":[196],"user\u2019s":[198],"hidden":[202],"both":[204],"servers.":[205],"security":[207],"proved":[209],"under":[210],"formal":[211],"models,":[212],"its":[214],"efficiency":[215],"demonstrated":[217],"by":[218,234],"experiments":[219],"conducted":[220],"Amazon":[222],"S3.":[223],"Notably,":[224],"preliminary":[226],"variant,":[227],"based":[228],"principles,":[231],"was":[232],"deployed":[233],"Snapchat":[235],"their":[237],"My":[238],"Eyes":[239],"module,":[241],"serving":[242],"hundreds":[243],"millions":[245],"users!":[247]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
