IEEE Paper: Estimating How Confidential Encrypted Searches Are Using Moving Average Bootstrap Method
Published IEEE paper on using bootstrap methods to estimate encrypted search confidentiality against frequency attacks.
A blog series exploring encrypted search, Bernoulli models, cipher types, and probabilistic data structures
This series explores the mathematical foundations of computing on encrypted and approximate data—where we deliberately trade exactness for privacy, space efficiency, or computational tractability.
The fundamental insight: distinguish between latent (true) values and observed (approximate) values. This duality connects:
A type-theoretic framework for approximate computing:
Category-theoretic foundations for encrypted computation:
Moving beyond computational hardness assumptions:
In an era where:
…these foundations provide principled ways to build systems that trade exactness for other desirable properties while maintaining formal guarantees.
This work builds on research spanning from my Master’s thesis (2015) on encrypted search through recent work on algebraic cipher types and entropy maps. The combination of Bernoulli types with categorical abstractions finally provides a unified mathematical foundation for practical privacy-preserving computation at scale.
Published IEEE paper on using bootstrap methods to estimate encrypted search confidentiality against frequency attacks.
A conceptual introduction to entropy maps—implementing functions with hash functions and prefix-free codes.
I’ve been working on a series of papers that develop a unified theoretical framework for approximate and oblivious computing, centered around what I call Bernoulli types. These papers explore …
What if we could compute on encrypted data while preserving algebraic structure? Not through expensive homomorphic encryption, but through a principled mathematical framework that unifies oblivious …
Encrypted search has a fundamental problem: you can’t hide what you’re looking for. Even with the best encryption, search patterns leak information. My recent work develops a new approach …
A functorial framework that lifts algebraic structures into the encrypted domain, enabling secure computation that preserves mathematical properties.
The PDF version of this post is available on GitHub.
The basic theory behind an entropy map is to map values in the domain to values in the codomain by hashing to a prefix-free code in the codomain. …
Analysis of known plaintext attack vulnerabilities in time series encryption schemes.
What if a perfect hash function could simultaneously be: (1) cryptographically secure, (2) space-optimal, and (3) maximum-entropy encoded? This paper proves such a construction exists—and analyzes …
A Boolean algebra framework over trapdoors for cryptographic operations. Introduces a homomorphism from powerset Boolean algebra to n-bit strings via cryptographic hash functions, enabling secure computations with one-way properties.
This blog post introduces the Bernoulli Model, a framework for understanding probabilistic data structures and incorporating uncertainty into data types, particularly Boolean values. It highlights the model's utility in optimizing space and accuracy in data representation.
Most hash libraries treat hash functions as black boxes. Algebraic Hashing exposes their mathematical structure, letting you compose hash functions like algebraic expressions—with zero runtime …
Exploring rank-ordered search over encrypted documents using oblivious entropy maps, enabling relevance scoring without revealing document contents.
One of the most elegant ideas I encountered during my CS masters work is the Bloom filter—a data structure that gives you probabilistic membership testing with extraordinary space efficiency.