an untrusted service provider. We explore the limits of the security that is achievable in these scenarios. When … discussing security, we refer to the state of the art definitions from cryptography and complexity theory. The key contributions … prove its correctness and security. - We describe a new searchable encryption scheme that exceeds existing analogues with …