{Event}  Tune in on September 26 starting at 10 a.m. BST to hear all the latest product updates and announcements in the MongoDB.local London keynote >

Cryptography Research Group

Cutting-edge research and latest innovations in cryptography and privacy.
Illustration with documents and a lock over them
Who We Are
The MongoDB Cryptography Research Group conducts research in cryptography and works with MongoDB engineering teams to transfer and deploy the latest research in cryptography and privacy to the MongoDB developer data platform.
Research Areas

Encrypted search algorithms

Encrypted search algorithms (ESA) enable highly efficient search on end-to-end encrypted data. ESAs are used in the design of practical in-use database encryption technologies like Queryable Encryption.


Leakage cryptanalysis

All known efficient ESAs achieve a tradeoff between performance and information leakage. The design of leakage attacks is therefore an important way to ascertain whether an ESA is exploitable in practice or not.


Leakage analysis and suppression

Leakage analysis frameworks allow us to formally study and understand the leakage of ESAs, and leakage suppression techniques allow us to remove leakage patterns.

Our Team
Archita Agarwal image

Archita Agarwal

Research Scientist

Archita’s research bridges the gap between encrypted search and distributed computing.

Recent Activities

International Conference on Very Large DataBases (VLDB)

August 2023

Zach's paper on multi-dimensional encrypted range schemes will appear at VLDB 2023.

Research Papers
Real-World Database Encryption Scheme illustration

Design and Analysis of a Stateless Database Encryption Scheme

Seny Kamara and Tarik Moataz

In this work, we design the first encrypted document database scheme. A key focus of our work is on designing a scheme that is practical not only in terms of asymptotic and concrete efficiency but also with respect to real-world constraints that emerge when trying to build and deploy real database systems at scale for commercial use. These constraints present new technical challenges that have not been considered in the research literature before.