This document discusses privacy-enhanced search techniques. It begins by motivating the need for searching encrypted or remote data without revealing sensitive information to untrusted providers. It then outlines several approaches for private information retrieval and searching directly on encrypted data, including techniques using bloom filters and searchable symmetric encryption. Key properties and examples of each technique are provided.