Sok: Cryptanalysis of encrypted search with leaker–a framework for leakage attack evaluation on real-world data

S Kamara, A Kati, T Moataz, T Schneider… - 2022 IEEE 7th …, 2022 - ieeexplore.ieee.org
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 2022ieeexplore.ieee.org
An encrypted search algorithm (ESA) allows a user to encrypt its data while preserving the
ability to search over it. As all practical solutions leak some information, cryptanalysis plays
an important role in the area of encrypted search. Starting with the work of Islam et
al.(NDSS'12), many attacks have been proposed that exploit different leakage profiles under
various assumptions. While these attacks improve our understanding of leakage, it can
sometimes be difficult to draw definite conclusions about their practical performance. This is …
An encrypted search algorithm (ESA) allows a user to encrypt its data while preserving the ability to search over it. As all practical solutions leak some information, cryptanalysis plays an important role in the area of encrypted search. Starting with the work of Islam et al. (NDSS'12), many attacks have been proposed that exploit different leakage profiles under various assumptions. While these attacks improve our understanding of leakage, it can sometimes be difficult to draw definite conclusions about their practical performance. This is due to several reasons, including a lack of open-source implementations (which are needed to reproduce results), empirical evaluations that are conducted on restricted datasets, and in some cases reliance on relatively strong assumptions that can significantly affect accuracy. In this work, we address these limitations. First, we design and implement LEAKER, an open-source framework that evaluates the major leakage attacks against any dataset and that we hope will serve the community as a common way to evaluate leakage attacks. We identify new real-world datasets that capture different use cases for ESAs and, for the first time, include real-world user queries. Finally, we use LEAKER to systematically evaluate known attacks on our datasets, uncovering sometimes unexpected properties that increase or diminish accuracy. Our evaluation shows that some attacks work better on real-world data than previously thought and that others perform worse.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果