Hiding the access pattern is not enough: Exploiting search pattern leakage in searchable encryption
S Oya, F Kerschbaum - 30th USENIX security symposium (USENIX …, 2021 - usenix.org
Recent Searchable Symmetric Encryption (SSE) schemes enable secure searching over an
encrypted database stored in a server while limiting the information leaked to the server …
encrypted database stored in a server while limiting the information leaked to the server …
Practical non-interactive searchable encryption with forward and backward privacy
Abstract In Dynamic Symmetric Searchable Encryption (DSSE), forward privacy ensures that
previous search queries cannot be associated with future updates, while backward privacy …
previous search queries cannot be associated with future updates, while backward privacy …
Leakage inversion: Towards quantifying privacy in searchable encryption
Searchable encryption (SE) provides cryptographic guarantees that a user can efficiently
search over encrypted data while only disclosing patterns about the data, also known as …
search over encrypted data while only disclosing patterns about the data, also known as …
High recovery with fewer injections: Practical binary volumetric injection attacks against dynamic searchable encryption
Searchable symmetric encryption enables private queries over an encrypted database, but it
can also result in information leakages. Adversaries can exploit these leakages to launch …
can also result in information leakages. Adversaries can exploit these leakages to launch …
{SEAL}: Attack mitigation for encrypted databases via adjustable leakage
Building expressive encrypted databases that can scale to large volumes of data while
enjoying formal security guarantees has been one of the holy grails of security and …
enjoying formal security guarantees has been one of the holy grails of security and …
Forward and backward private conjunctive searchable symmetric encryption
S Patranabis, D Mukhopadhyay - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Dynamic searchable symmetric encryption (SSE) supports updates and keyword searches
in tandem on outsourced symmetrically encrypted data, while aiming to minimize the …
in tandem on outsourced symmetrically encrypted data, while aiming to minimize the …
Practical volume-hiding encrypted multi-maps with optimal overhead and beyond
Encrypted multi-map (EMM), as a special case of structured encryption, has attracted
extensive attention recently. However, most of EMM constructions reveal the real volumes of …
extensive attention recently. However, most of EMM constructions reveal the real volumes of …
Leakage-abuse attacks against forward and backward private searchable symmetric encryption
Dynamic searchable symmetric encryption (DSSE) enables a server to efficiently search and
update over encrypted files. To minimize the leakage during updates, a security notion …
update over encrypted files. To minimize the leakage during updates, a security notion …
Structured encryption and dynamic leakage suppression
Structured encryption (STE) schemes encrypt data structures in such a way that they can be
privately queried. Special cases of STE include searchable symmetric encryption (SSE) and …
privately queried. Special cases of STE include searchable symmetric encryption (SSE) and …
Rethinking searchable symmetric encryption
Symmetric Searchable Encryption (SSE) schemes enable keyword searches over encrypted
documents. To obtain efficiency, SSE schemes incur a certain amount of leakage. The vast …
documents. To obtain efficiency, SSE schemes incur a certain amount of leakage. The vast …