Hiding the access pattern is not enough: Exploiting search pattern leakage in searchable encryption

S Oya, F Kerschbaum - 30th USENIX security symposium (USENIX …, 2021 - usenix.org
Recent Searchable Symmetric Encryption (SSE) schemes enable secure searching over an
encrypted database stored in a server while limiting the information leaked to the server …

Practical non-interactive searchable encryption with forward and backward privacy

SF Sun, R Steinfeld, S Lai, X Yuan… - Usenix Network and …, 2021 - research.monash.edu
Abstract In Dynamic Symmetric Searchable Encryption (DSSE), forward privacy ensures that
previous search queries cannot be associated with future updates, while backward privacy …

Leakage inversion: Towards quantifying privacy in searchable encryption

EM Kornaropoulos, N Moyer, C Papamanthou… - Proceedings of the …, 2022 - dl.acm.org
Searchable encryption (SE) provides cryptographic guarantees that a user can efficiently
search over encrypted data while only disclosing patterns about the data, also known as …

High recovery with fewer injections: Practical binary volumetric injection attacks against dynamic searchable encryption

X Zhang, W Wang, P Xu, LT Yang, K Liang - 32nd USENIX Security …, 2023 - usenix.org
Searchable symmetric encryption enables private queries over an encrypted database, but it
can also result in information leakages. Adversaries can exploit these leakages to launch …

{SEAL}: Attack mitigation for encrypted databases via adjustable leakage

I Demertzis, D Papadopoulos, C Papamanthou… - 29th USENIX security …, 2020 - usenix.org
Building expressive encrypted databases that can scale to large volumes of data while
enjoying formal security guarantees has been one of the holy grails of security and …

Forward and backward private conjunctive searchable symmetric encryption

S Patranabis, D Mukhopadhyay - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Dynamic searchable symmetric encryption (SSE) supports updates and keyword searches
in tandem on outsourced symmetrically encrypted data, while aiming to minimize the …

Practical volume-hiding encrypted multi-maps with optimal overhead and beyond

J Wang, SF Sun, T Li, S Qi, X Chen - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Encrypted multi-map (EMM), as a special case of structured encryption, has attracted
extensive attention recently. However, most of EMM constructions reveal the real volumes of …

Leakage-abuse attacks against forward and backward private searchable symmetric encryption

L Xu, L Zheng, C Xu, X Yuan, C Wang - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
Dynamic searchable symmetric encryption (DSSE) enables a server to efficiently search and
update over encrypted files. To minimize the leakage during updates, a security notion …

Structured encryption and dynamic leakage suppression

M George, S Kamara, T Moataz - … on the Theory and Applications of …, 2021 - Springer
Structured encryption (STE) schemes encrypt data structures in such a way that they can be
privately queried. Special cases of STE include searchable symmetric encryption (SSE) and …

Rethinking searchable symmetric encryption

Z Gui, KG Paterson, S Patranabis - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Symmetric Searchable Encryption (SSE) schemes enable keyword searches over encrypted
documents. To obtain efficiency, SSE schemes incur a certain amount of leakage. The vast …