Leakage inversion: Towards quantifying privacy in searchable encryption

EM Kornaropoulos, N Moyer, C Papamanthou… - Proceedings of the …, 2022 - dl.acm.org
Searchable encryption (SE) provides cryptographic guarantees that a user can efficiently
search over encrypted data while only disclosing patterns about the data, also known as …

High recovery with fewer injections: Practical binary volumetric injection attacks against dynamic searchable encryption

X Zhang, W Wang, P Xu, LT Yang, K Liang - 32nd USENIX Security …, 2023 - usenix.org
Searchable symmetric encryption enables private queries over an encrypted database, but it
can also result in information leakages. Adversaries can exploit these leakages to launch …

Leakage-abuse attacks against forward and backward private searchable symmetric encryption

L Xu, L Zheng, C Xu, X Yuan, C Wang - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
Dynamic searchable symmetric encryption (DSSE) enables a server to efficiently search and
update over encrypted files. To minimize the leakage during updates, a security notion …

Rethinking searchable symmetric encryption

Z Gui, KG Paterson, S Patranabis - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Symmetric Searchable Encryption (SSE) schemes enable keyword searches over encrypted
documents. To obtain efficiency, SSE schemes incur a certain amount of leakage. The vast …

Sok: Content moderation for end-to-end encryption

S Scheffler, J Mayer - arXiv preprint arXiv:2303.03979, 2023 - arxiv.org
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and
E2EE data storage is becoming common. These important advances for security and privacy …

Attacks on encrypted response-hiding range search schemes in multiple dimensions

EA Markatou, F Falzon, Z Espiritu… - Proceedings on Privacy …, 2023 - petsymposium.org
In this work, we present the first database reconstruction attacks against response-hiding
private range search schemes on encrypted databases of arbitrary dimensions. Falzon et …

SWiSSSE: System-wide security for searchable symmetric encryption

Z Gui, KG Paterson, S Patranabis… - Proceedings on Privacy …, 2024 - petsymposium.org
This paper initiates a new direction in the design and analysis of searchable symmetric
encryption (SSE) schemes. We provide the first comprehensive security model and definition …

Menhir: an oblivious database with protection against access and volume pattern leakage

L Reichert, GR Chandran, P Schoppmann… - Proceedings of the 19th …, 2024 - dl.acm.org
Analyzing user data while protecting the privacy of individuals remains a big challenge.
Trusted execution environments (TEEs) are a possible solution as they protect processes …

PrivMail: A Privacy-Preserving Framework for Secure Emails

GR Chandran, R Nieminen, T Schneider… - European Symposium on …, 2023 - Springer
Emails have improved our workplace efficiency and communication. However, they are often
processed unencrypted by mail servers, leaving them open to data breaches on a single …

MAPLE: MArkov Process Leakage attacks on Encrypted Search

S Kamara, A Kati, T Moataz, J DeMaria… - Proceedings on …, 2024 - petsymposium.org
Encrypted search algorithms (ESAs) enable private search on encrypted data and can be
constructed from a variety of cryptographic primitives. All knownsub-linear ESA algorithms …