Hiding the access pattern is not enough: Exploiting search pattern leakage in searchable encryption
S Oya, F Kerschbaum - 30th USENIX security symposium (USENIX …, 2021 - usenix.org
Recent Searchable Symmetric Encryption (SSE) schemes enable secure searching over an
encrypted database stored in a server while limiting the information leaked to the server …
encrypted database stored in a server while limiting the information leaked to the server …
Revisiting leakage abuse attacks
Encrypted search algorithms (ESA) are cryptographic algorithms that support search over
encrypted data. ESAs can be designed with various primitives including …
encrypted data. ESAs can be designed with various primitives including …
{Near-Optimal} Oblivious {Key-Value} Stores for Efficient {PSI},{PSU} and {Volume-Hiding}{Multi-Maps}
In this paper, we study oblivious key-value stores (OKVS) that enable encoding n key-value
pairs into length m encodings while hiding the input keys. The goal is to obtain high rate …
pairs into length m encodings while hiding the input keys. The goal is to obtain high rate …
Leakage inversion: Towards quantifying privacy in searchable encryption
Searchable encryption (SE) provides cryptographic guarantees that a user can efficiently
search over encrypted data while only disclosing patterns about the data, also known as …
search over encrypted data while only disclosing patterns about the data, also known as …
A Survey on Searchable Symmetric Encryption
Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption
(SSE), one of the methods for protecting outsourced data, has arisen widespread interest …
(SSE), one of the methods for protecting outsourced data, has arisen widespread interest …
High recovery with fewer injections: Practical binary volumetric injection attacks against dynamic searchable encryption
Searchable symmetric encryption enables private queries over an encrypted database, but it
can also result in information leakages. Adversaries can exploit these leakages to launch …
can also result in information leakages. Adversaries can exploit these leakages to launch …
Practical volume-hiding encrypted multi-maps with optimal overhead and beyond
Encrypted multi-map (EMM), as a special case of structured encryption, has attracted
extensive attention recently. However, most of EMM constructions reveal the real volumes of …
extensive attention recently. However, most of EMM constructions reveal the real volumes of …
Structured encryption and dynamic leakage suppression
Structured encryption (STE) schemes encrypt data structures in such a way that they can be
privately queried. Special cases of STE include searchable symmetric encryption (SSE) and …
privately queried. Special cases of STE include searchable symmetric encryption (SSE) and …
Leakage-abuse attacks against forward and backward private searchable symmetric encryption
Dynamic searchable symmetric encryption (DSSE) enables a server to efficiently search and
update over encrypted files. To minimize the leakage during updates, a security notion …
update over encrypted files. To minimize the leakage during updates, a security notion …
Rethinking searchable symmetric encryption
Symmetric Searchable Encryption (SSE) schemes enable keyword searches over encrypted
documents. To obtain efficiency, SSE schemes incur a certain amount of leakage. The vast …
documents. To obtain efficiency, SSE schemes incur a certain amount of leakage. The vast …