Hiding the access pattern is not enough: Exploiting search pattern leakage in searchable encryption

S Oya, F Kerschbaum - 30th USENIX security symposium (USENIX …, 2021 - usenix.org
Recent Searchable Symmetric Encryption (SSE) schemes enable secure searching over an
encrypted database stored in a server while limiting the information leaked to the server …

Revisiting leakage abuse attacks

L Blackstone, S Kamara, T Moataz - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Encrypted search algorithms (ESA) are cryptographic algorithms that support search over
encrypted data. ESAs can be designed with various primitives including …

{Near-Optimal} Oblivious {Key-Value} Stores for Efficient {PSI},{PSU} and {Volume-Hiding}{Multi-Maps}

A Bienstock, S Patel, JY Seo, K Yeo - 32nd USENIX Security Symposium …, 2023 - usenix.org
In this paper, we study oblivious key-value stores (OKVS) that enable encoding n key-value
pairs into length m encodings while hiding the input keys. The goal is to obtain high rate …

Leakage inversion: Towards quantifying privacy in searchable encryption

EM Kornaropoulos, N Moyer, C Papamanthou… - Proceedings of the …, 2022 - dl.acm.org
Searchable encryption (SE) provides cryptographic guarantees that a user can efficiently
search over encrypted data while only disclosing patterns about the data, also known as …

A Survey on Searchable Symmetric Encryption

F Li, J Ma, Y Miao, X Liu, J Ning, RH Deng - ACM Computing Surveys, 2023 - dl.acm.org
Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption
(SSE), one of the methods for protecting outsourced data, has arisen widespread interest …

High recovery with fewer injections: Practical binary volumetric injection attacks against dynamic searchable encryption

X Zhang, W Wang, P Xu, LT Yang, K Liang - 32nd USENIX Security …, 2023 - usenix.org
Searchable symmetric encryption enables private queries over an encrypted database, but it
can also result in information leakages. Adversaries can exploit these leakages to launch …

Practical volume-hiding encrypted multi-maps with optimal overhead and beyond

J Wang, SF Sun, T Li, S Qi, X Chen - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Encrypted multi-map (EMM), as a special case of structured encryption, has attracted
extensive attention recently. However, most of EMM constructions reveal the real volumes of …

Structured encryption and dynamic leakage suppression

M George, S Kamara, T Moataz - … on the Theory and Applications of …, 2021 - Springer
Structured encryption (STE) schemes encrypt data structures in such a way that they can be
privately queried. Special cases of STE include searchable symmetric encryption (SSE) and …

Leakage-abuse attacks against forward and backward private searchable symmetric encryption

L Xu, L Zheng, C Xu, X Yuan, C Wang - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
Dynamic searchable symmetric encryption (DSSE) enables a server to efficiently search and
update over encrypted files. To minimize the leakage during updates, a security notion …

Rethinking searchable symmetric encryption

Z Gui, KG Paterson, S Patranabis - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Symmetric Searchable Encryption (SSE) schemes enable keyword searches over encrypted
documents. To obtain efficiency, SSE schemes incur a certain amount of leakage. The vast …