Leakage inversion: Towards quantifying privacy in searchable encryption
Searchable encryption (SE) provides cryptographic guarantees that a user can efficiently
search over encrypted data while only disclosing patterns about the data, also known as …
search over encrypted data while only disclosing patterns about the data, also known as …
High recovery with fewer injections: Practical binary volumetric injection attacks against dynamic searchable encryption
Searchable symmetric encryption enables private queries over an encrypted database, but it
can also result in information leakages. Adversaries can exploit these leakages to launch …
can also result in information leakages. Adversaries can exploit these leakages to launch …
Leakage-abuse attacks against forward and backward private searchable symmetric encryption
Dynamic searchable symmetric encryption (DSSE) enables a server to efficiently search and
update over encrypted files. To minimize the leakage during updates, a security notion …
update over encrypted files. To minimize the leakage during updates, a security notion …
Rethinking searchable symmetric encryption
Symmetric Searchable Encryption (SSE) schemes enable keyword searches over encrypted
documents. To obtain efficiency, SSE schemes incur a certain amount of leakage. The vast …
documents. To obtain efficiency, SSE schemes incur a certain amount of leakage. The vast …
Sok: Cryptanalysis of encrypted search with leaker–a framework for leakage attack evaluation on real-world data
An encrypted search algorithm (ESA) allows a user to encrypt its data while preserving the
ability to search over it. As all practical solutions leak some information, cryptanalysis plays …
ability to search over it. As all practical solutions leak some information, cryptanalysis plays …
Omnes pro uno: Practical {Multi-Writer} encrypted database
Multi-writer encrypted databases allow a reader to search over data contributed by multiple
writers securely. Public-key searchable encryption (PKSE) appears to be the right primitive …
writers securely. Public-key searchable encryption (PKSE) appears to be the right primitive …
Security analysis of {MongoDB} queryable encryption
Z Gui, KG Paterson, T Tang - 32nd USENIX Security Symposium …, 2023 - usenix.org
In June 2022, MongoDB released Queryable Encryption (QE), an extension of their flagship
database product, enabling keyword searches to be performed over encrypted data. This is …
database product, enabling keyword searches to be performed over encrypted data. This is …
Attacks on encrypted response-hiding range search schemes in multiple dimensions
In this work, we present the first database reconstruction attacks against response-hiding
private range search schemes on encrypted databases of arbitrary dimensions. Falzon et …
private range search schemes on encrypted databases of arbitrary dimensions. Falzon et …
Result-pattern-hiding conjunctive searchable symmetric encryption with forward and backward privacy
Dynamic searchable symmetric encryption (DSSE) enables the data owner to outsource its
database (document sets) to an untrusted server and make searches and updates securely …
database (document sets) to an untrusted server and make searches and updates securely …
SWiSSSE: System-wide security for searchable symmetric encryption
This paper initiates a new direction in the design and analysis of searchable symmetric
encryption (SSE) schemes. We provide the first comprehensive security model and definition …
encryption (SSE) schemes. We provide the first comprehensive security model and definition …