Leakage inversion: Towards quantifying privacy in searchable encryption

EM Kornaropoulos, N Moyer, C Papamanthou… - Proceedings of the …, 2022 - dl.acm.org
Searchable encryption (SE) provides cryptographic guarantees that a user can efficiently
search over encrypted data while only disclosing patterns about the data, also known as …

High recovery with fewer injections: Practical binary volumetric injection attacks against dynamic searchable encryption

X Zhang, W Wang, P Xu, LT Yang, K Liang - 32nd USENIX Security …, 2023 - usenix.org
Searchable symmetric encryption enables private queries over an encrypted database, but it
can also result in information leakages. Adversaries can exploit these leakages to launch …

Leakage-abuse attacks against forward and backward private searchable symmetric encryption

L Xu, L Zheng, C Xu, X Yuan, C Wang - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
Dynamic searchable symmetric encryption (DSSE) enables a server to efficiently search and
update over encrypted files. To minimize the leakage during updates, a security notion …

Rethinking searchable symmetric encryption

Z Gui, KG Paterson, S Patranabis - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Symmetric Searchable Encryption (SSE) schemes enable keyword searches over encrypted
documents. To obtain efficiency, SSE schemes incur a certain amount of leakage. The vast …

Sok: Cryptanalysis of encrypted search with leaker–a framework for leakage attack evaluation on real-world data

S Kamara, A Kati, T Moataz, T Schneider… - 2022 IEEE 7th …, 2022 - ieeexplore.ieee.org
An encrypted search algorithm (ESA) allows a user to encrypt its data while preserving the
ability to search over it. As all practical solutions leak some information, cryptanalysis plays …

Omnes pro uno: Practical {Multi-Writer} encrypted database

J Wang, SSM Chow - … USENIX Security Symposium (USENIX Security 22 …, 2022 - usenix.org
Multi-writer encrypted databases allow a reader to search over data contributed by multiple
writers securely. Public-key searchable encryption (PKSE) appears to be the right primitive …

Security analysis of {MongoDB} queryable encryption

Z Gui, KG Paterson, T Tang - 32nd USENIX Security Symposium …, 2023 - usenix.org
In June 2022, MongoDB released Queryable Encryption (QE), an extension of their flagship
database product, enabling keyword searches to be performed over encrypted data. This is …

Attacks on encrypted response-hiding range search schemes in multiple dimensions

EA Markatou, F Falzon, Z Espiritu… - Proceedings on Privacy …, 2023 - petsymposium.org
In this work, we present the first database reconstruction attacks against response-hiding
private range search schemes on encrypted databases of arbitrary dimensions. Falzon et …

Result-pattern-hiding conjunctive searchable symmetric encryption with forward and backward privacy

D Yuan, C Zuo, S Cui, G Russello - Proceedings on Privacy …, 2023 - petsymposium.org
Dynamic searchable symmetric encryption (DSSE) enables the data owner to outsource its
database (document sets) to an untrusted server and make searches and updates securely …

SWiSSSE: System-wide security for searchable symmetric encryption

Z Gui, KG Paterson, S Patranabis… - Proceedings on Privacy …, 2024 - petsymposium.org
This paper initiates a new direction in the design and analysis of searchable symmetric
encryption (SSE) schemes. We provide the first comprehensive security model and definition …