作者
David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart
发表日期
2015/10/12
图书
Proceedings of the 22nd ACM SIGSAC conference on computer and communications security
页码范围
668-679
简介
Schemes for secure outsourcing of client data with search capability are being increasingly marketed and deployed. In the literature, schemes for accomplishing this efficiently are called Searchable Encryption (SE). They achieve high efficiency with provable security by means of a quantifiable leakage profile. However, the degree to which SE leakage can be exploited by an adversary is not well understood.
To address this, we present a characterization of the leakage profiles of in-the-wild searchable encryption products and SE schemes in the literature, and present attack models based on an adversarial server's prior knowledge. Then we empirically investigate the security of searchable encryption by providing query recovery and plaintext recovery attacks that exploit these leakage profiles. We term these leakage-abuse attacks and demonstrate their effectiveness for varying leakage profiles and levels of server …
引用总数
2014201520162017201820192020202120222023202423346175931061048410048
学术搜索中的文章
D Cash, P Grubbs, J Perry, T Ristenpart - Proceedings of the 22nd ACM SIGSAC conference on …, 2015