all InfoSec news
MAPLE: MArkov Process Leakage attacks on Encrypted Search
June 6, 2023, 8:54 a.m. |
IACR News www.iacr.org
ePrint Report: MAPLE: MArkov Process Leakage attacks on Encrypted Search
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Jamie DeMaria, Andrew Park, Amos Treiber
Encrypted search algorithms (ESAs) enable private search on encrypted data and
can be constructed from a variety of cryptographic primitives. All known
sub-linear ESA algorithms leak information and, therefore, the design of leakage
attacks is an important way to ascertain whether a given leakage profile is
exploitable in practice. Recently, Oya and Kerschbaum (Usenix '22)
presented an attack …
algorithms amos attacks data enable encrypted encrypted data eprint report esa information leak linear private private search process report search
More from www.iacr.org / IACR News
Post-Doc in Lattice-Based Cryptography
1 day, 21 hours ago |
www.iacr.org
WPEC 2024: NIST Workshop on Privacy Enhancing Cryptography
1 day, 21 hours ago |
www.iacr.org
Indistinguishability Obfuscation from Bilinear Maps and LPN Variants
2 days, 2 hours ago |
www.iacr.org
Securing the Future of GenAI: Policy and Technology
2 days, 2 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Security Compliance Strategist
@ Grab | Petaling Jaya, Malaysia
Cloud Security Architect, Lead
@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)