April 6, 2024, 3:54 a.m. |

IACR News www.iacr.org

ePrint Report: Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages

Björn Ho, Huanhuan Chen, Zeshun Shi, Kaitai Liang


Searchable symmetric encryption (SSE) schemes provide users with the ability to perform keyword searches on encrypted databases without the need for decryption. While this functionality is advantageous, it introduces the potential for inadvertent information disclosure, thereby exposing SSE systems to various types of attacks. In this work, we introduce a new inference attack aimed at enhancing the query …

attacks chen data databases decryption encrypted encryption eprint report report searchable searches shi sse symmetric symmetric encryption

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Consultant Sécurité SI Gouvernance - Risques - Conformité H/F - Strasbourg

@ Hifield | Strasbourg, France

Lead Security Specialist

@ KBR, Inc. | USA, Dallas, 8121 Lemmon Ave, Suite 550, Texas

Consultant SOC / CERT H/F

@ Hifield | Sèvres, France