Sept. 27, 2023, 2:24 p.m. |

IACR News www.iacr.org

ePrint Report: Too Close for Comfort? Measuring Success of Sampled-Data Leakage Attacks Against Encrypted Search

Dominique Dittert, Thomas Schneider, Amos Treiber


The well-defined information leakage of Encrypted Search Algorithms (ESAs) is predominantly analyzed by crafting so-called leakage attacks. These attacks utilize adversarially known auxiliary data and the observed leakage to attack an ESA instance built on a user's data. Known-data attacks require the auxiliary data to be a subset of the user's data. In contrast, sampled-data attacks merely rely on …

algorithms amos attacks called data data leakage defined encrypted encrypted search eprint report information information leakage measuring report schneider search thomas

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)