all InfoSec news
Too Close for Comfort? Measuring Success of Sampled-Data Leakage Attacks Against Encrypted Search
Sept. 27, 2023, 2:24 p.m. |
IACR News www.iacr.org
ePrint Report: Too Close for Comfort? Measuring Success of Sampled-Data Leakage Attacks Against Encrypted Search
Dominique Dittert, Thomas Schneider, Amos Treiber
The well-defined information leakage of Encrypted Search Algorithms (ESAs) is predominantly analyzed by crafting so-called leakage attacks. These attacks utilize adversarially known auxiliary data and the observed leakage to attack an ESA instance built on a user's data. Known-data attacks require the auxiliary data to be a subset of the user's data. In contrast, sampled-data attacks merely rely on …
algorithms amos attacks called data data leakage defined encrypted encrypted search eprint report information information leakage measuring report schneider search thomas
More from www.iacr.org / IACR News
Information-theoretic security with asymmetries
1 day, 19 hours ago |
www.iacr.org
Cryptanalytic Audit of the XHash Sponge Function and its Components
1 day, 20 hours ago |
www.iacr.org
Ipotane: Achieving the Best of All Worlds in Asynchronous BFT
1 day, 20 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Network Security Engineer – Zscaler SME
@ Peraton | United States
Splunk Data Analytic Subject Matter Expert
@ Peraton | Woodlawn, MD, United States
Principal Consultant, Offensive Security, Proactive Services (Unit 42)- Remote
@ Palo Alto Networks | Santa Clara, CA, United States
Senior Engineer Software Product Security
@ Ford Motor Company | Mexico City, MEX, Mexico
Information System Security Engineer (Red Team)
@ Evolution | Riga, Latvia