Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security 2015
DOI: 10.1145/2810103.2813700
|View full text |Cite
|
Sign up to set email alerts
|

Leakage-Abuse Attacks Against Searchable Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

7
437
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 456 publications
(444 citation statements)
references
References 12 publications
7
437
0
Order By: Relevance
“…Cash et al [6] generalize this approach by suggesting a classification of most existing SE schemes based on their leakage profile. To this end they define four profiles named from L1, that reveals the least information, to L4 that reveals the most information.…”
Section: The Existing Leakage Profile Classificationmentioning
confidence: 99%
See 3 more Smart Citations
“…Cash et al [6] generalize this approach by suggesting a classification of most existing SE schemes based on their leakage profile. To this end they define four profiles named from L1, that reveals the least information, to L4 that reveals the most information.…”
Section: The Existing Leakage Profile Classificationmentioning
confidence: 99%
“…, w n } be the set of all keywords as in L2, the information contained in the L3 profile can be represented as: We now quickly recall the main existing leakageabuse attacks. An attack named "count attack" targeting the L1 profile is presented in [6]. The prior knowledge required by the count attack consists in the probability of co-occurrence of keywords (for instance "New" is very likely to occur if "York" is present) as well as the number of indices containing each keyword.…”
Section: The Existing Leakage Profile Classificationmentioning
confidence: 99%
See 2 more Smart Citations
“…Commercial systems that also provide searchable encryption include Skyhigh Networks [13], CipherCloud [14] and Bitglass [15]. These systems use a simple SSE approach, such as attaching keyword tokens to an encrypted document, as stated in [16]. We remark that all these systems focus on outsourcing to a single storage provider.…”
Section: Systemsmentioning
confidence: 99%