LEAP: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset
Searchable Encryption (SE) enables private queries on encrypted documents. Most existing SE schemes focus on constructing industrialready, practical solutions at the expense of information leakages that are considered acceptable. In particular, ShadowCrypt utilizes a cryptographic approach named “ef...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2021
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/6740 https://ink.library.smu.edu.sg/context/sis_research/article/7743/viewcontent/3460120.3484540.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-7743 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-77432022-01-27T10:52:51Z LEAP: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset NING, Jianting HUANG, Xinyi POH, Geong Sen YUAN, Jiaming LI, Yingjiu WENG, Jian DENG, Robert H. Searchable Encryption (SE) enables private queries on encrypted documents. Most existing SE schemes focus on constructing industrialready, practical solutions at the expense of information leakages that are considered acceptable. In particular, ShadowCrypt utilizes a cryptographic approach named “efficiently deployable, efficiently searchable encryption” (EDESE) that reveals the encrypted dataset and the query tokens among other information. However, recent attacks showed that such leakages can be exploited to (partially) recover the underlying keywords of query tokens under certain assumptions on the attacker’s background knowledge. We continue this line of work by presenting LEAP, a new leakageabuse attack on EDESE schemes that can accurately recover the underlying keywords of query tokens based on partially known documents and the L2 leakage as per defined by Cash et al. (CCS ’15). As an auxiliary function, our attack supports document recovery in the similar setting. To the best of our knowledge, this is the first attack on EDESE schemes that achieves keyword recovery and document recovery without error based on partially known documents and L2 leakage. We conduct extensive experiments to demonstrate the effectiveness of our attack by varying levels of attacker’s background knowledge. 2021-11-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/6740 info:doi/10.1145/3460120.3484540 https://ink.library.smu.edu.sg/context/sis_research/article/7743/viewcontent/3460120.3484540.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Searchable encryption leakage attack Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Searchable encryption leakage attack Information Security |
spellingShingle |
Searchable encryption leakage attack Information Security NING, Jianting HUANG, Xinyi POH, Geong Sen YUAN, Jiaming LI, Yingjiu WENG, Jian DENG, Robert H. LEAP: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset |
description |
Searchable Encryption (SE) enables private queries on encrypted documents. Most existing SE schemes focus on constructing industrialready, practical solutions at the expense of information leakages that are considered acceptable. In particular, ShadowCrypt utilizes a cryptographic approach named “efficiently deployable, efficiently searchable encryption” (EDESE) that reveals the encrypted dataset and the query tokens among other information. However, recent attacks showed that such leakages can be exploited to (partially) recover the underlying keywords of query tokens under certain assumptions on the attacker’s background knowledge. We continue this line of work by presenting LEAP, a new leakageabuse attack on EDESE schemes that can accurately recover the underlying keywords of query tokens based on partially known documents and the L2 leakage as per defined by Cash et al. (CCS ’15). As an auxiliary function, our attack supports document recovery in the similar setting. To the best of our knowledge, this is the first attack on EDESE schemes that achieves keyword recovery and document recovery without error based on partially known documents and L2 leakage. We conduct extensive experiments to demonstrate the effectiveness of our attack by varying levels of attacker’s background knowledge. |
format |
text |
author |
NING, Jianting HUANG, Xinyi POH, Geong Sen YUAN, Jiaming LI, Yingjiu WENG, Jian DENG, Robert H. |
author_facet |
NING, Jianting HUANG, Xinyi POH, Geong Sen YUAN, Jiaming LI, Yingjiu WENG, Jian DENG, Robert H. |
author_sort |
NING, Jianting |
title |
LEAP: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset |
title_short |
LEAP: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset |
title_full |
LEAP: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset |
title_fullStr |
LEAP: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset |
title_full_unstemmed |
LEAP: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset |
title_sort |
leap: leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2021 |
url |
https://ink.library.smu.edu.sg/sis_research/6740 https://ink.library.smu.edu.sg/context/sis_research/article/7743/viewcontent/3460120.3484540.pdf |
_version_ |
1770576065339588608 |