LEAP: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset

Searchable Encryption (SE) enables private queries on encrypted documents. Most existing SE schemes focus on constructing industrialready, practical solutions at the expense of information leakages that are considered acceptable. In particular, ShadowCrypt utilizes a cryptographic approach named “ef...

Full description

Saved in:
Bibliographic Details
Main Authors: NING, Jianting, HUANG, Xinyi, POH, Geong Sen, YUAN, Jiaming, LI, Yingjiu, WENG, Jian, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2021
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/6740
https://ink.library.smu.edu.sg/context/sis_research/article/7743/viewcontent/3460120.3484540.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-7743
record_format dspace
spelling sg-smu-ink.sis_research-77432022-01-27T10:52:51Z LEAP: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset NING, Jianting HUANG, Xinyi POH, Geong Sen YUAN, Jiaming LI, Yingjiu WENG, Jian DENG, Robert H. Searchable Encryption (SE) enables private queries on encrypted documents. Most existing SE schemes focus on constructing industrialready, practical solutions at the expense of information leakages that are considered acceptable. In particular, ShadowCrypt utilizes a cryptographic approach named “efficiently deployable, efficiently searchable encryption” (EDESE) that reveals the encrypted dataset and the query tokens among other information. However, recent attacks showed that such leakages can be exploited to (partially) recover the underlying keywords of query tokens under certain assumptions on the attacker’s background knowledge. We continue this line of work by presenting LEAP, a new leakageabuse attack on EDESE schemes that can accurately recover the underlying keywords of query tokens based on partially known documents and the L2 leakage as per defined by Cash et al. (CCS ’15). As an auxiliary function, our attack supports document recovery in the similar setting. To the best of our knowledge, this is the first attack on EDESE schemes that achieves keyword recovery and document recovery without error based on partially known documents and L2 leakage. We conduct extensive experiments to demonstrate the effectiveness of our attack by varying levels of attacker’s background knowledge. 2021-11-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/6740 info:doi/10.1145/3460120.3484540 https://ink.library.smu.edu.sg/context/sis_research/article/7743/viewcontent/3460120.3484540.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Searchable encryption leakage attack Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Searchable encryption
leakage
attack
Information Security
spellingShingle Searchable encryption
leakage
attack
Information Security
NING, Jianting
HUANG, Xinyi
POH, Geong Sen
YUAN, Jiaming
LI, Yingjiu
WENG, Jian
DENG, Robert H.
LEAP: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset
description Searchable Encryption (SE) enables private queries on encrypted documents. Most existing SE schemes focus on constructing industrialready, practical solutions at the expense of information leakages that are considered acceptable. In particular, ShadowCrypt utilizes a cryptographic approach named “efficiently deployable, efficiently searchable encryption” (EDESE) that reveals the encrypted dataset and the query tokens among other information. However, recent attacks showed that such leakages can be exploited to (partially) recover the underlying keywords of query tokens under certain assumptions on the attacker’s background knowledge. We continue this line of work by presenting LEAP, a new leakageabuse attack on EDESE schemes that can accurately recover the underlying keywords of query tokens based on partially known documents and the L2 leakage as per defined by Cash et al. (CCS ’15). As an auxiliary function, our attack supports document recovery in the similar setting. To the best of our knowledge, this is the first attack on EDESE schemes that achieves keyword recovery and document recovery without error based on partially known documents and L2 leakage. We conduct extensive experiments to demonstrate the effectiveness of our attack by varying levels of attacker’s background knowledge.
format text
author NING, Jianting
HUANG, Xinyi
POH, Geong Sen
YUAN, Jiaming
LI, Yingjiu
WENG, Jian
DENG, Robert H.
author_facet NING, Jianting
HUANG, Xinyi
POH, Geong Sen
YUAN, Jiaming
LI, Yingjiu
WENG, Jian
DENG, Robert H.
author_sort NING, Jianting
title LEAP: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset
title_short LEAP: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset
title_full LEAP: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset
title_fullStr LEAP: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset
title_full_unstemmed LEAP: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset
title_sort leap: leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset
publisher Institutional Knowledge at Singapore Management University
publishDate 2021
url https://ink.library.smu.edu.sg/sis_research/6740
https://ink.library.smu.edu.sg/context/sis_research/article/7743/viewcontent/3460120.3484540.pdf
_version_ 1770576065339588608