LEAP: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset
Searchable Encryption (SE) enables private queries on encrypted documents. Most existing SE schemes focus on constructing industrialready, practical solutions at the expense of information leakages that are considered acceptable. In particular, ShadowCrypt utilizes a cryptographic approach named “ef...
Saved in:
Main Authors: | NING, Jianting, HUANG, Xinyi, POH, Geong Sen, YUAN, Jiaming, LI, Yingjiu, WENG, Jian, DENG, Robert H. |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2021
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/6740 https://ink.library.smu.edu.sg/context/sis_research/article/7743/viewcontent/3460120.3484540.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption
by: YUAN, Jiaming, et al.
Published: (2022) -
A survey on searchable symmetric encryption
by: LI, Feng, et al.
Published: (2024) -
Update recovery attacks on encrypted database within two updates using range queries leakage
by: NING, Jianting, et al.
Published: (2022) -
Sequence aware functional encryption and its application in searchable encryption
by: PHUONG, Tran Viet Xuan, et al.
Published: (2017) -
Semantic Searchable Encryption Scheme based on Lattice in Quantum-era
by: Yang, Yang, et al.
Published: (2017)