LEAP: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset

Searchable Encryption (SE) enables private queries on encrypted documents. Most existing SE schemes focus on constructing industrialready, practical solutions at the expense of information leakages that are considered acceptable. In particular, ShadowCrypt utilizes a cryptographic approach named “ef...

Full description

Saved in:
Bibliographic Details
Main Authors: NING, Jianting, HUANG, Xinyi, POH, Geong Sen, YUAN, Jiaming, LI, Yingjiu, WENG, Jian, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2021
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/6740
https://ink.library.smu.edu.sg/context/sis_research/article/7743/viewcontent/3460120.3484540.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
Be the first to leave a comment!
You must be logged in first