Search pattern leakage in searchable encryption: Attacks and new construction
TLDR
A grouping-based construction (GBC) is developed to transform an existing searchable encryption scheme to a new scheme hiding the search pattern, because an adversary who has some auxiliary knowledge can uncover the underlying keywords of user queries.About:
This article is published in Information Sciences.The article was published on 2014-05-01 and is currently open access. It has received 161 citations till now. The article focuses on the topics: On-the-fly encryption & Encryption.read more
Citations
More filters
Proceedings ArticleDOI
Generic Attacks on Secure Outsourced Databases
TL;DR: This work proposes abstract models that capture secure outsourced storage systems in sufficient generality, and identifies two basic sources of leakage, namely access pattern and ommunication volume, and develops generic reconstruction attacks on any system supporting range queries where either access pattern or communication volume is leaked.
Proceedings Article
All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption
TL;DR: In this paper, file-injection attacks on the query privacy of searchable encryption (SE) schemes have been studied, in which the server sends files to the client that the client then encrypts and stores, and such attacks can reveal the client queries in their entirety using very few injected files.
Journal ArticleDOI
An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
TL;DR: Wang et al. as discussed by the authors proposed the notion of Authenticated Encryption with Keyword Search (PAEKS), in which the data sender not only encrypts a keyword, but also authenticates it, so that a verifier would be convinced that the encrypted keyword can only be generated by the sender.
Journal ArticleDOI
EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing
TL;DR: A scheme that supports CBIR over the encrypted images without revealing the sensitive information to the cloud server is proposed and the security and efficiency of the proposed scheme are shown.
Journal ArticleDOI
Identity-based encryption with outsourced equality test in cloud computing
TL;DR: IBEET can simplify the certificate management of PKEET with all messages encrypted with the receiver's public identity, and is the first time to integrate identity-based encryption into public key encryption with equality test.
References
More filters
Journal ArticleDOI
Space/time trade-offs in hash coding with allowable errors
TL;DR: Analysis of the paradigm problem demonstrates that allowing a small number of test messages to be falsely identified as members of the given set will permit a much smaller hash area to be used without increasing reject time.
Proceedings ArticleDOI
Practical techniques for searches on encrypted data
TL;DR: This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
Book ChapterDOI
Public Key Encryption with Keyword Search
TL;DR: This work defines and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email.
Journal ArticleDOI
Software protection and simulation on oblivious RAMs
Oded Goldreich,Rafail Ostrovsky +1 more
TL;DR: This paper shows how to do an on-line simulation of an arbitrary RAM by a probabilistic oblivious RAM with a polylogaithmic slowdown in the running time, and shows that a logarithmic slowdown is a lower bound.
Book ChapterDOI
Cryptographic cloud storage
Seny Kamara,Kristin E. Lauter +1 more
TL;DR: This work considers the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer and describes several architectures that combine recent and non-standard cryptographic primitives to achieve this goal.