scispace - formally typeset
Open AccessJournal ArticleDOI

Search pattern leakage in searchable encryption: Attacks and new construction

TLDR
A grouping-based construction (GBC) is developed to transform an existing searchable encryption scheme to a new scheme hiding the search pattern, because an adversary who has some auxiliary knowledge can uncover the underlying keywords of user queries.
About
This article is published in Information Sciences.The article was published on 2014-05-01 and is currently open access. It has received 161 citations till now. The article focuses on the topics: On-the-fly encryption & Encryption.

read more

Citations
More filters
Proceedings ArticleDOI

Generic Attacks on Secure Outsourced Databases

TL;DR: This work proposes abstract models that capture secure outsourced storage systems in sufficient generality, and identifies two basic sources of leakage, namely access pattern and ommunication volume, and develops generic reconstruction attacks on any system supporting range queries where either access pattern or communication volume is leaked.
Proceedings Article

All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption

TL;DR: In this paper, file-injection attacks on the query privacy of searchable encryption (SE) schemes have been studied, in which the server sends files to the client that the client then encrypts and stores, and such attacks can reveal the client queries in their entirety using very few injected files.
Journal ArticleDOI

An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks

TL;DR: Wang et al. as discussed by the authors proposed the notion of Authenticated Encryption with Keyword Search (PAEKS), in which the data sender not only encrypts a keyword, but also authenticates it, so that a verifier would be convinced that the encrypted keyword can only be generated by the sender.
Journal ArticleDOI

EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing

TL;DR: A scheme that supports CBIR over the encrypted images without revealing the sensitive information to the cloud server is proposed and the security and efficiency of the proposed scheme are shown.
Journal ArticleDOI

Identity-based encryption with outsourced equality test in cloud computing

TL;DR: IBEET can simplify the certificate management of PKEET with all messages encrypted with the receiver's public identity, and is the first time to integrate identity-based encryption into public key encryption with equality test.
References
More filters
Journal ArticleDOI

Space/time trade-offs in hash coding with allowable errors

TL;DR: Analysis of the paradigm problem demonstrates that allowing a small number of test messages to be falsely identified as members of the given set will permit a much smaller hash area to be used without increasing reject time.
Proceedings ArticleDOI

Practical techniques for searches on encrypted data

TL;DR: This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
Book ChapterDOI

Public Key Encryption with Keyword Search

TL;DR: This work defines and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email.
Journal ArticleDOI

Software protection and simulation on oblivious RAMs

TL;DR: This paper shows how to do an on-line simulation of an arbitrary RAM by a probabilistic oblivious RAM with a polylogaithmic slowdown in the running time, and shows that a logarithmic slowdown is a lower bound.
Book ChapterDOI

Cryptographic cloud storage

TL;DR: This work considers the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer and describes several architectures that combine recent and non-standard cryptographic primitives to achieve this goal.
Related Papers (5)