作者: Xiangfu Song , Dong Yin , Han Jiang , Qiuliang Xu
DOI: 10.1007/978-3-030-59410-7_10
关键词:
摘要: Searchable symmetric encryption has been a promising primitive as it enables cloud user to search over outsourced encrypted data efficiently by only leaking small amount of controllable leakage. However, recent leakage-abuse attacks demonstrate that those stand leakage profiles can be exploited perform severe – the attacker recover query or document with high probability. Ideal defending methods leveraging heavy cryptographic primitives, e.g. Oblivious RAM, Multiparty Computation, are still too inefficient for practice nowadays.