A Leakage-Abuse Attack Against Multi-User Searchable Encryption

作者: Cédric Van Rompay , Refik Molva , Melek Önen

DOI: 10.1515/POPETS-2017-0034

关键词:

摘要:

参考文章(32)
Feng Bao, Robert H Deng, Xuhua Ding, Yanjiang Yang, None, Private query on encrypted data in multi-user settings information security practice and experience. ,vol. 4991, pp. 71- 85 ,(2008) , 10.1007/978-3-540-79104-1_6
Mingzhong Wang, Yu-an Tan, Chang Liu, Liehuang Zhu, Search pattern leakage in searchable encryption: Attacks and new construction Information Sciences. ,vol. 265, pp. 176- 188 ,(2014) , 10.1016/J.INS.2013.11.021
Reza Curtmola, Juan Garay, Seny Kamara, Rafail Ostrovsky, Searchable symmetric encryption: Improved definitions and efficient constructions Journal of Computer Security. ,vol. 19, pp. 895- 934 ,(2011) , 10.3233/JCS-2011-0426
Dawn Xiaoding Song, D. Wagner, A. Perrig, Practical techniques for searches on encrypted data ieee symposium on security and privacy. pp. 44- 55 ,(2000) , 10.1109/SECPRI.2000.848445
Christoph Bösch, Pieter Hartel, Willem Jonker, Andreas Peter, A Survey of Provably Secure Searchable Encryption ACM Computing Surveys. ,vol. 47, pp. 1- 51 ,(2015) , 10.1145/2636328
David Derler, Christian Hanser, Daniel Slamanig, Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives ? the cryptographers track at the rsa conference. ,vol. 2015, pp. 127- 144 ,(2015) , 10.1007/978-3-319-16715-2_7
Cédric Van Rompay, Refik Molva, Melek Önen, Multi-user Searchable Encryption in the Cloud international conference on information security. pp. 299- 316 ,(2015) , 10.1007/978-3-319-23318-5_17
Seny Kamara, Charalampos Papamanthou, Parallel and Dynamic Searchable Symmetric Encryption financial cryptography. pp. 258- 274 ,(2013) , 10.1007/978-3-642-39884-1_22
Dan Boneh, Henry Corrigan-Gibbs, Amit Levy, Stickler: Defending Against Malicious CDNs in an Unmodified Browser arXiv: Cryptography and Security. ,(2015)
Sylvia Ratnasamy, Raluca Ada Popa, Justine Sherry, Chang Lan, Zhi Liu, Embark: securely outsourcing middleboxes to the cloud networked systems design and implementation. pp. 255- 273 ,(2016)