Paper 2017/701
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage
Marie-Sarah Lacharité, Brice Minaud, and Kenneth G. Paterson
Abstract
We analyse the security of database encryption schemes supporting range queries against persistent adversaries. The bulk of our work applies to a generic setting, where the adversary's view is limited to the set of records matched by each query (known as access pattern leakage). We also consider a more specific setting where certain rank information is also leaked. The latter is inherent to multiple recent encryption schemes supporting range queries, including Kerschbaum's FH-OPE scheme (CCS 2015), Lewi and Wu's order-revealing encryption scheme (CCS 2016), and the recently proposed Arx scheme of Poddar et al. (IACR eprint 2016/568, 2016/591). We provide three attacks.
First, we consider full reconstruction, which aims to recover the value of every record, fully negating encryption. We show that for dense datasets, full reconstruction is possible within an expected number of queries
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Minor revision. S&P 2018
- Keywords
- Encrypted databaseleakage
- Contact author(s)
- brice minaud @ gmail com
- History
- 2017-10-27: last of 3 revisions
- 2017-07-21: received
- See all versions
- Short URL
- https://ia.cr/2017/701
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2017/701, author = {Marie-Sarah Lacharité and Brice Minaud and Kenneth G. Paterson}, title = {Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage}, howpublished = {Cryptology {ePrint} Archive, Paper 2017/701}, year = {2017}, url = {https://eprint.iacr.org/2017/701} }