eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.
You are looking at a specific version 20160721:150046 of this paper. See the latest version.

Paper 2016/718

Leakage-Abuse Attacks Against Searchable Encryption

David Cash and Paul Grubbs and Jason Perry and Thomas Ristenpart

Abstract

Schemes for secure outsourcing of client data with search capability are being increasingly marketed and deployed. In the literature, schemes for accomplishing this efficiently are called Searchable Encryption (SE). They achieve high efficiency with provable security by means of a quantifiable leakage profile. However, the degree to which SE leakage can be exploited by an adversary is not well understood. To address this, we present a characterization of the leakage profiles of in-the-wild searchable encryption products and SE schemes in the literature, and present attack models based on an adversarial server’s prior knowledge. Then we empirically investigate the security of searchable encryption by providing query recovery and plaintext recovery attacks that exploit these leakage profiles. We term these 'leakage-abuse attacks' and demonstrate their effectiveness for varying leakage profiles and levels of server knowledge, for realistic scenarios. Amongst our contributions are realistic active attacks which have not been previously explored.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. ACM Conference on Computer and Communications Security (CCS) 2015
DOI
10.1145/2810103.2813700
Keywords
Searchable encryptionleakage
Contact author(s)
pag225 @ cornell edu
History
2019-09-05: last of 2 revisions
2016-07-21: received
See all versions
Short URL
https://ia.cr/2016/718
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.