Paper 2024/1558
Understanding Leakage in Searchable Encryption: a Quantitative Approach
Abstract
Searchable encryption, or more generally, structured encryption, permits search over encrypted data. It is an important cryptographic tool for securing cloud storage. The standard security notion for structured encryption mandates that a protocol leaks nothing about the data or queries, except for some allowed leakage, defined by the leakage function. This is due to the fact that some leakage is unavoidable for efficient schemes. Unfortunately, it was shown by numerous works that even innocuous-looking leakage can often be exploited by attackers to undermine users' privacy and recover their queries and/or data, despite the structured encryption schemes being provably secure. Nevertheless, the standard security remains the go-to notion used to show the "security" of structured encryption schemes. While it is not likely that researchers will design practical structured encryption schemes with no leakage, it is not satisfactory that very few works study ways to assess leakage. This work proposes a novel framework to quantify leakage. Our methodology is inspired by the quantitative information flow, and we call our method $q$-leakage analysis. We show how $q$-leakage analysis is related to the standard security. We also demonstrate the usefulness of $q$-leakage analysis by analyzing the security of two existing schemes with complex leakage functions.
Metadata
- Available format(s)
- Category
- Foundations
- Publication info
- Published elsewhere. PETS 2024
- DOI
- 10.56553/popets-2024-0127
- Keywords
- Searchable encryptionleakageleakage assessment
- Contact author(s)
-
sasha @ gatech edu
Zichen Gui @ uga edu
bogdan warinschi @ dfinity org - History
- 2024-10-05: approved
- 2024-10-03: received
- See all versions
- Short URL
- https://ia.cr/2024/1558
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/1558, author = {Alexandra Boldyreva and Zichen Gui and Bogdan Warinschi}, title = {Understanding Leakage in Searchable Encryption: a Quantitative Approach}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1558}, year = {2024}, doi = {10.56553/popets-2024-0127}, url = {https://eprint.iacr.org/2024/1558} }