Paper 2024/1558

Understanding Leakage in Searchable Encryption: a Quantitative Approach

Alexandra Boldyreva, Georgia Institute of Technology
Zichen Gui, University of Georgia
Bogdan Warinschi, Dfinity, University of Bristol
Abstract

Searchable encryption, or more generally, structured encryption, permits search over encrypted data. It is an important cryptographic tool for securing cloud storage. The standard security notion for structured encryption mandates that a protocol leaks nothing about the data or queries, except for some allowed leakage, defined by the leakage function. This is due to the fact that some leakage is unavoidable for efficient schemes. Unfortunately, it was shown by numerous works that even innocuous-looking leakage can often be exploited by attackers to undermine users' privacy and recover their queries and/or data, despite the structured encryption schemes being provably secure. Nevertheless, the standard security remains the go-to notion used to show the "security" of structured encryption schemes. While it is not likely that researchers will design practical structured encryption schemes with no leakage, it is not satisfactory that very few works study ways to assess leakage. This work proposes a novel framework to quantify leakage. Our methodology is inspired by the quantitative information flow, and we call our method $q$-leakage analysis. We show how $q$-leakage analysis is related to the standard security. We also demonstrate the usefulness of $q$-leakage analysis by analyzing the security of two existing schemes with complex leakage functions.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Published elsewhere. PETS 2024
DOI
10.56553/popets-2024-0127
Keywords
Searchable encryptionleakageleakage assessment
Contact author(s)
sasha @ gatech edu
Zichen Gui @ uga edu
bogdan warinschi @ dfinity org
History
2024-10-05: approved
2024-10-03: received
See all versions
Short URL
https://ia.cr/2024/1558
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1558,
      author = {Alexandra Boldyreva and Zichen Gui and Bogdan Warinschi},
      title = {Understanding Leakage in Searchable Encryption: a Quantitative Approach},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1558},
      year = {2024},
      doi = {10.56553/popets-2024-0127},
      url = {https://eprint.iacr.org/2024/1558}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.