Paper 2024/1837
A Query Reconstruction Attack on the Chase-Shen Substring-Searchable Symmetric Encryption Scheme
Abstract
Searchable symmetric encryption (SSE) enables queries over symmetrically encrypted databases. To achieve practical efficiency, SSE schemes incur a certain amount of leakage; however, this leads to the possibility of leakage cryptanalysis, i.e., cryptanalytic attacks that exploit the leakage from the target SSE scheme to subvert its data and query privacy guarantees. Leakage cryptanalysis has been widely studied in the context of SSE schemes supporting either keyword queries or range queries, often with devastating consequences. However, little or no attention has been paid to cryptanalysing substring-SSE schemes, i.e., SSE schemes supporting arbitrary substring queries over encrypted data. This is despite their relevance to many real-world applications, e.g., in the context of securely querying outsourced genomic databases. In particular, the first ever substring-SSE scheme, proposed nearly a decade ago by Chase and Shen (PoPETS '15), has not been cryptanalysed to date. In this paper, we present the first leakage cryptanalysis of the substring-SSE scheme of Chase and Shen. We propose a novel inference-based query reconstruction attack that: (i) exploits a reduced version of the actual leakage profile of their scheme, and (ii) assumes a weaker attack model as compared to the one in which Chase and Shen originally claimed security. We implement our attack and experimentally validate its success rate and efficiency over two real-world datasets. Our attack achieves high query reconstruction rate with practical efficiency, and scales smoothly to large datasets containing $100,000$ strings. To the best of our knowledge, ours is the first and only query reconstruction attack on (and the first systematic leakage cryptanalysis of) any substring-SSE scheme till date.
Metadata
- Available format(s)
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- Searchable Symmetric EncryptionSubstring-SSELeakage CryptanalysisQuery Reconstruction Attacks
- Contact author(s)
-
zichen gui @ uga edu
kenny paterson @ inf ethz ch
sikhar patranabis @ ibm com - History
- 2024-11-11: approved
- 2024-11-08: received
- See all versions
- Short URL
- https://ia.cr/2024/1837
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/1837, author = {Zichen Gui and Kenneth G. Paterson and Sikhar Patranabis}, title = {A Query Reconstruction Attack on the Chase-Shen Substring-Searchable Symmetric Encryption Scheme}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1837}, year = {2024}, url = {https://eprint.iacr.org/2024/1837} }