Paper 2024/515
Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSE
Abstract
Searchable symmetric encryption has been vulnerable to inference attacks that rely on uniqueness in leakage patterns. However, many keywords in datasets lack distinctive leakage patterns, limiting the effectiveness of such attacks. The file injection attacks, initially proposed by Cash et al. (CCS 2015), have shown impressive performance with 100% accuracy and no prior knowledge requirement. Nevertheless, this attack fails to recover queries with underlying keywords not present in the injected files. To address these limitations, our research introduces a novel attack strategy called LEAP-Hierarchical Fusion Attack (LHFA) that combines the strengths of both file injection attacks and inference attacks. Before initiating keyword injection, we introduce a new approach for inert/active keyword selection. In the phase of selecting injected keywords, we focus on keywords without unique leakage patterns and recover them, leveraging their presence for document recovery. Our goal is to achieve an amplified effect in query recovery. We demonstrate a minimum query recovery rate of 1.3 queries per injected keyword with a 10% data leakage of a real-life dataset, and initiate further research to overcome challenges associated with non-distinctive keywords.
Metadata
- Available format(s)
- Category
- Applications
- Publication info
- Published elsewhere. IEEE CSF
- Keywords
- Searchable symmetric encryptionInference attackFile injection attackAccess pattern
- Contact author(s)
-
zhangmanning2015 @ gmail com
z shi-2 @ tudelft nl
h chen-2 @ tudelft nl
kaitai liang @ tudelft nl - History
- 2024-11-24: last of 2 revisions
- 2024-04-01: received
- See all versions
- Short URL
- https://ia.cr/2024/515
- License
-
CC BY-NC
BibTeX
@misc{cryptoeprint:2024/515, author = {Manning Zhang and Zeshun Shi and Huanhuan Chen and Kaitai Liang}, title = {Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against {SSE}}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/515}, year = {2024}, url = {https://eprint.iacr.org/2024/515} }