[Resource Topic] 2016/172: All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption

Welcome to the resource topic for 2016/172

Title:
All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption

Authors: Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou

Abstract:

The goal of searchable encryption (SE) is to enable a client to execute searches over encrypted files stored on an untrusted server while ensuring some measure of privacy for both the encrypted files and the search queries. Research has focused on developing efficient SE schemes at the expense of allowing some small, well-characterized “(information) leakage” to the server about the files and/or the queries. The practical impact of this leakage, however, remains unclear. We thoroughly study file-injection attacks–in which the server sends files to the client that the client then encrypts and stores–on the query privacy of single-keyword and conjunctive SE schemes. We show such attacks can reveal the client’s queries in their entirety using very few injected files, even for SE schemes having low leakage. We also demonstrate that natural countermeasures for preventing file-injection attacks can be easily circumvented. Our attacks outperform prior work significantly in terms of their effectiveness as well as in terms of their assumptions about the attacker’s prior knowledge.

ePrint: https://eprint.iacr.org/2016/172

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .