Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements

Ruben Groot Roessink*, Andreas Peter, Florian Hahn

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
167 Downloads (Pure)

Abstract

In light of more data than ever being stored using cloud services and the request by the public for secure, privacy-enhanced, and easy-to-use systems, Searchable Encryption schemes were introduced. These schemes enable privacy-enhanced search among encrypted documents yet disclose (encrypted) queries and responses. The first query recovery attack, the IKK attack, uses the disclosed information to (partly) recover what plaintext words the client searched for. This can also leak information on the plaintext contents of the encrypted documents. Under specific assumptions, the IKK attack has been shown to potentially cause serious harm to the security of Searchable Encryption schemes. We empirically review the IKK query recovery attack to improve the understanding of its feasibility and potential security damage. In order to do so, we vary the assumed query distribution, which is shown to have a severe (negative) impact on the accuracy of the attack, and the input parameters of the IKK attack to find a correlation between these parameters and the accuracy of the IKK attack. Furthermore, we show that the recovery rate of the attack can be increased up to 10% points, while decreasing the variance of the recovery rate up to 78% points by combining the results of multiple attack runs. We also show that the including deterministic components in the probabilistic IKK attack can increase the recovery rate up to 21% points and decrease its variance up to 57% points.

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security
Subtitle of host publication19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings
EditorsKazue Sako, Nils Ole Tippenhauer
Place of PublicationCham
PublisherSpringer
Pages155-183
Number of pages29
VolumeI
ISBN (Electronic)978-3-030-78375-4
ISBN (Print)978-3-030-78374-7
DOIs
Publication statusPublished - 2021
Event19th International Conference on Applied Cryptography and Network Security, ACNS 2021 - Virtual, Online
Duration: 21 Jun 202124 Jun 2021
Conference number: 19

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume12727
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference19th International Conference on Applied Cryptography and Network Security, ACNS 2021
Abbreviated titleACNS 2021
CityVirtual, Online
Period21/06/2124/06/21

Keywords

  • 2022 OA procedure
  • Query recovery
  • Searchable Encryption
  • IKK

Fingerprint

Dive into the research topics of 'Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements'. Together they form a unique fingerprint.

Cite this