Skip to main navigation Skip to search Skip to main content

Revisiting the attacker's knowledge in inference attacks against Searchable Symmetric Encryption

Research output: Working paperPreprintAcademic

24 Downloads (Pure)

Abstract

Encrypted search schemes have been proposed to address growing privacy concerns. However, several leakage-abuse attacks have highlighted some security vulnerabilities. Recent attacks assumed an attacker's knowledge containing data ``similar'' to the indexed data. However, this vague assumption is barely discussed in literature: how likely is it for an attacker to obtain a "similar enough" data? Our paper provides novel statistical tools usable on any attack in this setting to analyze its sensitivity to data similarity. First, we introduce a mathematical model based on statistical estimators to analytically understand the attackers' knowledge and the notion of similarity. Second, we conceive statistical tools to model the influence of the similarity on the attack accuracy. We apply our tools on three existing attacks to answer questions such as: is similarity the only factor influencing accuracy of a given attack? Third, we show that the enforcement of a maximum index size can make the ``similar-data'' assumption harder to satisfy. In particular, we propose a statistical method to estimate an appropriate maximum size for a given attack and dataset. For the best known attack on the Enron dataset, a maximum index size of 200 guarantees (with high probability) the attack accuracy to be below 5%.
Original languageEnglish
DOIs
Publication statusPublished - 14 Apr 2025

Keywords

  • cs.CR

Fingerprint

Dive into the research topics of 'Revisiting the attacker's knowledge in inference attacks against Searchable Symmetric Encryption'. Together they form a unique fingerprint.
  • Revisiting the Attacker’s Knowledge in Inference Attacks Against Searchable Symmetric Encryption

    Damie, M., Leger, J. B., Hahn, F. & Peter, A., 20 Jun 2025, Applied Cryptography and Network Security - 23rd International Conference, ACNS 2025, Proceedings. Fischlin, M. & Moonsamy, V. (eds.). Springer, p. 370-399 30 p. (Lecture Notes in Computer Science; vol. 15826 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    1 Downloads (Pure)

Cite this