Revisiting Leakage Abuse Attacks
暂无分享,去创建一个
[1] Seny Kamara,et al. Breach-Resistant Structured Encryption , 2018, IACR Cryptol. ePrint Arch..
[2] Angelos D. Keromytis,et al. Blind Seer: A Scalable Private DBMS , 2014, 2014 IEEE Symposium on Security and Privacy.
[3] Tal Malkin,et al. Malicious-Client Security in Blind Seer: A Scalable Private DBMS , 2015, 2015 IEEE Symposium on Security and Privacy.
[4] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[5] David Cash,et al. Leakage-Abuse Attacks Against Searchable Encryption , 2015, IACR Cryptol. ePrint Arch..
[6] David Cash,et al. What Else is Revealed by Order-Revealing Encryption? , 2016, IACR Cryptol. ePrint Arch..
[7] Brent Waters,et al. Functional Encryption: Definitions and Challenges , 2011, TCC.
[8] Marie-Sarah Lacharité,et al. Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries , 2018, CCS.
[9] Elaine Shi,et al. Oblivious RAM with O((logN)3) Worst-Case Cost , 2011, ASIACRYPT.
[10] Seny Kamara,et al. Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity , 2017, EUROCRYPT.
[11] Thomas Ristenpart,et al. Leakage-Abuse Attacks against Order-Revealing Encryption , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[12] Amr El Abbadi,et al. TaoStore: Overcoming Asynchronicity in Oblivious Data Storage , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[13] Seny Kamara,et al. Computationally Volume-Hiding Structured Encryption , 2019, EUROCRYPT.
[14] K. Paterson,et al. Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[15] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[16] Kartik Nayak,et al. Oblivious Computation with Data Locality , 2017, IACR Cryptol. ePrint Arch..
[17] Vitaly Shmatikov,et al. Why Your Encrypted Database Is Not Secure , 2017, HotOS.
[18] Jorge Guajardo,et al. Practical and secure dynamic searchable encryption via oblivious access on distributed data structure , 2016, ACSAC.
[19] Elaine Shi,et al. ObliviStore: High Performance Oblivious Distributed Cloud Data Store , 2013, NDSS.
[20] Eli Upfal,et al. The Melbourne Shuffle: Improving Oblivious Storage in the Cloud , 2014, ICALP.
[21] Elaine Shi,et al. Constants Count: Practical Improvements to Oblivious RAM , 2015, USENIX Security Symposium.
[22] Adam O'Neill,et al. Generic Attacks on Secure Outsourced Databases , 2016, CCS.
[23] Charalampos Papamanthou,et al. Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.
[24] Elaine Shi,et al. Practical Dynamic Searchable Encryption with Small Leakage , 2014, NDSS.
[25] Ioannis Demertzis,et al. Fast Searchable Encryption With Tunable Locality , 2017, SIGMOD Conference.
[26] Joshua Schiffman,et al. Shroud: ensuring private access to large-scale data in the data center , 2013, FAST.
[27] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[28] Joshua Schiffman,et al. Toward Practical Private Access to Data Centers via Parallel ORAM , 2012, IACR Cryptol. ePrint Arch..
[29] Srinivas Devadas,et al. A Low-Latency, Low-Area Hardware Oblivious RAM Controller , 2015, 2015 IEEE 23rd Annual International Symposium on Field-Programmable Custom Computing Machines.
[30] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[31] Charalampos Papamanthou,et al. Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..
[32] Ian Miers,et al. IO-DSSE: Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality , 2017, NDSS.
[33] Craig Gentry,et al. Private Database Access with HE-over-ORAM Architecture , 2015, ACNS.
[34] Raphael Bost,et al. Sophos - Forward Secure Searchable Encryption , 2016, IACR Cryptol. ePrint Arch..
[35] George Kollios,et al. GRECS: Graph Encryption for Approximate Shortest Distance Queries , 2015, IACR Cryptol. ePrint Arch..
[36] Hugo Krawczyk,et al. Outsourced symmetric private information retrieval , 2013, IACR Cryptol. ePrint Arch..
[37] Hugo Krawczyk,et al. Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation , 2014, NDSS.
[38] Elaine Shi,et al. ShadowCrypt: Encrypted Web Applications for Everyone , 2014, CCS.
[39] Charles V. Wright,et al. Inference Attacks on Property-Preserving Encrypted Databases , 2015, CCS.
[40] Seny Kamara,et al. Structured Encryption and Leakage Suppression , 2018, IACR Cryptol. ePrint Arch..
[41] Giulio Malavolta,et al. Privacy and Access Control for Outsourced Personal Records , 2015, 2015 IEEE Symposium on Security and Privacy.
[42] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[43] Melissa Chase,et al. Structured Encryption and Controlled Disclosure , 2010, IACR Cryptol. ePrint Arch..
[44] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[45] Seny Kamara,et al. SQL on Structurally-Encrypted Databases , 2018, IACR Cryptol. ePrint Arch..
[46] Abhi Shelat,et al. Multi-Key Searchable Encryption, Revisited , 2018, IACR Cryptol. ePrint Arch..
[47] Rafail Ostrovsky,et al. On the (in)security of hash-based oblivious RAM and a new balancing scheme , 2012, SODA.
[48] Elaine Shi,et al. Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns , 2014, USENIX Security Symposium.
[49] Jonathan Katz,et al. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption , 2016, USENIX Security Symposium.
[50] Alptekin Küpçü,et al. Efficient Dynamic Searchable Encryption with Forward Privacy , 2017, Proc. Priv. Enhancing Technol..
[51] Moni Naor,et al. Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations , 2016, STOC.
[52] David Cash,et al. The Locality of Searchable Symmetric Encryption , 2014, IACR Cryptol. ePrint Arch..
[53] Srinivas Devadas,et al. Integrity verification for path Oblivious-RAM , 2013, 2013 IEEE High Performance Extreme Computing Conference (HPEC).
[54] Srinivas Devadas,et al. Freecursive ORAM: [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious RAM , 2015 .
[55] Murat Kantarcioglu,et al. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.
[56] Elaine Shi,et al. Multi-cloud oblivious storage , 2013, CCS.
[57] Seny Kamara,et al. Encrypted Multi-Maps with Computationally-Secure Leakage , 2018, IACR Cryptol. ePrint Arch..
[58] Kartik Nayak,et al. Oblivious Data Structures , 2014, IACR Cryptol. ePrint Arch..
[59] Sarvar Patel,et al. Symmetric Searchable Encryption with Sharing and Unsharing , 2018, IACR Cryptol. ePrint Arch..
[60] Sanjam Garg,et al. TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption , 2016, CRYPTO.
[61] Pierre-Alain Fouque,et al. Thwarting Leakage Abuse Attacks against Searchable Encryption - A Formal Approach and Applications to Database Padding , 2017, IACR Cryptol. ePrint Arch..
[62] Moti Yung,et al. Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing , 2019, CCS.
[63] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[64] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[65] Jean-Philippe Aumasson,et al. Cryptanalysis vs. Reality , 2011 .
[66] Ling Ren,et al. Path ORAM , 2012, J. ACM.
[67] Adam J. Aviv,et al. A Practical Oblivious Map Data Structure with Secure Deletion and History Independence , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[68] David J. Wu,et al. Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds , 2016, IACR Cryptol. ePrint Arch..
[69] Wenke Lee,et al. Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud , 2014, USENIX Security Symposium.
[70] Brice Minaud,et al. Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives , 2017, CCS.