Attacks on Encrypted Response-Hiding Range Search Schemes in Multiple Dimensions

  • Markatou E
  • Falzon F
  • Espiritu Z
  • et al.
N/ACitations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

In this work, we present the first database reconstruction attacks against response-hiding private range search schemes on encrypted databases of arbitrary dimensions. Falzon et al. (VLDB 2022) present a number of range-supporting schemes on arbitrary dimensions exhibiting different security and efficiency trade-offs. Additionally, they characterize a form of leakage, structure pattern leakage, also present in many one-dimensional schemes e.g., Demertzis et al. (SIGMOD 2016) and Faber et al. (ESORICS 2015). We present the first systematic study of this leakage and attack a broad collection of schemes, including schemes that allow the responses to contain false-positives (often considered the gold standard in security). We characterize the information theoretic limitations of a passive persistent adversary. Our work shows that for range queries, structure pattern leakage can be as vulnerable to attacks as access pattern leakage. We give a comprehensive evaluation of our attacks with a complexity analysis, a prototype implementation, and an experimental assessment on real-world datasets.

Cite

CITATION STYLE

APA

Markatou, E. A., Falzon, F., Espiritu, Z., & Tamassia, R. (2023). Attacks on Encrypted Response-Hiding Range Search Schemes in Multiple Dimensions. Proceedings on Privacy Enhancing Technologies, 2023(4), 204–223. https://doi.org/10.56553/popets-2023-0106

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free