log in  |  register  |  feedback?  |  help  |  web accessibility
Logo
Attacks on Searchable Encryption
Friday, February 19, 2016, 9:30-10:00 am Calendar
  • You are subscribed to this talk through .
  • You are watching this talk through .
  • You are subscribed to this talk. (unsubscribe, watch)
  • You are watching this talk. (unwatch, subscribe)
  • You are not subscribed to this talk. (watch, subscribe)
Abstract

With the advent of cloud computing, techniques for outsourcing encrypted data with search capability are of significant interest. Searchable Encryption is proposed for such purpose. Searchable Encryption schemes achieves efficiency by allowing well-defined leakage. However, the practical consequence of the leakage has not been studied much in prior work. In this talk, I present query recovery attacks that exploit the leakage of Searchable Encryption and discuss potential countermeasures against these attacks.

This talk is organized by Yupeng Zhang