搜索结果: 1-4 共查到“Leakage-Abuse Attacks”相关记录4条 . 查询时间(0.125 秒)
Thwarting Leakage Abuse Attacks against Searchable Encryption -- A Formal Approach and Applications to Database Padding
security definition searchable encryption leakage abuse attacks
2017/11/1
After the development of practical searchable encryption constructions, allowing for secure searches over an encrypted dataset outsourced to an untrusted server, at the expense of leaking some informa...
Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption
symmetric searchable encryption leakage passive attacks
2017/2/20
The problem of securely outsourcing client data with search functionality has given rise to efficient solutions called Symmetric Searchable Encryption (SSE) schemes. These schemes are provably secure ...
Order-preserving encryption and its generalization order-revealing encryption (OPE/ORE) are used in a variety of settings in practice in order to allow sorting, performing range queries, and filtering...
Schemes for secure outsourcing of client data with search capability are being increasingly marketed and deployed. In the literature, schemes for accomplishing this efficiently are called Searchable E...