The State Of The Uniform: Attacks On Encrypted Databases Beyond The Uniform Query Distribution

IACR Cryptol. ePrint Arch.(2020)

引用 75|浏览83
暂无评分
摘要
Recent foundational work on leakage-abuse attacks on encrypted databases has broadened our understanding of what an adversary can accomplish with a standard leakage profile. Nevertheless, all known value reconstruction attacks succeed under strong assumptions that may not hold in the real world. The most prevalent assumption is that queries are issued uniformly at random by the client. We present the first value reconstruction attacks that succeed without any knowledge about the query or data distribution. Our approach uses the searchpattern leakage, which exists in all known structured encryption schemes but has not been fully exploited so far. At the core of our method lies a support size estimator, a technique that utilizes the repetition of search tokens with the same response to estimate distances between encrypted values without any assumptions about the underlying distribution. We develop distributionagnostic reconstruction attacks for both range queries and k-nearest-neighbor (k-NN) queries based on information extracted from the search-pattern leakage. Our new range attack follows a different algorithmic approach than state-of-the-art attacks, which are fine-tuned to succeed under the uniformly distributed queries. Instead, we reconstruct plaintext values under a variety of skewed query distributions and even outperform the accuracy of previous approaches under the uniform query distribution. Our new k-NN attack succeeds with far fewer samples than previous attacks and scales to much larger values of k. We demonstrate the effectiveness of our attacks by experimentally testing them on a wide range of query distributions and database densities, both unknown to the adversary.
更多
查看译文
关键词
uniform query distribution,leakage-abuse attacks,encrypted databases,known value reconstruction attacks,search-pattern leakage,known structured encryption schemes,support size estimator,search tokens,distribution-agnostic reconstruction attacks,range queries,range attack,uniformly distributed queries,plaintext values,skewed query distributions,k-NN attack,first value reconstruction attacks,data distribution,k-nearest-neighbor queries
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要