Leakage-Abuse Attacks Against Structured Encryption for SQL.
Alexander HooverRuth NgDaren KhuYao'an LiJoelle LimDerrick NgJed LimYiyang SongPublished in: USENIX Security Symposium (2024)
Keyphrases
- relational databases
- information leakage
- stream cipher
- structured data
- countermeasures
- query language
- database language
- cryptographic protocols
- sql queries
- databases
- advanced encryption standard
- relational model
- database
- database design
- encryption decryption
- cryptographic algorithms
- data types
- key management
- database management
- relational database systems
- image encryption
- data management
- encryption algorithms
- database technology
- relational database management systems
- encryption scheme
- information hiding
- access control
- relational dbms
- query processing
- database queries