Login / Signup
Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption.
Lei Xu
Leqian Zheng
Chengzhi Xu
Xingliang Yuan
Cong Wang
Published in:
CCS (2023)
Keyphrases
</>
forward and backward
information leakage
countermeasures
digital libraries
dynamic programming
privacy preserving
personal information
private information
greedy search
neural network
watermarking scheme
orders of magnitude