Leakage-Abuse Attacks Against Searchable Encryption.
David CashPaul GrubbsJason PerryThomas RistenpartPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- information leakage
- stream cipher
- cryptographic protocols
- advanced encryption standard
- cryptographic algorithms
- countermeasures
- block cipher
- digital libraries
- malicious attacks
- security protocols
- secret key
- encryption algorithms
- security properties
- security mechanisms
- watermarking scheme
- security risks
- chosen plaintext
- image encryption
- traffic analysis
- digital signature
- watermarking technique
- key exchange
- encryption algorithm
- data encryption
- watermarking algorithm
- hash functions
- personal information