Leakage-Abuse Attacks Against Structured Encryption for SQL.
Alexander HooverRuth NgDaren KhuYao'an LiJoelle LimDerrick NgJed LimYiyang SongPublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- information leakage
- database language
- countermeasures
- relational databases
- database
- stream cipher
- cryptographic algorithms
- sql queries
- query language
- relational database systems
- cryptographic protocols
- advanced encryption standard
- relational model
- database management
- database technology
- data types
- database design
- structured data
- watermarking scheme
- encryption scheme
- security protocols
- security properties
- relational dbms
- sensitive information
- encryption decryption
- public key cryptography
- database programming
- watermarking algorithm
- sql server
- data model
- databases