A Leakage-Abuse Attack Against Multi-User Searchable Encryption.
Cédric Van RompayRefik MolvaMelek ÖnenPublished in: Proc. Priv. Enhancing Technol. (2017)
Keyphrases
- multi user
- secret key
- encryption algorithm
- ciphertext
- virtual environment
- information leakage
- virtual world
- augmented reality
- multi granularity
- encryption decryption
- multiple users
- encryption algorithms
- block cipher
- user interface
- single user
- countermeasures
- encryption scheme
- multi touch
- pseudorandom
- digital libraries
- authentication scheme
- standard model
- smart card
- key management
- public key
- ddos attacks
- security analysis
- image encryption
- multiple access
- digital content
- personal information
- data encryption
- smart objects