A Leakage-Abuse Attack Against Multi-User Searchable Encryption.
Cédric Van RompayRefik MolvaMelek ÖnenPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- multi user
- secret key
- encryption algorithm
- ciphertext
- virtual environment
- information leakage
- virtual world
- augmented reality
- multi granularity
- encryption decryption
- user interface
- single user
- encryption algorithms
- block cipher
- countermeasures
- multi touch
- multiple users
- public key
- encryption scheme
- key management
- smart card
- pseudorandom
- image encryption
- security analysis
- data encryption
- artificial intelligence
- digital signature
- standard model
- multiple access
- ddos attacks
- key exchange
- authentication scheme
- security properties
- s box
- digital libraries
- computer vision