Leakage-Abuse Attacks Against Searchable Encryption.
David CashPaul GrubbsJason PerryThomas RistenpartPublished in: CCS (2015)
Keyphrases
- information leakage
- stream cipher
- cryptographic protocols
- advanced encryption standard
- cryptographic algorithms
- malicious attacks
- digital libraries
- countermeasures
- block cipher
- secret key
- encryption algorithms
- security protocols
- security threats
- traffic analysis
- key management
- watermarking scheme
- data protection
- digital signature
- denial of service attacks
- watermarking technique
- malicious users
- encryption decryption
- digital watermarking
- key exchange
- security mechanisms
- encryption scheme