XZ
Xianglong Zhang
2 records found
1
Query Recovery from Easy to Hard
Jigsaw Attack against SSE
Searchable symmetric encryption schemes often unintentionally disclose certain sensitive information, such as access, volume, and search patterns. Attackers can exploit such leakages and other available knowledge related to the user's database to recover queries. We find that the
...
High Recovery with Fewer Injections
Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption
Searchable symmetric encryption enables private queries over an encrypted database, but it can also result in information leakages. Adversaries can exploit these leakages to launch injection attacks (Zhang et al., USENIX Security’16) to recover the underlying keywords from querie
...