Score: 1

Revisiting the attacker's knowledge in inference attacks against Searchable Symmetric Encryption

Published: April 14, 2025 | arXiv ID: 2504.09879v1

By: Marc Damie , Jean-Benoist Leger , Florian Hahn and more

Potential Business Impact:

Makes secret searches safer from snoops.

Business Areas:
Semantic Search Internet Services

Encrypted search schemes have been proposed to address growing privacy concerns. However, several leakage-abuse attacks have highlighted some security vulnerabilities. Recent attacks assumed an attacker's knowledge containing data ``similar'' to the indexed data. However, this vague assumption is barely discussed in literature: how likely is it for an attacker to obtain a "similar enough" data? Our paper provides novel statistical tools usable on any attack in this setting to analyze its sensitivity to data similarity. First, we introduce a mathematical model based on statistical estimators to analytically understand the attackers' knowledge and the notion of similarity. Second, we conceive statistical tools to model the influence of the similarity on the attack accuracy. We apply our tools on three existing attacks to answer questions such as: is similarity the only factor influencing accuracy of a given attack? Third, we show that the enforcement of a maximum index size can make the ``similar-data'' assumption harder to satisfy. In particular, we propose a statistical method to estimate an appropriate maximum size for a given attack and dataset. For the best known attack on the Enron dataset, a maximum index size of 200 guarantees (with high probability) the attack accuracy to be below 5%.

Country of Origin
🇳🇱 Netherlands


Page Count
30 pages

Category
Computer Science:
Cryptography and Security