Leakage-abuse Attack Against Substring-SSE with Partially Known Dataset
By: Xijie Ba , Qin Liu , Xiaohong Li and more
Potential Business Impact:
Breaks hidden messages even with some clues.
Substring-searchable symmetric encryption (substring-SSE) has become increasingly critical for privacy-preserving applications in cloud systems. However, existing schemes remain vulnerable to information leakage during search operations, particularly when adversaries possess partial knowledge of the target dataset. Although leakage-abuse attacks have been widely studied for traditional SSE, their applicability to substring-SSE under partially known data assumptions remains unexplored. In this paper, we present the first leakage-abuse attack on substring-SSE under partially-known dataset conditions. We develop a novel matrix-based correlation technique that extends and optimizes the LEAP framework for substring-SSE, enabling efficient recovery of plaintext data from encrypted suffix tree structures. Unlike existing approaches that rely on independent auxiliary datasets, our method directly exploits known data fragments to establish high-confidence mappings between ciphertext tokens and plaintext substrings through iterative matrix transformations. Comprehensive experiments on real-world datasets demonstrate the effectiveness of the attack, with recovery rates reaching 98.32% for substrings given 50% auxiliary knowledge. Even with only 10% prior knowledge, the attack achieves 74.42% substring recovery while maintaining strong scalability across datasets of varying sizes. The result reveals significant privacy risks in current substring-SSE designs and highlights the urgent need for leakage-resilient constructions.
Similar Papers
Enhancing Leakage Attacks on Searchable Symmetric Encryption Using LLM-Based Synthetic Data Generation
Cryptography and Security
Makes secret messages easier to break.
Peekaboo, I See Your Queries: Passive Attacks Against DSSE Via Intermittent Observations
Cryptography and Security
Steals secrets from encrypted data searches.
Pushing the Limits of Frequency Analysis in Leakage Abuse Attacks
Cryptography and Security
Protects secret data while still letting you search it.