Query Recovery from Easy to Hard: Jigsaw Attack against SSE

Hao Nie,Wei Wang,Peng Xu,Xianglong Zhang,Laurence T. Yang,Kaitai Liang
2024-03-02
Abstract:Searchable symmetric encryption schemes often unintentionally disclose certain sensitive information, such as access, volume, and search patterns. Attackers can exploit such leakages and other available knowledge related to the user's database to recover queries. We find that the effectiveness of query recovery attacks depends on the volume/frequency distribution of keywords. Queries containing keywords with high volumes/frequencies are more susceptible to recovery, even when countermeasures are implemented. Attackers can also effectively leverage these ``special'' queries to recover all others.
Cryptography and Security
What problem does this paper attempt to address?