Practical Volume-Based Attacks on Encrypted Databases

Stephanie Wang
Stephanie Wang
Jianan Lu
Jianan Lu
Cited by: 0|Bibtex|Views6|Links

Abstract:

Recent years have seen an increased interest towards strong security primitives for encrypted databases (such as oblivious protocols), that hide the access patterns of query execution, and reveal only the volume of results. However, recent work has shown that even volume leakage can enable the reconstruction of entire columns in the dat...More

Code:

Data:

Your rating :
0

 

Tags
Comments