RT

Roberto Tamassia

1 records found

Reconstructing with Even Less

Amplifying Leakage and Drawing Graphs

Leakage-abuse attacks using access pattern leakage from range queries have been shown to reconstruct encrypted databases. However, prior work is either restricted to one-dimensional databases or requires access to all possible responses in two-dimensions. In this paper, we explor ...