File-Injection Attacks on Searchable Encryption, Based on Binomial Structures

Master Thesis (2024)
Author(s)

T.J. Langhout (TU Delft - Electrical Engineering, Mathematics and Computer Science)

Contributor(s)

Georgios Smaragdakis – Mentor (TU Delft - Cyber Security)

Kaitai Liang – Mentor (TU Delft - Cyber Security)

H. Chen – Mentor (TU Delft - Cyber Security)

Faculty
Electrical Engineering, Mathematics and Computer Science
More Info
expand_more
Publication Year
2024
Language
English
Graduation Date
03-06-2024
Awarding Institution
Delft University of Technology
Programme
Computer Science | Cyber Security
Faculty
Electrical Engineering, Mathematics and Computer Science
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

One distinguishable feature of file-inject attacks on searchable encryption schemes is the 100% query recovery rate, i.e., confirming the corresponding keyword for each query. The main efficiency consideration of file-injection attacks is the number of injected files. In the work of Zhang et al. (USENIX 2016), log_2|K| injected files are required, each of which contains |K|/2 keywords for the keyword set K. Based on the construction of the uniform (s,n)-set, Wang et al. need fewer injected files when considering the threshold countermeasure. In this work, we propose a new attack that further reduces the number of injected files where Wang et al. need up to 38% more injections to achieve the same results. The attack is based on an increment (s,n)-set, which is also defined in this paper.

Files

License info not available