A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Encrypted Databases
2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS '19
General rights This document is made available in accordance with publisher policies. Please cite only the published version using the reference above. Full terms of use are available: Abstract We present a range of novel attacks which exploit information about the volume of answers to range queries in encrypted database. Our attacks rely on a strategy which is simple yet robust and effective. We illustrate the robustness of our strategy in a number of ways. We show how i) to adapt the attack
doi:10.1145/3319535.3363210
dblp:conf/ccs/GuiJW19
fatcat:xsjhf6nzfngs3cfq6ifgvaurxe