Главная
Study mode:
on
1
Introduction
2
Searchable Encryption
3
Bloom Filters
4
Classical Frequency Analysis
5
Graph Matching
6
Cold Currents
7
Adjacency Matrix
8
Experiments
9
Attack Accuracy
10
Search Tags
11
Analysis
12
Graph
13
Bloom Filter Parameters
14
Bloom Filter Table
15
Experiment Results
16
Conclusion
Description:
Explore a conference talk on inference attacks against efficiently deployable and searchable encryption systems. Delve into the research presented by David Pouliot and Charles V. Wright from Portland State University at the 23rd ACM Conference on Computer and Communications Security. Learn about searchable encryption, Bloom filters, classical frequency analysis, and graph matching techniques. Examine the "Cold Currents" attack method, adjacency matrices, and experimental results. Gain insights into attack accuracy, search tags, and the impact of Bloom filter parameters on security. Understand the implications of this research for the design and implementation of secure searchable encryption systems.

The Shadow Nemesis - Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption

Association for Computing Machinery (ACM)
Add to list