- Library Home /
- Search Collections /
- Open Collections /
- Browse Collections /
- UBC Theses and Dissertations /
- Towards realistic assumptions in searchable symmetric...
Open Collections
UBC Theses and Dissertations
UBC Theses and Dissertations
Towards realistic assumptions in searchable symmetric encryption Chiu, Joshua
Abstract
Searchable Symmetric Encryption (SSE) enables keyword search over encrypted data, but practical schemes leak structured information during query execution. Leakage-abuse attacks exploit this information, yet their reported effectiveness depends heavily on assumptions about the attacker’s auxiliary knowledge, the client’s query behaviour, and the types of queries being issued. We examine how realistic current assumptions are and how they shape privacy conclusions.
We find that LLM-generated documents are not a viable substitute for real auxiliary corpora to enhance leakage-abuse attacks because they fail to preserve the keyword distributions of domain-specific data. Real point-query traces exhibit temporal dependence and are better captured by a first-order Markov process, although temporal drift limits how well that dependence transfers across time which limits attack effectiveness in practical scenarios. Conjunctive queries expose a substantially stronger attack surface when dependence between keywords is modelled. Taken together, these results show that the apparent privacy of SSE is highly sensitive to the realism of the evaluation setup, and that credible privacy claims therefore require empirically grounded assumptions rather than idealized attack models.
Item Metadata
| Title |
Towards realistic assumptions in searchable symmetric encryption
|
| Creator | |
| Supervisor | |
| Publisher |
University of British Columbia
|
| Date Issued |
2026
|
| Description |
Searchable Symmetric Encryption (SSE) enables keyword search over encrypted data, but practical schemes leak structured information during query execution. Leakage-abuse attacks exploit this information, yet their reported effectiveness depends heavily on assumptions about the attacker’s auxiliary knowledge, the client’s query behaviour, and the types of queries being issued. We examine how realistic current assumptions are and how they shape privacy conclusions.
We find that LLM-generated documents are not a viable substitute for real auxiliary corpora to enhance leakage-abuse attacks because they fail to preserve the keyword distributions of domain-specific data. Real point-query traces exhibit temporal dependence and are better captured by a first-order Markov process, although temporal drift limits how well that dependence transfers across time which limits attack effectiveness in practical scenarios. Conjunctive queries expose a substantially stronger attack surface when dependence between keywords is modelled. Taken together, these results show that the apparent privacy of SSE is highly sensitive to the realism of the evaluation setup, and that credible privacy claims therefore require empirically grounded assumptions rather than idealized attack models.
|
| Genre | |
| Type | |
| Language |
eng
|
| Date Available |
2026-04-14
|
| Provider |
Vancouver : University of British Columbia Library
|
| Rights |
Attribution-NonCommercial-NoDerivatives 4.0 International
|
| DOI |
10.14288/1.0451910
|
| URI | |
| Degree (Theses) | |
| Program (Theses) | |
| Affiliation | |
| Degree Grantor |
University of British Columbia
|
| Graduation Date |
2026-05
|
| Campus | |
| Scholarly Level |
Graduate
|
| Rights URI | |
| Aggregated Source Repository |
DSpace
|
Item Media
Item Citations and Data
Rights
Attribution-NonCommercial-NoDerivatives 4.0 International