rubengrootroessink / IKK-query-recovery-attackLinks
This repository contains my implementation of the IKK attack as proposed by Islam et al. in their paper 'Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation'. I used this code for my graduation thesis at the University of Twente for the Cyber Security Master program (part of the Computer Science Master).
☆10Updated 2 years ago
Alternatives and similar repositories for IKK-query-recovery-attack
Users that are interested in IKK-query-recovery-attack are comparing it to the libraries listed below
Sorting:
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆13Updated 4 years ago
- This repository Open Source the experimental code of paper "ROSE: Robust Searchable Encryption with Forward and Backward Security"☆11Updated 2 years ago
- Verifiable Forward Secure SSE scheme☆11Updated 5 years ago
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆16Updated 4 years ago
- CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted te…☆12Updated last year
- Practical Verifiable Multi-user Forward Secure Searchable Encryption☆10Updated 3 years ago
- Implementation of IM-DSSE framework (IEEE TSC'19)☆11Updated 5 years ago
- Boolean Query SSE schemes☆16Updated 6 years ago
- DSSE ODXT implemetation, from Forward and Backward Private Conjunctive Searchable Symmetric Encryption by Sikhar Patranabis(ETH Zürich), …☆14Updated 11 months ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆41Updated 6 years ago
- Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python☆25Updated 3 years ago
- OSSE and LLSE: two SSE schemes with optimal and quasi-optiaml search time☆11Updated 3 years ago
- ☆20Updated 6 years ago
- Multi-party Private Set Intersections & Threshold Set Intersections☆12Updated 4 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆33Updated 2 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆98Updated 4 years ago
- ☆25Updated 6 years ago
- A curated list of resources about Searchable Symmetric Encryption (SSE).☆42Updated 4 years ago
- ☆17Updated 3 months ago
- Efficient Multi-User Searchable Encrypted Database☆11Updated 6 months ago
- Private set intersection using garbled bloom filters in semi-honest setting☆26Updated 9 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆98Updated last year
- ☆36Updated 4 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆19Updated 2 years ago
- A two-party generator for Vector-OLE correlations.☆29Updated 4 years ago
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆121Updated last year
- DPF and PIR based on DPF in C++☆20Updated 4 years ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆78Updated 11 months ago
- Symmetric-key Hidden Vector Encryption Scheme☆19Updated 6 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆87Updated last year