Charalampos Papamanthou Reveals How Leakage Attacks Threaten Encrypted Databases πŸ”

Explore the groundbreaking research by Charalampos Papamanthou on leakage abuse attacks and their impact on the security of encrypted databases. Discover how these vulnerabilities could compromise data privacy and what measures can be taken to defend agai

Charalampos Papamanthou Reveals How Leakage Attacks Threaten Encrypted Databases πŸ”
CMU Cylab Crypto Seminar
191 views β€’ Apr 17, 2021
Charalampos Papamanthou Reveals How Leakage Attacks Threaten Encrypted Databases πŸ”

About this video

Since the seventies, one of the holy grails of cryptography has been the invention of encryption algorithms that allow computation to be performed directly on ciphertexts without prior decryption. While heavy cryptographic hammers like fully-homomorphic encryption and oblivious RAMs can address (versions of) the aforementioned problem with ideal security guarantees, encrypted databases provide a more practical alternative. An encrypted database achieves considerable efficiency by releasing some formally-defined and superficially harmless information, known as leakage. However, it turns out such leakage can lead to complete value reconstruction of the database! In this talk I will review some of the basic techniques to perform database reconstruction from range search leakage and then I will present my recent work on query distribution-agnostic attacks on encrypted databases. I will conclude with some suggestions about how to argue formally about the security of encrypted databases.
This talk is based on joint works with Evgenios Kornaropoulos (UC Berkeley), Alexandros Psomas (Purdue University), Dawn Song (UC Berkeley) and Roberto Tamassia (Brown University).

Video Information

Views

191

Likes

2

Duration

54:29

Published

Apr 17, 2021

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.

Trending Now