Tutorial: Information Leakage from Cryptographic Techniques
Document Type
Conference Proceeding
Publication Date
1-1-2024
Abstract
This tutorial focuses on the research aimed at providing secure data processing at the public cloud. First, we focus on cryptographic (encryption and secret-sharing) techniques and systems developed over the last two decades. Second, we will discuss information leakages from ciphertext (e.g., distribution, ordering, and cross-crypto leakages) and query execution (e.g. access pattern, volume, and workload skew leakages) and compare the existing techniques and systems based on efficiency and information leakage. Finally, we conclude that cryptographic techniques are not sufficient alone. To provide efficient and secure large-scale data processing at the cloud, a new line of work that combines software and hardware mechanisms is required. We discuss an orthogonal approach designed around the concept of data partitioning, i.e., splitting the data processing into cryptographically secure and non-secure parts.
Identifier
85204285282 (Scopus)
ISBN
[9798350354713]
Publication Title
Proceedings - 2024 IEEE 44th International Conference on Distributed Computing Systems Workshops, ICDCSW 2024
External Full Text Location
https://doi.org/10.1109/ICDCSW63686.2024.00007
First Page
9
Last Page
12
Grant
1952247
Fund Ref
National Science Foundation
Recommended Citation
Kumari, Komal; Mehrotra, Sharad; and Sharma, Shantanu, "Tutorial: Information Leakage from Cryptographic Techniques" (2024). Faculty Publications. 871.
https://digitalcommons.njit.edu/fac_pubs/871