Tutorial: Information Leakage from Cryptographic Techniques

Document Type

Conference Proceeding

Publication Date

1-1-2024

Abstract

This tutorial focuses on the research aimed at providing secure data processing at the public cloud. First, we focus on cryptographic (encryption and secret-sharing) techniques and systems developed over the last two decades. Second, we will discuss information leakages from ciphertext (e.g., distribution, ordering, and cross-crypto leakages) and query execution (e.g. access pattern, volume, and workload skew leakages) and compare the existing techniques and systems based on efficiency and information leakage. Finally, we conclude that cryptographic techniques are not sufficient alone. To provide efficient and secure large-scale data processing at the cloud, a new line of work that combines software and hardware mechanisms is required. We discuss an orthogonal approach designed around the concept of data partitioning, i.e., splitting the data processing into cryptographically secure and non-secure parts.

Identifier

85204285282 (Scopus)

ISBN

[9798350354713]

Publication Title

Proceedings - 2024 IEEE 44th International Conference on Distributed Computing Systems Workshops, ICDCSW 2024

External Full Text Location

https://doi.org/10.1109/ICDCSW63686.2024.00007

First Page

9

Last Page

12

Grant

1952247

Fund Ref

National Science Foundation

This document is currently not available here.

Share

COinS