To allow efficient search over encrypted data in the database, we sometimes often use Encrypted Search Algorithms (ESAs) (e.g., Searchable Encryption, ORAMs, functional encryption, property-preserving encryption). However, all of them are seeking trade-offs between leakage, expressiveness and efficiency.

The authors in Revisiting Leakage Abuse Attacks considers the ESA as a composition of two algorithms: SETUP and SEARCH, and accordingly, the leakage comes from two sources: leakage at setup time and at query time. Attacks include File injection attack (IKK), Inference attacks against property-preserving encryption (e.g., OPE, DTE) by NKW (CCS 15.), as wel las ORAMs (Generic attacks on secure outsourced databases).

Threat Model

Note that Sample-Data Attacks are often referred to as Inference Attacks while Known-Data Attacks are often referred to as Leakage-Abuse Attacks.