Published January 5, 2019 | Version v1
Conference paper Open

Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks

  • 1. Cornell Tech
  • 2. Royal Holloway, University of London
  • 3. PSL University and Inria

Description

We show that the problem of reconstructing encrypted databases from access pattern leakage is closely related to statistical learning theory. This new viewpoint enables us to develop broader attacks that are supported by streamlined performance analyses.

As an introduction to this viewpoint, we first present a general reduction from reconstruction with known queries to PAC learning. Then, we directly address the problem of ϵϵ-approximate database reconstruction (ϵϵ-ADR) from range query leakage, giving attacks whose query cost scales only with the relative error ϵϵ, and is independent of the size of the database, or the number NN of possible values of data items. This already goes significantly beyond the state of the art for such attacks, as represented by Kellaris et al. (ACM CCS 2016) and Lacharité et al. (IEEE S&P 2018).

We also study the new problem of ϵϵ-approximate order reconstruction (ϵϵ-AOR), where the adversary is tasked with reconstructing the order of records, except for records whose values are approximately equal. We show that as few as O(ϵ−1logϵ−1)O(ϵ−1log⁡ϵ−1) uniformly random range queries suffice. Our analysis relies on an application of learning theory to PQ-trees, special data structures tuned to compactly record certain ordering constraints.

We then show that when an auxiliary distribution is available, ϵϵ-AOR can be enhanced to achieve ϵϵ-ADR; using real data, we show that devastatingly small numbers of queries are needed to attain very accurate database reconstruction.

Finally, we generalize from ranges to consider what learning theory tells us about the impact of access pattern leakage for other classes of queries, focusing on prefix and suffix queries. We illustrate this with both concrete attacks for prefix queries and with a general lower bound for all query classes.

Files

2019-011.pdf

Files (834.0 kB)

Name Size Download all
md5:304d3a56d53bdc473d91aebe38cde6c8
834.0 kB Preview Download

Additional details

Funding

ECRYPT-NET – European Integrated Research Training Network on Advanced Cryptographic Technologies for the Internet of Things and the Cloud 643161
European Commission