Downgrading Backward Privacy of Searchable Encryption

Muncheon Yoo, Hyundo Yoon, Changhee Hahn, Dongyoung Koo, Junbeom Hur

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)


Searchable encryption allows users to outsource ciphertext with search capability. Although many searchable encryption schemes aiming at providing high efficiency with provable security have been proposed, traditional searchable encryption schemes have been also exploited by numerous types of attacks causing sensitive information leakage among the ciphertexts and queries. In order to deter such leakage of linkable information between the ciphertexts and queries, forward and backward-private searchable encryption schemes have been proposed. Especially, backward privacy is divided into three categories (Type-I, II, III) on the basis of the security level, which are determined by the types of leaked information during the protocol execution. In this paper, we introduce a novel backward privacy downgrade attack on the existing searchable encryption schemes. In order to demonstrate the efficacy of our attack, we show the backward privacy of the previous scheme, MITRA, can be downgraded from Type-II to Type-III.

Original languageEnglish
Title of host publication36th International Conference on Information Networking, ICOIN 2022
PublisherIEEE Computer Society
Number of pages5
ISBN (Electronic)9781665413329
Publication statusPublished - 2022
Event36th International Conference on Information Networking, ICOIN 2022 - Virtual, Jeju Island, Korea, Republic of
Duration: 2022 Jan 122022 Jan 15

Publication series

NameInternational Conference on Information Networking
ISSN (Print)1976-7684


Conference36th International Conference on Information Networking, ICOIN 2022
Country/TerritoryKorea, Republic of
CityVirtual, Jeju Island

Bibliographical note

Publisher Copyright:
© 2022 IEEE.


  • Backward Privacy
  • Forward Privacy
  • Searchable Encryption

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems


Dive into the research topics of 'Downgrading Backward Privacy of Searchable Encryption'. Together they form a unique fingerprint.

Cite this