<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Tue, Sep 9, 2014 at 9:22 PM, Brendan McMillion <span dir="ltr"><<a href="mailto:brendanmcmillion@gmail.com" target="_blank" onclick="window.open('https://mail.google.com/mail/?view=cm&tf=1&to=brendanmcmillion@gmail.com&cc=&bcc=&su=&body=','_blank');return false;">brendanmcmillion@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div><div><div><div><div><div>Basically, the client generates an encrypted version of an inverted index that allows the server, given a trapdoor for a keyword X, to learn which files contain X and no more (including the plaintext value of the keyword or word distribution). You can then build on top of that more complex predicates, like "find files that contain X or Y" and some schemes use order preserving symmetric encryption (OPSE) to enable ranked results (RSSE).<br></div><br></div>When a user checks their mail, the client fetches new messages and tells the server how to update the index. The operations involved are largely symmetric (hence fast) and the information sent back to the server is typically small--it depends on the particular construction.</div></div></div></div></div></blockquote><div><br></div><div>Is there any information on preventing sidechannels in a system like this? For example, if the attacker is able to observe the contents of the server as well as send messages to the victim, how do we prevent the attacker from learning the contents of the index?</div><div><br></div></div>-- <br>Tony Arcieri<br>
</div></div>