<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Tue, Sep 9, 2014 at 9:56 PM, Brendan McMillion <span dir="ltr"><<a href="mailto:brendanmcmillion@gmail.com" target="_blank" onclick="window.open('https://mail.google.com/mail/?view=cm&tf=1&to=brendanmcmillion@gmail.com&cc=&bcc=&su=&body=','_blank');return false;">brendanmcmillion@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div><div>You can post the index and the encrypted corpus on your Twitter, if you please. It doesn't matter.</div></div></div></blockquote><div><br></div><div>That's all and good, but exactly *how* are the contents of the index hidden from the attacker?</div><div><br></div><div>As a counterexample, let's say we're masking the contents of the index using a deterministic encryption scheme like SIV. An attacker can send you a message containing the word "target" 1000 times, then observe when one of the index's counters changes by ~1000. The ciphertext associated with the counter that increments is likely to be our target word.<br></div><div><br></div><div>How are these sorts of attacks prevented?</div></div><div><br></div>-- <br>Tony Arcieri<br>
</div></div>