Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption

Published:

Download paper here