Vulnerabilities
Study Reveals Vulnerabilities in Chase-Shen Encryption Scheme
A recent study has introduced a query reconstruction attack on the Chase-Shen substring-searchable symmetric encryption scheme, marking the first leakage cryptanalysis of this technology designed for secure querying of encrypted databases.