Paper 2025/2248

Learning from Leakage: Database Reconstruction from Just a Few Multidimensional Range Queries

Peijie Li, Delft University of Technology
Huanhuan Chen, Delft University of Technology
Evangelia Anna Markatou, Delft University of Technology
Kaitai Liang, University of Turku
Abstract

Searchable Encryption (SE) has shown a lot of promise towards enabling secure and efficient queries over encrypted data. In order to achieve this efficiency, SE inevitably leaks some information, and a big open question is how dangerous this leakage is. While prior reconstruction attacks have demonstrated effectiveness in one-dimensional settings, extending them to high-dimensional datasets remains challenging. Existing methods either demand excessive query information (e.g. an attacker that has observed all possible responses) or produce low-quality reconstructions in sparse databases. In this work, we present REMIN, a new leakage-abuse attack against SE schemes in multi-dimensional settings, based on access and search pattern leakage from range queries. Our approach leverages unsupervised representation learning to transform query co-occurrence frequencies into geometric signals, allowing the attacker to infer relative spatial relationships between records. This enables accurate and scalable reconstruction of high-dimensional datasets under minimal leakage. We begin with a passive adversary that persistently observes all encrypted queries and responses, and later extend our analysis to an more active attacker capable of poisoning the dataset. Furthermore, we introduce REMIN-P, a practical variant of the attack that incorporates a poisoning strategy. By injecting a small number of auxiliary anchor points REMIN-P significantly improves reconstruction quality, particularly in sparse or boundary regions. We evaluate our attacks extensively on both synthetic and real-world structured datasets. Compared to state-of-the-art reconstruction attacks, our reconstruction attack achieves up to 50% reduction in mean squared error (MSE), all while maintaining fast and scalable runtime. Our poisoning attack can further reduce MSE by an additional 50% on average, depending on the poisoning strategy.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Published elsewhere. Major revision. NDSS 2026
DOI
https://dx.doi.org/10.14722/ndss.2026.240935
Keywords
Leakage Abuse AttacksRange QueriesSearchable Encryption
Contact author(s)
ZIMUQIN1106 @ outlook com
h chen-2 @ tudelft nl
e a markatou @ tudelft nl
kaitai liang @ utu fi
History
2025-12-18: approved
2025-12-14: received
See all versions
Short URL
https://ia.cr/2025/2248
License
Creative Commons Attribution-NonCommercial
CC BY-NC

BibTeX

@misc{cryptoeprint:2025/2248,
      author = {Peijie Li and Huanhuan Chen and Evangelia Anna Markatou and Kaitai Liang},
      title = {Learning from Leakage: Database Reconstruction from Just a Few Multidimensional Range Queries},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/2248},
      year = {2025},
      doi = {https://dx.doi.org/10.14722/ndss.2026.240935},
      url = {https://eprint.iacr.org/2025/2248}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.