<!--
  We're glad to anwser any questions related to Teaclave.
  To help people quickly understand the issue, please also
  include some background and context of the question.

  We have documented many useful information on the homepage,
  please check them out first: https://teaclave.apache.org/docs/.
-->

Hi!
I am interested in the way to resist Multi-query Attack. 
The multi-query attack method includes two attack ways: 
(1) One way to obtain the other party’s information is to tamper with the input 
content for each query, while keeping the query itself unchanged. For example, 
the attacker can obtain all the information of the other party’s join key 
through multiple join queries and tampering with the content of his join key 
each time. 
(2) Another way is to infer the other party’s private data by rewriting the 
query each time and comparing the results of multiple queries. For example, the 
attacker can use the where condition to limit the input of the aggregation 
function. The first time the query obtains the aggregation result of N pieces 
of data, the second time by changing the where condition, the aggregation 
result of N-1 pieces of data can be obtained, and then the attacker can obtain 
the original information of 1 piece of data by comparing results.
Cam Teaclave help user resist this attack automatically?
Thanks!


-- 
Reply to this email directly or view it on GitHub:
https://github.com/apache/incubator-teaclave/issues/721
You are receiving this because you are subscribed to this thread.

Message ID: <apache/incubator-teaclave/issues/7...@github.com>

Reply via email to