Does revealing semantic similarity scores between AES-encrypted data create an exploitable side channel?
Background: My expertise is in machine learning/AI, not cryptography, so I apologize if I’m missing fundamental security concepts. I’m trying to build a privacy-preserving AI agent system and want to understand potential vulnerabilities.
U…