Cryptanalysis of an Asymmetric Searchable Encryption Scheme

被引:0
|
作者
Zare, Fahimeh [1 ]
Mala, Hamid [1 ]
机构
[1] Univ Isfahan, Fac Comp Engn, Esfahan, Iran
关键词
Asymmetric Searchable Encryption; Data Outsourcing; Secure Cloud Computing; Forgery attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid growth of information and popularity of outsourced data, most of the IT companies are motivated to outsource their sensitive information on cloud servers. Since these servers are not fully trusted, for preserving privacy and security, these data must be encrypted before being outsourced. For searching on the encrypted data, searchable encryption method plays an important role. Recently, Tajiki et al. have proposed a new asymmetric searchable encryption called Secure Searchable Asymmetric Encryption (SSAE). They claimed their scheme is secure against forgery attack. In this paper, at first, we show that the security of SSAE is not complete by presenting a forgery attack on this scheme. After that we modify the SSAE to withstand this forgery attack.
引用
收藏
页码:82 / 85
页数:4
相关论文
共 50 条
  • [1] An Improved Asymmetric Searchable Encryption Scheme
    Wu, Qi
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 39 - 44
  • [2] Research on Asymmetric Searchable Encryption
    Yu, Zonghua
    Wu, Yudong
    MATERIALS SCIENCE, ENERGY TECHNOLOGY, AND POWER ENGINEERING I, 2017, 1839
  • [3] A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications
    Zeng, Ming
    Zhang, Kai
    Qian, Haifeng
    Chen, Xiaofeng
    Chen, Jie
    COMPUTER JOURNAL, 2019, 62 (04): : 563 - 578
  • [4] Cryptanalysis of Keyword Confidentiality in a Searchable Public-Key Encryption Scheme Against Malicious Server
    Zhang, Nan
    Qin, Baodong
    Zheng, Dong
    IET INFORMATION SECURITY, 2025, 2025 (01)
  • [5] Cryptanalysis of a homomorphic encryption scheme
    Sonia Bogos
    John Gaspoz
    Serge Vaudenay
    Cryptography and Communications, 2018, 10 : 27 - 39
  • [6] Cryptanalysis of an image encryption scheme
    Li, Shujun
    Li, Chengqing
    Lo, Kwok-Tung
    Chen, Guanrong
    JOURNAL OF ELECTRONIC IMAGING, 2006, 15 (04)
  • [7] Cryptanalysis of a homomorphic encryption scheme
    Bogos, Sonia
    Gaspoz, John
    Vaudenay, Serge
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (01): : 27 - 39
  • [8] Asymmetric Searchable Encryption from Inner Product Encryption
    Xiao, Siyu
    Ge, Aijun
    Zhang, Jie
    Ma, Chuangui
    Wang, Xu'an
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 2017, 1 : 123 - 132
  • [9] Cryptanalysis of a Fast Encryption Scheme for Databases
    Jacob, Stephane
    2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, : 2468 - 2472
  • [10] Trapdoor Privacy in Asymmetric Searchable Encryption Schemes
    Arriaga, Afonso
    Tang, Qiang
    Ryan, Peter
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 31 - 50