Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation

被引:1
|
作者
Xu, Rui [1 ]
Morozov, Kirill [2 ]
Basu, Anirban [1 ]
Rahman, Mohammad Shahriar [3 ]
Kiyomoto, Shinsaku [1 ]
机构
[1] KDDI Res Inc, Fujimino, Japan
[2] Tokyo Inst Technol, Sch Comp, Tokyo, Japan
[3] Univ Asia Pacific, Dhaka, Bangladesh
关键词
Verifiable computation; Server-aided computation; Cryptanalysis; Privacy-preserving;
D O I
10.1007/978-3-319-64200-0_10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this work, we report security analysis of the recently proposed server-aided verifiable approximate set similarity computation protocol by Qiu et al. (Security in Cloud Computing 2016). This protocol uses a certain consistency check mechanism to verify the computation result returned by a potentially malicious server. According to the original paper, the proposed consistency check can identify a misconduct of the malicious server with high probability. We show the flaws in their analysis and design a set of attacks to break their protocols (including a generalized one). Experimental results are presented that demonstrate the effectiveness of our attacks.
引用
收藏
页码:159 / 178
页数:20
相关论文
共 50 条
  • [1] Fast, private and verifiable: Server-aided approximate similarity computation over large-scale datasets
    Department of Information Security, Beijing Jiaotong University, Beijing
    100044, China
    不详
    AZ
    85721-0104, United States
    不详
    UT
    84322, United States
    SCC - Proc. ACM Int. Workshop Secur. Cloud Comput., Co-located Asia CCS, 1600, (29-36):
  • [2] Security and performance of server-aided RSA computation protocols
    Lim, CH
    Lee, PJ
    ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 70 - 83
  • [3] SERVER-AIDED HONEST COMPUTATION FOR CRYPTOGRAPHIC APPLICATIONS
    YEN, SM
    LAIH, CS
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 26 (12) : 61 - 64
  • [4] Generic Constructions of Server-Aided Revocable ABE with Verifiable Transformation
    Yang, Feng
    Cui, Hui
    Jing, Jiwu
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2023 SATELLITE WORKSHOPS, ADSC 2023, AIBLOCK 2023, AIHWS 2023, AIOTS 2023, CIMSS 2023, CLOUD S&P 2023, SCI 2023, SECMT 2023, SIMLA 2023, 2023, 13907 : 459 - 479
  • [5] Security analysis of a server-aided RSA key generation protocol
    Cao, Tianjie
    Mao, Xianping
    Lin, Dongdai
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 314 - 320
  • [6] PARAMETER SELECTION FOR SERVER-AIDED RSA COMPUTATION SCHEMES
    BURNS, J
    MITCHELL, CJ
    IEEE TRANSACTIONS ON COMPUTERS, 1994, 43 (02) : 163 - 174
  • [7] A SERVER-AIDED COMPUTATION PROTOCOL FOR RSA ENCIPHERING ALGORITHM
    LIN, CH
    CHANG, CC
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1994, 53 (3-4) : 149 - 155
  • [8] Smart-phone Based Server-Aided Computation
    Cao, Tianjie
    He, Tao
    Luo, Qihan
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 295 - 298
  • [9] On the security of two server-aided verification signature schemes
    Wu, H. (daisylilac@126.com), 2013, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [10] 2EPV-ApproCom: Enhanced Effective, Private, and Verifiable Approximate Similarity Computation with Server Aided over Scalable Datasets for IoT
    Qiu S.
    Shi Y.
    Liu Y.
    Yan H.
    Zhang Z.
    Mathematical Problems in Engineering, 2023, 2023