Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation

被引:1
|
作者
Xu, Rui [1 ]
Morozov, Kirill [2 ]
Basu, Anirban [1 ]
Rahman, Mohammad Shahriar [3 ]
Kiyomoto, Shinsaku [1 ]
机构
[1] KDDI Res Inc, Fujimino, Japan
[2] Tokyo Inst Technol, Sch Comp, Tokyo, Japan
[3] Univ Asia Pacific, Dhaka, Bangladesh
关键词
Verifiable computation; Server-aided computation; Cryptanalysis; Privacy-preserving;
D O I
10.1007/978-3-319-64200-0_10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this work, we report security analysis of the recently proposed server-aided verifiable approximate set similarity computation protocol by Qiu et al. (Security in Cloud Computing 2016). This protocol uses a certain consistency check mechanism to verify the computation result returned by a potentially malicious server. According to the original paper, the proposed consistency check can identify a misconduct of the malicious server with high probability. We show the flaws in their analysis and design a set of attacks to break their protocols (including a generalized one). Experimental results are presented that demonstrate the effectiveness of our attacks.
引用
收藏
页码:159 / 178
页数:20
相关论文
共 50 条
  • [22] Generic server-aided secure multi-party computation in cloud computing
    Wu, Yulin
    Wang, Xuan
    Susilo, Willy
    Yang, Guomin
    Jiang, Zoe L.
    Yiu, Siu-Ming
    Wang, Hao
    COMPUTER STANDARDS & INTERFACES, 2022, 79
  • [23] FACTORIZATION ATTACK ON CERTAIN SERVER-AIDED COMPUTATION PROTOCOLS FOR THE RSA SECRET TRANSFORMATION
    SHIMBO, A
    KAWAMURA, S
    ELECTRONICS LETTERS, 1990, 26 (17) : 1387 - 1388
  • [24] Secure server-aided signature generation
    Jakobsson, M
    Wetzel, S
    PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 383 - 401
  • [25] Server-aided verification: Theory and practice
    Girault, M
    Lefranc, D
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 605 - 623
  • [26] Some active attacks on fast server-aided secret computation protocols for modular exponentiation
    Hwang, SJ
    Chang, CC
    Yang, WP
    CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 215 - 227
  • [27] Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation
    Yu, Gang
    Ma, Xiaoxiao
    Cao, Zhenfu
    Zhu, Weihua
    Zeng, Guang
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 172 - 179
  • [28] A new efficient server-aided RSA secret computation protocol against active attacks
    Hwang, SJ
    Chang, CC
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (03) : 567 - 570
  • [29] Two efficient server-aided RSA secret computation protocols against active attacks
    Hwang, SJ
    Chang, CC
    Yang, WP
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (09) : 1504 - 1511
  • [30] Server-aided access control for cloud computing
    WENG Jian
    WENG Jia-si
    LIU Jia-nan
    HOU Lin
    网络与信息安全学报, 2016, 2 (10) : 58 - 76