Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation

被引:1
|
作者
Xu, Rui [1 ]
Morozov, Kirill [2 ]
Basu, Anirban [1 ]
Rahman, Mohammad Shahriar [3 ]
Kiyomoto, Shinsaku [1 ]
机构
[1] KDDI Res Inc, Fujimino, Japan
[2] Tokyo Inst Technol, Sch Comp, Tokyo, Japan
[3] Univ Asia Pacific, Dhaka, Bangladesh
关键词
Verifiable computation; Server-aided computation; Cryptanalysis; Privacy-preserving;
D O I
10.1007/978-3-319-64200-0_10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this work, we report security analysis of the recently proposed server-aided verifiable approximate set similarity computation protocol by Qiu et al. (Security in Cloud Computing 2016). This protocol uses a certain consistency check mechanism to verify the computation result returned by a potentially malicious server. According to the original paper, the proposed consistency check can identify a misconduct of the malicious server with high probability. We show the flaws in their analysis and design a set of attacks to break their protocols (including a generalized one). Experimental results are presented that demonstrate the effectiveness of our attacks.
引用
收藏
页码:159 / 178
页数:20
相关论文
共 50 条
  • [31] Server-Aided Signature Verification for Lightweight Devices
    Guo, Fuchun
    Mu, Yi
    Susilo, Willy
    Varadharajan, Vijay
    COMPUTER JOURNAL, 2014, 57 (04): : 481 - 493
  • [32] Server-Aided Continuous Group Key Agreement
    Alwen, Joel
    Hartmann, Dominik
    Kiltz, Eike
    Mularczyk, Marta
    PROCEEDINGS OF THE 2022 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2022, 2022, : 69 - 82
  • [33] Provably secure server-aided verification signatures
    Wu, Wei
    Mu, Yi
    Susilo, Willy
    Huang, Xinyi
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2011, 61 (07) : 1705 - 1723
  • [34] Server-aided Revocable IBE with Identity Reuse
    Ma, Xuecheng
    Lin, Dongdai
    COMPUTER JOURNAL, 2020, 63 (04): : 620 - 632
  • [35] Identity-Based Server-Aided Decryption
    Liu, Joseph K.
    Chu, Cheng Kang
    Zhou, Jianying
    INFORMATION SECURITY AND PRIVACY, 2011, 6812 : 337 - 352
  • [36] Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing
    Wu, Yulin
    Wang, Xuan
    Susilo, Willy
    Yang, Guomin
    Jiang, Zoe Lin
    Chen, Qian
    Xu, Peng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2820 - 2834
  • [37] Server-aided private set intersection based on reputation
    Zhang, En
    Li, Fenghua
    Niu, Ben
    Wang, Yanchao
    INFORMATION SCIENCES, 2017, 387 : 180 - 194
  • [38] Efficient Attribute Based Server-Aided Verification Signature
    Chen, Yu
    Li, Jiguo
    Liu, Chengdong
    Han, Jinguang
    Zhang, Yichen
    Yi, Peng
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (06) : 3224 - 3232
  • [39] Server-Aided Verification Signatures: Definitions and New Constructions
    Wu, Wei
    Mu, Yi
    Susilo, Willy
    Huang, Xinyi
    PROVABLE SECURITY, 2008, 5324 : 141 - 155
  • [40] Server-Aided Public Key Encryption With Keyword Search
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    Huang, Xinyi
    Wang, Xiaofen
    Wang, Yongjun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) : 2833 - 2842