Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation

被引:1
|
作者
Xu, Rui [1 ]
Morozov, Kirill [2 ]
Basu, Anirban [1 ]
Rahman, Mohammad Shahriar [3 ]
Kiyomoto, Shinsaku [1 ]
机构
[1] KDDI Res Inc, Fujimino, Japan
[2] Tokyo Inst Technol, Sch Comp, Tokyo, Japan
[3] Univ Asia Pacific, Dhaka, Bangladesh
关键词
Verifiable computation; Server-aided computation; Cryptanalysis; Privacy-preserving;
D O I
10.1007/978-3-319-64200-0_10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this work, we report security analysis of the recently proposed server-aided verifiable approximate set similarity computation protocol by Qiu et al. (Security in Cloud Computing 2016). This protocol uses a certain consistency check mechanism to verify the computation result returned by a potentially malicious server. According to the original paper, the proposed consistency check can identify a misconduct of the malicious server with high probability. We show the flaws in their analysis and design a set of attacks to break their protocols (including a generalized one). Experimental results are presented that demonstrate the effectiveness of our attacks.
引用
收藏
页码:159 / 178
页数:20
相关论文
共 50 条
  • [41] Server-aided verification proxy re-signature
    Wang, Zhiwei
    Lv, Wei
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1704 - 1707
  • [42] Server-Aided Verification Signature with Privacy for Mobile Computing
    Xu, Lingling
    Li, Jin
    Tang, Shaohua
    Baek, Joonsang
    MOBILE INFORMATION SYSTEMS, 2015, 2015
  • [43] Secure server-aided data sharing clique with attestation
    Wang, Yujue
    Pang, HweeHwa
    Deng, Robert H.
    Ding, Yong
    Wu, Qianhong
    Qin, Bo
    Fan, Kefeng
    INFORMATION SCIENCES, 2020, 522 : 80 - 98
  • [44] Design and implementation of a server-aided PKI service (SaPKI)
    Cai, L
    Yang, XH
    Chen, C
    19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS: AINA 2005, 2005, : 859 - 864
  • [45] Attribute-based Server-Aided Verification Signature
    Wang, Zhiwei
    Xie, Ruirui
    Wang, Shaohui
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (06): : 3183 - 3190
  • [46] Secure server-aided top-k monitoring
    Wang, Yujue
    Pang, HweeHwa
    Yang, Yanjiang
    Ding, Xuhua
    INFORMATION SCIENCES, 2017, 420 : 345 - 363
  • [47] A new construction of the server-aided verification signature scheme
    Wang, Zhiwei
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 97 - 101
  • [48] Server-Aided Revocable Identity-Based Encryption
    Qin, Baodong
    Deng, Robert H.
    Li, Yingjiu
    Liu, Shengli
    COMPUTER SECURITY - ESORICS 2015, PT I, 2015, 9326 : 286 - 304
  • [49] Server-Aided Revocable Attribute-Based Encryption
    Cui, Hui
    Deng, Robert H.
    Li, Yingjiu
    Qin, Baodong
    COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 570 - 587
  • [50] Server-aided digital signature protocol based on password
    He, YZ
    Wu, CK
    Feng, DG
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 89 - 92