Cryptanalysis of an Asymmetric Searchable Encryption Scheme

被引:0
|
作者
Zare, Fahimeh [1 ]
Mala, Hamid [1 ]
机构
[1] Univ Isfahan, Fac Comp Engn, Esfahan, Iran
关键词
Asymmetric Searchable Encryption; Data Outsourcing; Secure Cloud Computing; Forgery attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid growth of information and popularity of outsourced data, most of the IT companies are motivated to outsource their sensitive information on cloud servers. Since these servers are not fully trusted, for preserving privacy and security, these data must be encrypted before being outsourced. For searching on the encrypted data, searchable encryption method plays an important role. Recently, Tajiki et al. have proposed a new asymmetric searchable encryption called Secure Searchable Asymmetric Encryption (SSAE). They claimed their scheme is secure against forgery attack. In this paper, at first, we show that the security of SSAE is not complete by presenting a forgery attack on this scheme. After that we modify the SSAE to withstand this forgery attack.
引用
收藏
页码:82 / 85
页数:4
相关论文
共 50 条
  • [21] Cryptanalysis of the RCES/RSES image encryption scheme
    Li, Shujun
    Li, Chengqing
    Chen, Guanrong
    Lo, Kwok-Tung
    JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (07) : 1130 - 1143
  • [22] Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme
    Wang, Baocang
    Zhan, Yu
    Zhang, Zhili
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (06) : 1460 - 1467
  • [23] Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud
    Zhang, Jianyi
    Song, Chenggen
    Wang, Zhiqiang
    Yang, Tao
    Ma, Wenming
    IEEE ACCESS, 2018, 6 : 68384 - 68393
  • [24] Semantically Searchable Encryption Scheme Supporting Ranking Verification
    Yang Y.
    Yang S.
    Cai S.
    Liu J.
    Li G.
    2017, Sichuan University (49): : 119 - 128
  • [25] Searchable Encryption of Image based on Secret Sharing Scheme
    Kamal, Ahmad Akmal Aminuddin Mohd
    Iwamura, Keiichi
    Kang, Hyunho
    2017 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC 2017), 2017, : 1495 - 1503
  • [26] On the Security of a Certificateless Searchable Public Key Encryption Scheme
    Wu, Tsu-Yang
    Meng, Fanya
    Chen, Chien-Ming
    Liu, Shuai
    Pan, Jeng-Shyang
    GENETIC AND EVOLUTIONARY COMPUTING, 2017, 536 : 113 - 119
  • [27] A time-aware searchable encryption scheme for EHRs
    Zhou, Yousheng
    Zhao, Xiaofeng
    Liu, Siling
    Long, Xingwang
    Luo, Wenjun
    DIGITAL COMMUNICATIONS AND NETWORKS, 2019, 5 (03) : 170 - 175
  • [28] Public key searchable encryption scheme based on blockchain
    Du R.
    Tan A.
    Tian J.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (04): : 114 - 122
  • [29] DESSE: A Dynamic Efficient Forward Searchable Encryption Scheme
    Wanshan, Xu
    Jianbiao, Zhang
    Yuan, Yilin
    IEEE ACCESS, 2020, 8 : 144480 - 144488
  • [30] Lightweight searchable encryption scheme based on certificateless cryptosystem
    Yang, Xiaodong
    Chen, Guilan
    Wang, Meiding
    Pei, Xizhen
    2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 669 - 672