Cryptanalysis of an Asymmetric Searchable Encryption Scheme

被引:0
|
作者
Zare, Fahimeh [1 ]
Mala, Hamid [1 ]
机构
[1] Univ Isfahan, Fac Comp Engn, Esfahan, Iran
关键词
Asymmetric Searchable Encryption; Data Outsourcing; Secure Cloud Computing; Forgery attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid growth of information and popularity of outsourced data, most of the IT companies are motivated to outsource their sensitive information on cloud servers. Since these servers are not fully trusted, for preserving privacy and security, these data must be encrypted before being outsourced. For searching on the encrypted data, searchable encryption method plays an important role. Recently, Tajiki et al. have proposed a new asymmetric searchable encryption called Secure Searchable Asymmetric Encryption (SSAE). They claimed their scheme is secure against forgery attack. In this paper, at first, we show that the security of SSAE is not complete by presenting a forgery attack on this scheme. After that we modify the SSAE to withstand this forgery attack.
引用
收藏
页码:82 / 85
页数:4
相关论文
共 50 条
  • [41] An enhanced searchable encryption scheme for secure data outsourcing
    Rui Zhang
    Jiabei Wang
    Zishuai Song
    Xi Wang
    Science China Information Sciences, 2020, 63
  • [42] Achieving Searchable Encryption Scheme With Search Pattern Hidden
    Wang, Yunling
    Sun, Shi-Feng
    Wang, Jianfeng
    Liu, Joseph K.
    Chen, Xiaofeng
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (02) : 1012 - 1025
  • [43] A time-aware searchable encryption scheme for EHRs
    Yousheng Zhou
    Xiaofeng Zhao
    Siling Liu
    Xingwang Long
    Wenjun Luo
    Digital Communications and Networks, 2019, 5 (03) : 170 - 175
  • [44] Delegate Searchable Encryption Scheme Resisting Keyword Guess
    Cao Suzhen
    Lang Xiaoli
    Liu Xiangzhen
    Zhang Yulei
    Wang Fei
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (09) : 2180 - 2186
  • [45] A New Searchable Encryption Scheme with Integrity Preservation Property
    Zamani, Mohammad
    Safkhani, Masoumeh
    Daneshpour, Negin
    Abbasian, Amir
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (04) : 3119 - 3142
  • [46] Secure and lightweight multi user searchable encryption scheme
    Andola, Nitish
    Prakash, Sourabh
    Venkatesan, S.
    Verma, Shekhar
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (02) : 1239 - 1251
  • [47] An enhanced searchable encryption scheme for secure data outsourcing
    Zhang, Rui
    Wang, Jiabei
    Song, Zishuai
    Wang, Xi
    SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (03)
  • [48] A Multi-users Searchable Encryption Scheme with Proxy Re-encryption
    Zhang Ya-ling
    Liu Kai
    Wang Shang-ping
    Sun Qin-dong
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 563 - 567
  • [49] Cryptanalysis of a knapsack-based probabilistic encryption scheme
    Youssef, Amr M.
    INFORMATION SCIENCES, 2009, 179 (18) : 3116 - 3121
  • [50] Cryptanalysis of an image encryption scheme based on the Hill cipher
    Cheng-qing Li
    Dan Zhang
    Guan-rong Chen
    Journal of Zhejiang University-SCIENCE A, 2008, 9 : 1118 - 1123