Encryption Schemes Secure Against Profiling Adversaries

被引:0
|
作者
Diaz-Santiago, Sandra [1 ]
Chakraborty, Debrup [1 ]
机构
[1] CINVESTAV IPN, Dept Comp Sci, Mexico City 07360, DF, Mexico
关键词
Data encryption; Profiling adversary; User profiling; CAPTCHA; Secret sharing;
D O I
10.1007/978-3-662-44791-8_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A profiling adversary is an adversary which aims to classify messages into pre-defined profiles and thus gain useful information regarding the sender or receiver of such messages. User profiling has gained lot of importance today, this activity supports the big business of online advertising at the cost of user privacy. Usual chosen-plaintext secure encryption schemes are capable of securing information from profilers, but these schemes provide more security than required for this purpose. In this paper we study the requirements for an encryption algorithm to be secure only against profilers and finally give a precise notion of security for such schemes. We also present a full protocol for secure (against profiling adversaries) communication, which neither requires a key exchange nor a public key infrastructure. Our protocol guarantees security against non-human profilers and is constructed using CAPTCHAs and secret sharing schemes. The security notions developed in this paper are also further used to analyze an existing scheme meant for providing security against profilers.
引用
收藏
页码:172 / 191
页数:20
相关论文
共 50 条
  • [1] Confirmer signature schemes secure against adaptive adversaries
    Camenisch, J
    Michels, M
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 243 - 258
  • [2] Network Adversary Attacks against Secure Encryption Schemes
    Gligor, Virgil D.
    Parno, Bryan
    Shin, Ji Sun
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (02) : 267 - 279
  • [3] Tightly Secure Encryption Schemes against Related-Key Attacks
    Han, Shuai
    Liu, Shengli
    Lyu, Lin
    Gu, Dawu
    [J]. COMPUTER JOURNAL, 2018, 61 (12): : 1825 - 1844
  • [4] Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
    Fehr, Serge
    Hofheinz, Dennis
    Kiltz, Eike
    Wee, Hoeteck
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 381 - +
  • [5] Privacy amplification secure against active adversaries
    Maurer, U
    Wolf, S
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 307 - 321
  • [6] Perfectly Secure Message Transmission Against Rational Adversaries
    Fujita, Maiki
    Koshiba, Takeshi
    Yasunaga, Kenji
    [J]. IEEE Journal on Selected Areas in Information Theory, 2022, 3 (02): : 390 - 404
  • [7] A Secure Scalar Product Protocol Against Malicious Adversaries
    Bo Yang
    Yong Yu
    Chung-Huang Yang
    [J]. Journal of Computer Science and Technology, 2013, 28 : 152 - 158
  • [8] Secure Integration of Asymmetric and Symmetric Encryption Schemes
    Eiichiro Fujisaki
    Tatsuaki Okamoto
    [J]. Journal of Cryptology, 2013, 26 : 80 - 101
  • [9] Secure Integration of Asymmetric and Symmetric Encryption Schemes
    Fujisaki, Eiichiro
    Okamoto, Tatsuaki
    [J]. JOURNAL OF CRYPTOLOGY, 2013, 26 (01) : 80 - 101
  • [10] A Secure Scalar Product Protocol Against Malicious Adversaries
    Yang, Bo
    Yu, Yong
    Yang, Chung-Huang
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2013, 28 (01) : 152 - 158