Encryption Schemes Secure Against Profiling Adversaries

被引:0
|
作者
Diaz-Santiago, Sandra [1 ]
Chakraborty, Debrup [1 ]
机构
[1] CINVESTAV IPN, Dept Comp Sci, Mexico City 07360, DF, Mexico
关键词
Data encryption; Profiling adversary; User profiling; CAPTCHA; Secret sharing;
D O I
10.1007/978-3-662-44791-8_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A profiling adversary is an adversary which aims to classify messages into pre-defined profiles and thus gain useful information regarding the sender or receiver of such messages. User profiling has gained lot of importance today, this activity supports the big business of online advertising at the cost of user privacy. Usual chosen-plaintext secure encryption schemes are capable of securing information from profilers, but these schemes provide more security than required for this purpose. In this paper we study the requirements for an encryption algorithm to be secure only against profilers and finally give a precise notion of security for such schemes. We also present a full protocol for secure (against profiling adversaries) communication, which neither requires a key exchange nor a public key infrastructure. Our protocol guarantees security against non-human profilers and is constructed using CAPTCHAs and secret sharing schemes. The security notions developed in this paper are also further used to analyze an existing scheme meant for providing security against profilers.
引用
收藏
页码:172 / 191
页数:20
相关论文
共 50 条
  • [11] A Secure Scalar Product Protocol Against Malicious Adversaries
    杨波
    禹勇
    杨中皇
    [J]. Journal of Computer Science & Technology, 2013, 28 (01) : 152 - 158
  • [12] Secure Network Coding Against the Contamination and Eavesdropping Adversaries
    Zhou Yejun
    Li Hui
    Ma Jianfeng
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2009, 18 (03) : 411 - 416
  • [13] Robust Secret Sharing Schemes Against Local Adversaries
    Bishop, Allison
    Pastro, Valerio
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 327 - 356
  • [14] Broadcast from Minicast Secure Against General Adversaries
    Raykov, Pavel
    [J]. AUTOMATA, LANGUAGES, AND PROGRAMMING, PT II, 2015, 9135 : 701 - 712
  • [15] Symmetric encryption in automatic analyses for confidentiality against active adversaries
    Laud, P
    [J]. 2004 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2004, : 71 - 85
  • [16] New paradigms for constructing symmetric encryption schemes secure against chosen-ciphertext attack
    Desai, A
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 394 - 412
  • [17] Stateful public-key encryption schemes forward-secure against state exposure
    [J]. Baek, J. (joon.baek@kustar.ac.ae), 1600, Oxford University Press (56):
  • [18] Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure
    Baek, Joonsang
    Vu, Quang Hieu
    Shoufan, Abdulhadi
    Jones, Andrew
    Wong, Duncan S.
    [J]. COMPUTER JOURNAL, 2013, 56 (04): : 497 - 507
  • [19] SENDER-EQUIVOCABLE ENCRYPTION SCHEMES SECURE AGAINST CHOSEN-CIPHERTEXT ATTACKS REVISITED
    Huang, Zhengan
    Liu, Shengli
    Qin, Baodong
    Chen, Kefei
    [J]. INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2015, 25 (02) : 415 - 430
  • [20] Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
    Huang, Zhengan
    Liu, Shengli
    Qin, Baodong
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 369 - 385