Encryption Schemes Secure Against Profiling Adversaries

被引:0
|
作者
Diaz-Santiago, Sandra [1 ]
Chakraborty, Debrup [1 ]
机构
[1] CINVESTAV IPN, Dept Comp Sci, Mexico City 07360, DF, Mexico
关键词
Data encryption; Profiling adversary; User profiling; CAPTCHA; Secret sharing;
D O I
10.1007/978-3-662-44791-8_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A profiling adversary is an adversary which aims to classify messages into pre-defined profiles and thus gain useful information regarding the sender or receiver of such messages. User profiling has gained lot of importance today, this activity supports the big business of online advertising at the cost of user privacy. Usual chosen-plaintext secure encryption schemes are capable of securing information from profilers, but these schemes provide more security than required for this purpose. In this paper we study the requirements for an encryption algorithm to be secure only against profilers and finally give a precise notion of security for such schemes. We also present a full protocol for secure (against profiling adversaries) communication, which neither requires a key exchange nor a public key infrastructure. Our protocol guarantees security against non-human profilers and is constructed using CAPTCHAs and secret sharing schemes. The security notions developed in this paper are also further used to analyze an existing scheme meant for providing security against profilers.
引用
收藏
页码:172 / 191
页数:20
相关论文
共 50 条
  • [21] Efficient and secure encryption schemes for JPEG2000
    Wu, HJ
    Ma, D
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL V, PROCEEDINGS: DESIGN AND IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS INDUSTRY TECHNOLOGY TRACKS MACHINE LEARNING FOR SIGNAL PROCESSING MULTIMEDIA SIGNAL PROCESSING SIGNAL PROCESSING FOR EDUCATION, 2004, : 869 - 872
  • [22] CCA SECURE CERTIFICATELESS ENCRYPTION SCHEMES BASED ON RSA
    Vivek, S. Sree
    Selvi, S. Shamila Deva
    Rangan, C. Pandu
    [J]. SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 208 - 217
  • [23] Lighten Encryption Schemes for Secure and Private RFID Systems
    Canard, Sebastien
    Coisel, Iwen
    Etrog, Jonathan
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6054 : 19 - +
  • [24] Towards provably secure asymmetric image encryption schemes
    Azam, Naveed Ahmed
    Zhu, Jianshen
    Hayat, Umar
    Shurbevski, Aleksandar
    [J]. INFORMATION SCIENCES, 2023, 631 (164-184) : 164 - 184
  • [25] A Secure Database System using Homomorphic Encryption Schemes
    Gahi, Youssef
    Guennoun, Mouhcine
    El-Khatib, Khalil
    [J]. DBKDA 2011: THE THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN DATABASES, KNOWLEDGE, AND DATA APPLICATIONS, 2011, : 54 - 58
  • [26] Efficient and short certificateless signatures secure against realistic adversaries
    Raylin Tso
    Xun Yi
    Xinyi Huang
    [J]. The Journal of Supercomputing, 2011, 55 : 173 - 191
  • [27] Two-Source Extractors Secure against Quantum Adversaries
    Kasher, Roy
    Kempe, Julia
    [J]. APPROXIMATION, RANDOMIZATION, AND COMBINATORIAL OPTIMIZATION: ALGORITHMS AND TECHNIQUES, 2010, 6302 : 656 - 669
  • [28] Artemia: A Family of Provably Secure Authenticated Encryption Schemes
    Alizadeh, Javad
    Aref, Mohammad Reza
    Bagheri, Nasour
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 6 (02): : 125 - 139
  • [29] A Secure High-dimension Consensus Mechanism against Adversaries
    Luo, Xiaoyu
    Zhao, Chengcheng
    He, Jianping
    [J]. 2021 AMERICAN CONTROL CONFERENCE (ACC), 2021, : 789 - 794
  • [30] Certificateless encryption schemes strongly secure in the standard model
    Dent, Alexander W.
    Libert, Benoit
    Patersoni, Kenneth G.
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2008, 2008, 4939 : 344 - +