WEAKNESS OF PROVABLY SECURE SEARCHABLE ENCRYPTION AGAINST FREQUENCY ANALYSIS

被引:0
|
作者
Suga, Takanori [1 ]
Nishide, Takashi [1 ]
Sakurai, Kouichi [1 ]
机构
[1] Kyushu Univ, Fukuoka 812, Japan
关键词
PUBLIC-KEY ENCRYPTION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
There are encryption schemes called searchable encryption schemes. We can prove the security of these schemes based on a security model. However, we face the risk of the frequency analysis in some constructions because these schemes encrypt the keywords per word in the file as well as itself. In this attack, we assume an adversary knows the frequency distribution of plaintexts (i.e., keywords), and an adversary measures the frequency of the ciphertext and guesses the plaintext by comparing the frequency of the plaintext with it. In this work, we apply this attack to the existing works and evaluate the resistance of the searchable encryption to this attack by considering the difference between the deterministic encryption and the probabilistic encryption, and the supported types of searches.
引用
收藏
页码:142 / 147
页数:6
相关论文
共 50 条
  • [1] A Survey of Provably Secure Searchable Encryption
    Bosch, Christoph
    Hartel, Pieter
    Jonker, Willem
    Peter, Andreas
    [J]. ACM COMPUTING SURVEYS, 2015, 47 (02)
  • [2] A provably secure free-pairing certificateless searchable encryption scheme
    Senouci, Mohammed Raouf
    Benkhaddra, Ilyas
    Senouci, Abdelkader
    Li, Fagen
    [J]. TELECOMMUNICATION SYSTEMS, 2022, 80 (03) : 383 - 395
  • [3] A provably secure free-pairing certificateless searchable encryption scheme
    Mohammed Raouf Senouci
    Ilyas Benkhaddra
    Abdelkader Senouci
    Fagen Li
    [J]. Telecommunication Systems, 2022, 80 : 383 - 395
  • [4] Public key authenticated searchable encryption against frequency analysis attacks
    Cheng, Leixiao
    Meng, Fei
    [J]. INFORMATION SCIENCES, 2023, 640
  • [5] Σοφοζ - Forward Secure Searchable Encryption
    Bost, Raphael
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1143 - 1154
  • [6] Unconditionally Secure Searchable Encryption
    Yoshizawa, Takahiro
    Watanabe, Yohei
    Shikata, Junji
    [J]. 2017 51ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2017,
  • [7] Searchable public key encryption with designated verifier secure against the server
    [J]. 1600, Editorial Board of Journal on Communications (35):
  • [8] Research Advances on Secure Searchable Encryption
    Dong X.
    Zhou J.
    Cao Z.
    [J]. Cao, Zhenfu (zfcao@sei.ecnu.edu.cn), 1600, Science Press (54): : 2107 - 2120
  • [9] Searchable Encryption with Secure and Efficient Updates
    Hahn, Florian
    Kerschbaum, Florian
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 310 - 320
  • [10] Forward Secure Searchable Symmetric Encryption
    Niaz, Muhammad Saqib
    Saake, Gunter
    [J]. 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 49 - 54