WEAKNESS OF PROVABLY SECURE SEARCHABLE ENCRYPTION AGAINST FREQUENCY ANALYSIS

被引:0
|
作者
Suga, Takanori [1 ]
Nishide, Takashi [1 ]
Sakurai, Kouichi [1 ]
机构
[1] Kyushu Univ, Fukuoka 812, Japan
关键词
PUBLIC-KEY ENCRYPTION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
There are encryption schemes called searchable encryption schemes. We can prove the security of these schemes based on a security model. However, we face the risk of the frequency analysis in some constructions because these schemes encrypt the keywords per word in the file as well as itself. In this attack, we assume an adversary knows the frequency distribution of plaintexts (i.e., keywords), and an adversary measures the frequency of the ciphertext and guesses the plaintext by comparing the frequency of the plaintext with it. In this work, we apply this attack to the existing works and evaluate the resistance of the searchable encryption to this attack by considering the difference between the deterministic encryption and the probabilistic encryption, and the supported types of searches.
引用
收藏
页码:142 / 147
页数:6
相关论文
共 50 条
  • [31] Secure key-aggregation authorized searchable encryption
    Haijiang WANG
    Xiaolei DONG
    Zhenfu CAO
    Dongmei LI
    Nanyuan CAO
    [J]. Science China(Information Sciences), 2019, 62 (03) : 220 - 222
  • [32] Secure and lightweight multi user searchable encryption scheme
    Andola, Nitish
    Prakash, Sourabh
    Venkatesan, S.
    Verma, Shekhar
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (02) : 1239 - 1251
  • [33] Multicrypt: A Provably Secure Encryption Scheme for Multicast Communication
    Prakash, A. John
    Uthariaraj, V. Rhymend
    [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & COMMUNICATIONS (NETCOM 2009), 2009, : 246 - 253
  • [34] A provably secure elliptic curve scheme with fast encryption
    Galindo, D
    Martín, S
    Takagi, T
    Villar, JL
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 245 - 259
  • [35] Provably secure certificateless deniable authenticated encryption scheme
    Kar, Jayaprakash
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [36] Artemia: A Family of Provably Secure Authenticated Encryption Schemes
    Alizadeh, Javad
    Aref, Mohammad Reza
    Bagheri, Nasour
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 6 (02): : 125 - 139
  • [37] Provably secure certificateless encryption scheme in the standard model
    Deng, Lunzhi
    Xia, Tian
    He, Xiuru
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (06): : 2534 - 2553
  • [38] Towards provably secure asymmetric image encryption schemes
    Azam, Naveed Ahmed
    Zhu, Jianshen
    Hayat, Umar
    Shurbevski, Aleksandar
    [J]. INFORMATION SCIENCES, 2023, 631 : 164 - 184
  • [39] Threshold Homomorphic Encryption From Provably Secure NTRU
    Xu, Kexin
    Hong Meng Tan, Benjamin
    Wang, Li-Ping
    Mi Mi Aung, Khin
    Wang, Huaxiong
    [J]. COMPUTER JOURNAL, 2023, 66 (12): : 2861 - 2873
  • [40] AFFIRM: Provably Forward Privacy for Searchable Encryption in Cooperative Intelligent Transportation System
    Wang, Ke
    Chen, Chien-Ming
    Shojafar, Mohammad
    Tie, Zhuoyu
    Alazab, Mamoun
    Kumari, Saru
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (11) : 22607 - 22618