Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification

被引:9
|
作者
Wang, Xu An [1 ]
Weng, Jian [2 ]
Ma, Jianfeng [3 ]
Yang, Xiaoyuan [1 ]
机构
[1] Engn Univ Chinese Armed Police Force, Xian, Shaanxi, Peoples R China
[2] Jinan Univ, Sch Comp Sci, Guangzhou, Guangdong, Peoples R China
[3] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Database systems;
D O I
10.1016/j.ins.2019.03.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays more and more enterprises prefer to outsource their databases to remote cloud servers, they also want to access/query/update the remote outsourced databases just as accessing/quering/updating on the local database systems. Thus how to ensure the outsourced database being correct/confidential/integral is very important, especially how to ensure the correctness and completeness of the query results are big challenge problems. Aiming at solving these problems, recently Song et al. proposed a public authentication protocol for outsourced databases with multi-user modification, unfortunately in this short paper we show their proposal is not secure. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:13 / 18
页数:6
相关论文
共 50 条
  • [1] Tell me the truth: Practically public authentication for outsourced databases with multi-user modification
    Song, Wei
    Wang, Bing
    Wang, Qian
    Peng, Zhiyong
    Lou, Wenjing
    [J]. INFORMATION SCIENCES, 2017, 387 : 221 - 237
  • [2] Cryptanalysis of Multi-User Quantum Private Query Protocol
    Zhu, Dan
    Wang, Liwei
    Zhu, Hongfeng
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2021, 60 (01) : 284 - 292
  • [3] Cryptanalysis of Multi-User Quantum Private Query Protocol
    Dan Zhu
    Liwei Wang
    Hongfeng Zhu
    [J]. International Journal of Theoretical Physics, 2021, 60 : 284 - 292
  • [4] Cryptanalysis of a User Authentication Protocol
    Tan, Zuowen
    [J]. 2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 27 - 30
  • [5] Cryptanalysis and improvement of a multi-user quantum key distribution protocol
    Wang, Tian-Yin
    Wen, Qiao-Yan
    Chen, Xiu-Bo
    [J]. OPTICS COMMUNICATIONS, 2010, 283 (24) : 5261 - 5263
  • [6] A Multi-User, Single-Authentication Protocol for Smart Grid Architectures
    Alfakeeh, Ahmed S.
    Khan, Sarmadullah
    Al-Bayatti, Ali Hilal
    [J]. SENSORS, 2020, 20 (06)
  • [7] Cryptanalysis and Improvement of the Multi-User QPCE Protocol with Semi-Honest Third Party
    昌燕
    许春香
    张仕斌
    王海春
    闫丽丽
    韩贵华
    黄源源
    盛志伟
    [J]. Chinese Physics Letters, 2016, (01) : 5 - 9
  • [8] Cryptanalysis and Improvement of the Multi-User QPCE Protocol with Semi-Honest Third Party
    昌燕
    许春香
    张仕斌
    王海春
    闫丽丽
    韩贵华
    黄源源
    盛志伟
    [J]. Chinese Physics Letters., 2016, 33 (01) - 9
  • [9] Cryptanalysis and Improvement of the Multi-User QPCE Protocol with Semi-Honest Third Party
    Chang, Yan
    Xu, Chun-Xiang
    Zhang, Shi-Bin
    Wang, Hai-Chun
    Yan, Li-Li
    Han, Gui-Hua
    Huang, Yuan-Yuan
    Sheng, Zhi-Wei
    [J]. CHINESE PHYSICS LETTERS, 2016, 33 (01)
  • [10] Cryptanalysis of a Remote User Authentication Protocol Using Smart Cards
    Madhusudhan, R.
    Kumar, Rohith S.
    [J]. 2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 474 - 477