Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification

被引:9
|
作者
Wang, Xu An [1 ]
Weng, Jian [2 ]
Ma, Jianfeng [3 ]
Yang, Xiaoyuan [1 ]
机构
[1] Engn Univ Chinese Armed Police Force, Xian, Shaanxi, Peoples R China
[2] Jinan Univ, Sch Comp Sci, Guangzhou, Guangdong, Peoples R China
[3] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
The corresponding author Jian Weng is supported by National Natural Science Foundation of China (Grant Nos. U1736203; 61825203; 61472165; 61732021; 61877029; 61872153; 61802145; U1636209; National Key R&D Plan of China (Grant No. 2017YFB0802203; 2018YFB1003701); National Joint Engineering Research Center of Network Security Detection and Protection Technology; Guangdong Provincial Special Funds for Applied Technology Research and Development and Transformation of Important Scientific and Technological Achieve (Grant Nos. 2016B010124009 and 2017B010124002); Guangdong Key Laboratory of Data Security and Privacy Preserving (Grant No. 2017B030301004); Guangzhou Key Laboratory of Data Security and Privacy Preserving (Grant No. 201705030004). The first and fourth authors are supported by the National Cryptography Development Fund of China Under Grants No. MMJJ20170112; the Natural Science Basic Research Plan in Shaanxi Province of china (Grant Nos. 2018JM6028); National Nature Science Foundation of China (Grant Nos. 61772550; 61572521; U1636114; 61402531); National Key Research and Development Program of China Under Grants No. 2017YFB0802000; Guangxi Key Laboratory of Cryptography and Information Security (No. GCIS201610). The third author is supported by Shaanxi Science & Technology Coordination & Innovation Project (2016TZC-G-6-3);
D O I
10.1016/j.ins.2019.03.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays more and more enterprises prefer to outsource their databases to remote cloud servers, they also want to access/query/update the remote outsourced databases just as accessing/quering/updating on the local database systems. Thus how to ensure the outsourced database being correct/confidential/integral is very important, especially how to ensure the correctness and completeness of the query results are big challenge problems. Aiming at solving these problems, recently Song et al. proposed a public authentication protocol for outsourced databases with multi-user modification, unfortunately in this short paper we show their proposal is not secure. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:13 / 18
页数:6
相关论文
共 50 条
  • [41] Multi-WiIR: Multi-User Identity Legitimacy Authentication Based on WiFi Device
    Wei, Zhongcheng
    Dong, Yanhu
    [J]. FUTURE INTERNET, 2024, 16 (04)
  • [42] Cryptanalysis and improvement of a biometric-based remote user authentication protocol usable in a multiserver environment
    Chandrakar, Preeti
    Om, Hari
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2017, 28 (12):
  • [43] SHRIMPS: A framework for evaluating multi-user, multi-modal implicit authentication systems
    Chen, Jiayi
    Hengartner, Urs
    Khan, Hassan
    [J]. COMPUTERS & SECURITY, 2024, 137
  • [44] OGPADSM2: Oriented-group public auditing for data sharing with multi-user modification
    Zhang J.
    Zhao X.
    Zhen W.
    [J]. Zhang, Jianhong (zjhncut@163.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10): : 240 - 249
  • [45] Cryptanalysis and Improvement of ECC - Based Security Enhanced User Authentication Protocol for Wireless Sensor Networks
    Maurya, Anup Kumar
    Sastry, V. N.
    Udgata, Siba Kumar
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 134 - 145
  • [46] Cryptanalysis of a Smartcard-Based User Authentication Scheme for Multi-Server Environments
    He, Debiao
    Hu, Hao
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2012, E95B (09) : 3052 - 3054
  • [47] Iterative multi-user power allocation: Performance evaluation & modification
    Bagheri, H
    Pakravan, MR
    Khalaj, BH
    [J]. TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : C216 - C219
  • [48] Quantum Multi-User Broadcast Protocol for the "Platform as a Service" Model
    Shi, Peng
    Li, Nachuan
    Wang, Shumei
    Liu, Zhi
    Ren, Mengran
    Ma, Hongyang
    [J]. SENSORS, 2019, 19 (23)
  • [49] A PROTOCOL FOR RESOURCE LOCKING AND DEADLOCK DETECTION IN A MULTI-USER ENVIRONMENT
    DOMENICI, A
    LAZZERINI, B
    PRETE, CA
    [J]. MICROPROCESSING AND MICROPROGRAMMING, 1989, 27 (1-5): : 431 - 437
  • [50] Opportunistic Relay Selection Protocol under Multi-user Environment
    Yoo, Inchul
    Oh, Jinyoung
    Han, Youngnam
    [J]. 2013 IEEE 78TH VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2013,