Property Preserving Symmetric Encryption Revisited

被引:10
|
作者
Chatterjee, Sanjit [1 ]
Das, M. Prem Laxman [2 ]
机构
[1] Indian Inst Sci, Dept Comp Sci & Automat, Bengaluru, India
[2] Soc Elect Transact & Secur, Madras, Tamil Nadu, India
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II | 2015年 / 9453卷
关键词
Bilinear pairings; Property preserving encryption; Predicate private encryption; Symmetric key; FULLY HOMOMORPHIC ENCRYPTION; PUBLIC-KEY ENCRYPTION; SECURITY TREATMENT; QUERY;
D O I
10.1007/978-3-662-48800-3_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At EUROCRYPT 2012 Pandey and Rouselakis introduced the notion of property preserving symmetric encryption which enables checking for a property on plaintexts by running a public test on the corresponding ciphertexts. Their primary contributions are: (i) a separation between 'find-then-guess' and 'left-or-right' security notions; (ii) a concrete construction for left-or-right secure orthogonality testing in composite order bilinear groups. This work undertakes a comprehensive (crypt) analysis of property preserving symmetric encryption on both these fronts. We observe that the quadratic residue based property used in their separation result is a special case of testing equality of one-bit messages, suggest a very simple and efficient deterministic encryption scheme for testing equality and show that the two security notions, find-then-guess and left-or-right, are tightly equivalent in this setting. On the other hand, the separation result easily generalizes for the equality property. So contextualized, we posit that the question of separation between security notions is property specific and subtler than what the authors envisaged; mandating further critical investigation. Next, we show that given a find-then-guess secure orthogonality preserving encryption of vectors of length 2n, there exists left-or-right secure orthogonality preserving encryption of vectors of length n, giving further evidence that find-then-guess is indeed a meaningful notion of security for property preserving encryption. Finally, we cryptanalyze the scheme for testing orthogonality. A simple distinguishing attack establishes that it is not even the weakest selective find-then-guess secure. Our main attack extracts out the subgroup elements used to mask the message vector and indicates greater vulnerabilities in the construction beyond indistinguishability. Overall, our work underlines the importance of cryptanalysis in provable security.
引用
收藏
页码:658 / 682
页数:25
相关论文
共 50 条
  • [1] Property Preserving Symmetric Encryption
    Pandey, Omkant
    Rouselakis, Yannis
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 375 - 391
  • [2] Length Preserving Symmetric Encryption: Is It Important?
    Chakraborty, Debrup
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2019, 2019, 11947 : 233 - 233
  • [3] Order-Preserving Symmetric Encryption
    Boldyreva, Alexandra
    Chenette, Nathan
    Lee, Younho
    O'Neill, Adam
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 224 - 241
  • [4] Modular Order-Preserving Encryption, Revisited
    Mavroforakis, Charalampos
    Chenette, Nathan
    O'Neill, Adam
    Kollios, George
    Canetti, Ran
    SIGMOD'15: PROCEEDINGS OF THE 2015 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2015, : 763 - 777
  • [5] Privacy preserving revocable predicate encryption revisited
    Lee, Kwangsu
    Kim, Intae
    Hwang, Seong Oun
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (03) : 471 - 485
  • [6] Preserving Data Privacy with Searchable Symmetric Encryption
    Mc Brearty, Shaun
    Farrelly, William
    Curran, Kevin
    2016 27TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC), 2016,
  • [7] Approximate Distance-Comparison-Preserving Symmetric Encryption
    Fuchsbauer, Georg
    Ghosal, Riddhi
    Hauke, Nathan
    O'Neill, Adam
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 117 - 144
  • [8] Address Permutation for Privacy-Preserving Searchable Symmetric Encryption
    Choi, Daeseon
    Kim, Seung-Hyun
    Lee, Younho
    ETRI JOURNAL, 2012, 34 (01) : 66 - 75
  • [9] How to Make a Secure Index for Searchable Symmetric Encryption, Revisited
    Watanabe, Yohei
    Nakai, Takeshi
    Ohara, Kazuma
    Noma, Takuya
    Liu, Yexuan
    Iwamoto, Mitsugu
    Ohta, Kazuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105 (08)
  • [10] How to Make a Secure Index for Searchable Symmetric Encryption, Revisited
    Watanabe, Yohei
    Nakai, Takeshi
    Ohara, Kazuma
    Nojima, Takuya
    Liu, Yexuan
    Iwamoto, Mitsugu
    Ohta, Kazuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105A (12) : 1559 - 1577