Security analysis of secure kNN and ranked keyword search over encrypted data

被引:0
|
作者
Wakaha Ogata
Takaaki Otemori
机构
[1] Tokyo Institute of Technology,
关键词
Encrypted database; Secure kNN search; Ranked keyword search; Key-recovery attack;
D O I
暂无
中图分类号
学科分类号
摘要
Wong et al. proposed a novel symmetric encryption scheme in which we can find the k-nearest neighbors from encrypted data and an encrypted query. Their scheme uses a pair of encryption functions that has an inner-product preserving property. Because of this property, the pair of encryption functions has been used in several encryption schemes involving ranked multi-keyword search as applications. On the other hand, Yao et al. pointed out that the pair of encryption functions is insecure when the attacker can get plaintext–ciphertext pairs. To prevent this attack, some countermeasures are given in the applications, e.g., randomizing plaintexts before encrypted. In this paper, we reanalyze the security of the inner-product preserving encryption functions. We first discuss the countermeasures against Yao et al.’s attack used in the applications. In particular, we show that one of them is ineffective. Next, we show that the first encryption function is breakable by the known plaintext attack by showing a concrete key-recovery procedure. Unlike Yao et al.’s attack, our attack does not use the second encryption function.
引用
收藏
页码:419 / 425
页数:6
相关论文
共 50 条
  • [1] Security analysis of secure kNN and ranked keyword search over encrypted data
    Ogata, Wakaha
    Otemori, Takaaki
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (04) : 419 - 425
  • [2] Secure Ranked Keyword Search over Encrypted Cloud Data
    Wang, Cong
    Cao, Ning
    Li, Jin
    Ren, Kui
    Lou, Wenjing
    [J]. 2010 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2010, 2010,
  • [3] Evaluable Secure Ranked Keyword Search Scheme over Encrypted Cloud Data
    Jia Zhi-peng
    Zhang Ya-ling
    Wang Shang-ping
    Sun Qin-dong
    [J]. 2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 697 - 701
  • [4] Dynamic secure multi-keyword ranked search over encrypted cloud data
    Hozhabr, Maryam
    Asghari, Parvaneh
    Javadi, Hamid Haj Seyyed
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61
  • [5] A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
    Xia, Zhihua
    Wang, Xinhui
    Sun, Xingming
    Wang, Qian
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (02) : 340 - 352
  • [6] Secure multi-keyword ranked search over encrypted cloud data for multiple data owners
    Guo, Ziqing
    Zhang, Hua
    Sun, Caijun
    Wen, Qiaoyan
    Li, Wenmin
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 137 : 380 - 395
  • [7] Secure conjunctive keyword search over encrypted data
    Golle, P
    Staddon, J
    Waters, B
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 31 - 45
  • [8] Secure conjunctive multi-keyword ranked search over encrypted cloud data for multiple data owners
    Yin, Hui
    Qin, Zheng
    Zhang, Jixin
    Ou, Lu
    Li, Fangmin
    Li, Keqin
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 689 - 700
  • [9] RSAE: Ranked Keyword Search over Asymmetric Encrypted cloud data
    Guo, Cheng
    Song, Qiongqiong
    Zhuang, Ruhan
    Feng, Bin
    [J]. PROCEEDINGS 2015 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING BDCLOUD 2015, 2015, : 82 - 86
  • [10] A Secure Multi-keyword Ranked Search over Encrypted Cloud Data against Memory Leakage Attack
    Chen, Lanxiang
    Qiu, Linbing
    Li, Kuan-Ching
    Zhou, Shuming
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (01): : 167 - 176