...
首页> 外文期刊>International Journal of Information Security >Security analysis of secure kNN and ranked keyword search over encrypted data
【24h】

Security analysis of secure kNN and ranked keyword search over encrypted data

机译:安全knn和排名关键字搜索的安全性分析通过加密数据

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Wong et al. proposed a novel symmetric encryption scheme in which we can find thek-nearest neighbors from encrypted data and an encrypted query. Their scheme uses a pair of encryption functions that has an inner-product preserving property. Because of this property, the pair of encryption functions has been used in several encryption schemes involving ranked multi-keyword search as applications. On the other hand, Yao et al. pointed out that the pair of encryption functions is insecure when the attacker can get plaintext-ciphertext pairs. To prevent this attack, some countermeasures are given in the applications, e.g., randomizing plaintexts before encrypted. In this paper, we reanalyze the security of the inner-product preserving encryption functions. We first discuss the countermeasures against Yao et al.'s attack used in the applications. In particular, we show that one of them is ineffective. Next, we show that the first encryption function is breakable by the known plaintext attack by showing a concrete key-recovery procedure. Unlike Yao et al.'s attack, our attack does not use the second encryption function.
机译:Wong等人。提出了一种新的对称加密方案,其中我们可以找到来自加密数据和加密查询的Thek-Collect邻居。他们的方案使用具有内部产品保留属性的一对加密函数。由于此属性,这对加密功能已用于若干加密方案,涉及作为应用程序排名的多关键字搜索。另一方面,Yao等人。指出,当攻击者可以获得纯粹的密文 - 密文对时,这对加密函数是不安全的。为了防止这种攻击,应用程序中给出了一些对策,例如,在加密之前随机化明文。在本文中,我们重新分析了内部产品保留加密功能的安全性。我们首先讨论了对Yao等人的对策。应用程序中使用的攻击。特别是,我们表明其中一个是无效的。接下来,我们表明,通过显示具体的密钥恢复过程,通过已知的明文攻击来断开第一加密功能。与yao等人不同,攻击,我们的攻击不使用第二个加密功能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号