10/9/2018 mahnaz noroozi searchable encryption 3³لسله...“an efficient public-key searchable...
TRANSCRIPT
مهناز نوروزیدانشجوی دکتری علوم کامپیوتر
دانشگاه شهید بهشتی
1397مهرماه 17سه شنبه
پژوهشکدهانجمن رمز ایرانفضای مجازی
دانشجوییشاخه شهید بهشتیدانشگاه
2
query
Data repository
10/9/2018 Mahnaz Noroozi Searchable Encryption
310/9/2018 Mahnaz Noroozi Searchable Encryption
4
query
Data repository
10/9/2018 Mahnaz Noroozi Searchable Encryption
آنهااشتراکگذاریبهودادههارویبرجستجوماننداعمالیشدنناممکن
:جستجوقابلرمزگذاریروشهای
oشده،رمزگذاریدادههایرویبرجستجوامکاننمودنفراهمدادههارمزگشاییبهنیازبدون
510/9/2018 Mahnaz Noroozi Searchable Encryption
610/9/2018 Mahnaz Noroozi Searchable Encryption
جستجوقابلمتقارنرمزگذاری1)SSE
710/9/2018 Mahnaz Noroozi Searchable Encryption
8
اکلیدعمومیبرمزگذاری2)دواژهقابلیتجستجویکلی
PEKS
10/9/2018 Mahnaz Noroozi Searchable Encryption
Four SE architectures:
— single writer/single reader (S/S)
— multi writer/single reader (M/S)
— single writer/multi reader (S/M)
— multi writer/multi reader (M/M)
910/9/2018 Mahnaz Noroozi Searchable Encryption
— single writer/single reader (S/S) data outsourcing
— multi writer/single reader (M/S)
— single writer/multi reader (S/M) data sharing
— multi writer/multi reader (M/M)
1010/9/2018 Mahnaz Noroozi Searchable Encryption
— single writer/single reader (S/S) symmetric key primitives
— multi writer/single reader (M/S) public key encryption
— single writer/multi reader (S/M)
key distribution
— multi writer/multi reader (M/M)
1110/9/2018 Mahnaz Noroozi Searchable Encryption
Boneh et al. [2004]
•The first M/S scheme
•a Public-key Encryption with Keyword Search scheme
(PEKS)
•Boneh, D., Crescenzo, G. D., Ostrovsky, R., and Persiano, G.2004. Public Key Encryption with Keyword Search. InEUROCRYPT. LNCS Series, vol. 3027. 506–522.
1210/9/2018 Mahnaz Noroozi Searchable Encryption
•KeyGen (s) : Sk,Pk
•PEKS (Pk ,w) : Cw
•Trapdoor (Sk ,w) : Tw
•Test (Cw ,Tw’) : 1 (w = w’) and 0 (otherwise)
1310/9/2018 Mahnaz Noroozi Searchable Encryption
1410/9/2018 Mahnaz Noroozi Searchable Encryption
Keyword Guessing Attack (KGA)
• Byun et al. 2006.
Assumption: Keywords are chosen from a small space.
Step 2.
Generates ciphertexts corresponding to all
possible keywords.
By accessing a trapdoor, uses a strategy to find a
match among the generated ciphertexts.
Step 1.
1510/9/2018 Mahnaz Noroozi Searchable Encryption
16
KGA
Offline KGA Online KGA
Outside
Attackers
Outside
Attackers
Inside
Attackers
Inside
Attackers
10/9/2018 Mahnaz Noroozi Searchable Encryption
Offline KGA
17
Tw
Cw1
Cw2
Cw3
Cw4
…
Cwn
Test
Tww
10/9/2018 Mahnaz Noroozi Searchable Encryption
Security against offline outside KGA
•Searchable public key encryption with a designated tester (dPEKS): [Rhee et al. 2010].
1810/9/2018 Mahnaz Noroozi Searchable Encryption
Online KGA
19
Tw2
, Cw1
, Cw2
, Cw3
. . .
, Cwn
10/9/2018 Mahnaz Noroozi Searchable Encryption
Security against online KGA
•Secure Server-Designation Public Key Encryption with Keyword Search (SPEKS): Chen 2014.
2010/9/2018 Mahnaz Noroozi Searchable Encryption
• Li et al., “An extended chaotic maps-based keyword search scheme over encrypted
data resist outside and inside keyword guessing attacks in cloud storage services”,
Nonlinear Dynamics, 2015.
• Noroozi et al., “Comments on a chaos-based public key encryption with keyword
search scheme”, Nonlinear Dynamics, 2018.
• Huang et al., “An efficient public-key searchable encryption scheme secure against
inside keyword guessing attacks”, Information Sciences, 2017.
• Noroozi et al, “Public key authenticated encryption with keyword search:
revisited”, IET information security, in press, 2018.
21
Inside Attackers and Authenticated PEKS
10/9/2018 Mahnaz Noroozi Searchable Encryption
22
KGA
Offline KGA Online KGA
Outside
Attackers
Outside
Attackers
Inside
Attackers
Inside
Attackers
Conclusion
10/9/2018 Mahnaz Noroozi Searchable Encryption
:منابع• Song D.X., Wagner D., Perrig A., “Practical techniques for searches on encrypted data”, pp. 44–55,
2000.
• Boneh D., Crescenzo G.D., Ostrovsky R., Persiano G., “Public key encryption with keyword search”. vol.
3027, pp. 506–522, 2004.
• Byun J.W., Rhee H.S., Park H.A., Lee D.H., “Off-line keyword guessing attacks on recent keyword search
schemes over encrypted data”, In: Workshop on Secure Data Management, Springer, pp. 75–83, 2006.
• Rhee H.S., Park J.H., Susilo W., Lee D.H., “Trapdoor security in a searchable public-key encryption
scheme with a designated tester”, Journal of Systems and Software, 83 (5), pp. 763 – 771, 2010.
• Yau W.C., Phan R.C.W., Heng S.H., Goi B.M., “Keyword guessing attacks on secure searchable public
key encryption schemes with a designated tester”, International Journal of Computer Mathematics, 90
(12), pp. 2581-2587, 2013.
• Chen Y.C., “SPEKS: Secure server-designation public key encryption with keyword search against
keyword guessing attacks”, The Computer Journal, 58(4), pp. 922-933, 2015.2310/9/2018 Mahnaz Noroozi Searchable Encryption
:منابع• Li C.-T., Lee C.W., Shen J.J., “An extended chaotic maps-based keyword search scheme over
encrypted data resist outside and inside keyword guessing attacks in cloud storage services”,
Nonlinear Dynamics, 80(3), pp. 1601-1611, 2015.
• Noroozi M., Eslami Z., Pakniat N., “Comments on a chaos-based public key encryption with
keyword search scheme”, Nonliniear Dynamics, 94 (2), pp. 1127-1132, 2018.
• Huang Q., Li H., “An efficient public-key searchable encryption scheme secure against inside
keyword guessing attacks”, Information Sciences, 403, pp. 1–14, 2017.
• Noroozi M., Eslami Z., “Public key authenticated encryption with keyword search: revisited”, IET
information security, in press, 2018.
2410/9/2018 Mahnaz Noroozi Searchable Encryption
2510/9/2018 Mahnaz Noroozi Searchable Encryption