An Efficient Attack on A Fuzzy Keyword Search Scheme over Encrypted Data

被引:6
作者
Zheng, Minghui [1 ]
Zhou, Huihua [1 ]
机构
[1] Hubei Minzu Univ, Dept Comp Sci, Enshi, Peoples R China
来源
2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC) | 2013年
关键词
Ciphertext Searchability; Cloud Storage; Fuzzy Keyword Search;
D O I
10.1109/HPCC.and.EUC.2013.232
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext searchability is a promising method to securely store and retrieve outsourced data, like in secure cloud storage. But it is still hard to do fuzzy keyword search over outsourced ciphertexts. In INFOCOM 2010, Li et al. [1] proposed a fuzzy keyword search scheme over encrypted data based on edit distance [2]. However, we find that their scheme is insecure. In this paper, we construct a special adversary to break the provable security reduction of their scheme. In theory, the main reason of the insecurity is caused by the independency of the indexes generated for different keywords. So an adversary can break the provable security according to some possessed messages learned from history interaction in the provable security.
引用
收藏
页码:1647 / 1650
页数:4
相关论文
共 12 条
  • [11] Song DXD, 2000, P IEEE S SECUR PRIV, P44, DOI 10.1109/SECPRI.2000.848445
  • [12] Zhang Y., 2010, ANONYMOUS FUZZY IDEN