Insight of the protection for data security under selective opening attacks

被引:134
作者
Huang, Zhengan [1 ]
Liu, Shengli [2 ,6 ]
Mao, Xianping [3 ]
Chen, Kefei [4 ,5 ,6 ]
Li, Jin [1 ]
机构
[1] Guangzhou Univ, Sch Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[3] Shanghai Koal Software Co Ltd, Shanghai 200436, Peoples R China
[4] Hangzhou Normal Univ, Sch Sci, Hangzhou 310036, Zhejiang, Peoples R China
[5] State Key Lab Math Engn & Adv Comp, Wuxi 214000, Peoples R China
[6] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
基金
中国国家自然科学基金;
关键词
Data security; Public-key encryption; Non-malleability; Selective opening attack; ENCRYPTION SCHEMES SECURE;
D O I
10.1016/j.ins.2017.05.031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data security and privacy protection issues are the primary restraints for adoption of cloud computing. Selective opening security (SOA security) focuses on such a scenario of cloud computing: Multiple senders encrypt their own data with the public key of a single receiver. Given the ciphertexts, the adversary is allowed to corrupt some of the senders, seeing not only their plaintexts but also the random coins used during the encryption. The security requirement of SOA security is that the privacy of the unopened data is preserved. On the other hand, non-malleability is also a very important security notion for data security in cloud computing and public-key cryptography. The security requirement of non-malleability is that given a challenge ciphertext, it should be infeasible to generate a ciphertext vector whose decryption is "meaningfully related" to the corresponding challenge plaintext. However, as far as we know, the relations between non-malleability and SOA security are still undiscovered, and the security notion of non-malleability under selective opening attacks has not yet been formally defined or researched. In this paper, we formalize the security notion of non-malleability under selective opening attacks (NM-SO security), and explore the relations between NM-SO security and the standard SOA security, the relations between NM-SO security and the standard non malleability, and the relations among NM-SO security notions. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:223 / 241
页数:19
相关论文
共 28 条
[1]  
[Anonymous], 1998, LNCS
[2]  
Bellare M., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P519
[3]  
Bellare M, 2012, LECT NOTES COMPUT SC, V7237, P645, DOI 10.1007/978-3-642-29011-4_38
[4]  
Bellare M, 2009, LECT NOTES COMPUT SC, V5479, P1, DOI 10.1007/978-3-642-01001-9_1
[5]  
Böehl F, 2012, LECT NOTES COMPUT SC, V7293, P522, DOI 10.1007/978-3-642-30057-8_31
[6]  
Cramer R, 2002, LECT NOTES COMPUT SC, V2332, P45
[7]   Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack [J].
Cramer, R ;
Shoup, V .
SIAM JOURNAL ON COMPUTING, 2003, 33 (01) :167-226
[8]  
Cramer R, 1998, LECT NOTES COMPUT SC, V1462, P13, DOI 10.1007/BFb0055717
[9]   Nonmalleable cryptography [J].
Dolev, D ;
Dwork, C ;
Naor, M .
SIAM JOURNAL ON COMPUTING, 2000, 30 (02) :391-437
[10]  
Dolev D., 1991, P 23 ANN ACM S THEOR, P542