25
روزیاز نو مهن کامپیوتر دانشجوی دکتری علومد بهشتی شهینشگاه دا سهشنبه17 رماه مه1397 شکده پژوه جازی فضایمز ایرانجمن ر ان شاخهی دانشجوینشگاه داد بهشتی شهی

10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

مهناز نوروزیدانشجوی دکتری علوم کامپیوتر

دانشگاه شهید بهشتی

1397مهرماه 17سه شنبه

پژوهشکدهانجمن رمز ایرانفضای مجازی

دانشجوییشاخه شهید بهشتیدانشگاه

Page 2: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

2

query

Data repository

10/9/2018 Mahnaz Noroozi Searchable Encryption

Page 3: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

310/9/2018 Mahnaz Noroozi Searchable Encryption

Page 4: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

4

query

Data repository

10/9/2018 Mahnaz Noroozi Searchable Encryption

Page 5: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

آن‌هااشتراک‌گذاریبهوداده‌هارویبرجستجوماننداعمالیشدنناممکن

:جستجوقابلرمزگذاریروش‌های

oشده،رمزگذاریداده‌هایرویبرجستجوامکاننمودنفراهمداده‌هارمزگشاییبهنیازبدون

510/9/2018 Mahnaz Noroozi Searchable Encryption

Page 6: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

610/9/2018 Mahnaz Noroozi Searchable Encryption

Page 7: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

جستجوقابلمتقارنرمزگذاری1)SSE

710/9/2018 Mahnaz Noroozi Searchable Encryption

Page 8: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

8

ا‌کلید‌عمومی‌برمزگذاری‌2)دواژهقابلیت‌جستجوی‌کلی

PEKS

10/9/2018 Mahnaz Noroozi Searchable Encryption

Page 9: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

Four SE architectures:

— single writer/single reader (S/S)

— multi writer/single reader (M/S)

— single writer/multi reader (S/M)

— multi writer/multi reader (M/M)

910/9/2018 Mahnaz Noroozi Searchable Encryption

Page 10: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

— single writer/single reader (S/S) data outsourcing

— multi writer/single reader (M/S)

— single writer/multi reader (S/M) data sharing

— multi writer/multi reader (M/M)

1010/9/2018 Mahnaz Noroozi Searchable Encryption

Page 11: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

— single writer/single reader (S/S) symmetric key primitives

— multi writer/single reader (M/S) public key encryption

— single writer/multi reader (S/M)

key distribution

— multi writer/multi reader (M/M)

1110/9/2018 Mahnaz Noroozi Searchable Encryption

Page 12: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

Boneh et al. [2004]

•The first M/S scheme

•a Public-key Encryption with Keyword Search scheme

(PEKS)

•Boneh, D., Crescenzo, G. D., Ostrovsky, R., and Persiano, G.2004. Public Key Encryption with Keyword Search. InEUROCRYPT. LNCS Series, vol. 3027. 506–522.

1210/9/2018 Mahnaz Noroozi Searchable Encryption

Page 13: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

•KeyGen (s) : Sk,Pk

•PEKS (Pk ,w) : Cw

•Trapdoor (Sk ,w) : Tw

•Test (Cw ,Tw’) : 1 (w = w’) and 0 (otherwise)

1310/9/2018 Mahnaz Noroozi Searchable Encryption

Page 14: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

1410/9/2018 Mahnaz Noroozi Searchable Encryption

Page 15: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

Keyword Guessing Attack (KGA)

• Byun et al. 2006.

Assumption: Keywords are chosen from a small space.

Step 2.

Generates ciphertexts corresponding to all

possible keywords.

By accessing a trapdoor, uses a strategy to find a

match among the generated ciphertexts.

Step 1.

1510/9/2018 Mahnaz Noroozi Searchable Encryption

Page 16: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

16

KGA

Offline KGA Online KGA

Outside

Attackers

Outside

Attackers

Inside

Attackers

Inside

Attackers

10/9/2018 Mahnaz Noroozi Searchable Encryption

Page 17: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

Offline KGA

17

Tw

Cw1

Cw2

Cw3

Cw4

Cwn

Test

Tww

10/9/2018 Mahnaz Noroozi Searchable Encryption

Page 18: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

Security against offline outside KGA

•Searchable public key encryption with a designated tester (dPEKS): [Rhee et al. 2010].

1810/9/2018 Mahnaz Noroozi Searchable Encryption

Page 19: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

Online KGA

19

Tw2

, Cw1

, Cw2

, Cw3

. . .

, Cwn

10/9/2018 Mahnaz Noroozi Searchable Encryption

Page 20: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

Security against online KGA

•Secure Server-Designation Public Key Encryption with Keyword Search (SPEKS): Chen 2014.

2010/9/2018 Mahnaz Noroozi Searchable Encryption

Page 21: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

• Li et al., “An extended chaotic maps-based keyword search scheme over encrypted

data resist outside and inside keyword guessing attacks in cloud storage services”,

Nonlinear Dynamics, 2015.

• Noroozi et al., “Comments on a chaos-based public key encryption with keyword

search scheme”, Nonlinear Dynamics, 2018.

• Huang et al., “An efficient public-key searchable encryption scheme secure against

inside keyword guessing attacks”, Information Sciences, 2017.

• Noroozi et al, “Public key authenticated encryption with keyword search:

revisited”, IET information security, in press, 2018.

21

Inside Attackers and Authenticated PEKS

10/9/2018 Mahnaz Noroozi Searchable Encryption

Page 22: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

22

KGA

Offline KGA Online KGA

Outside

Attackers

Outside

Attackers

Inside

Attackers

Inside

Attackers

Conclusion

10/9/2018 Mahnaz Noroozi Searchable Encryption

Page 23: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

:منابع• Song D.X., Wagner D., Perrig A., “Practical techniques for searches on encrypted data”, pp. 44–55,

2000.

• Boneh D., Crescenzo G.D., Ostrovsky R., Persiano G., “Public key encryption with keyword search”. vol.

3027, pp. 506–522, 2004.

• Byun J.W., Rhee H.S., Park H.A., Lee D.H., “Off-line keyword guessing attacks on recent keyword search

schemes over encrypted data”, In: Workshop on Secure Data Management, Springer, pp. 75–83, 2006.

• Rhee H.S., Park J.H., Susilo W., Lee D.H., “Trapdoor security in a searchable public-key encryption

scheme with a designated tester”, Journal of Systems and Software, 83 (5), pp. 763 – 771, 2010.

• Yau W.C., Phan R.C.W., Heng S.H., Goi B.M., “Keyword guessing attacks on secure searchable public

key encryption schemes with a designated tester”, International Journal of Computer Mathematics, 90

(12), pp. 2581-2587, 2013.

• Chen Y.C., “SPEKS: Secure server-designation public key encryption with keyword search against

keyword guessing attacks”, The Computer Journal, 58(4), pp. 922-933, 2015.2310/9/2018 Mahnaz Noroozi Searchable Encryption

Page 24: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

:منابع• Li C.-T., Lee C.W., Shen J.J., “An extended chaotic maps-based keyword search scheme over

encrypted data resist outside and inside keyword guessing attacks in cloud storage services”,

Nonlinear Dynamics, 80(3), pp. 1601-1611, 2015.

• Noroozi M., Eslami Z., Pakniat N., “Comments on a chaos-based public key encryption with

keyword search scheme”, Nonliniear Dynamics, 94 (2), pp. 1127-1132, 2018.

• Huang Q., Li H., “An efficient public-key searchable encryption scheme secure against inside

keyword guessing attacks”, Information Sciences, 403, pp. 1–14, 2017.

• Noroozi M., Eslami Z., “Public key authenticated encryption with keyword search: revisited”, IET

information security, in press, 2018.

2410/9/2018 Mahnaz Noroozi Searchable Encryption

Page 25: 10/9/2018 Mahnaz Noroozi Searchable Encryption 3³لسله...“An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks”, InformationSciences,

2510/9/2018 Mahnaz Noroozi Searchable Encryption