Improving the proof of "Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms".
Most recently, Kan Yang et al. proposed an attribute-keyword based encryption scheme for data publish-subscribe service(AKPS), which is highly useful for cloud storage scenario. Unfortunately, we discover that there is a flaw in the security proof of indistinguishability of the tag and trapdoor agai...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Public Library of Science (PLoS)
2019-01-01
|
Series: | PLoS ONE |
Online Access: | https://doi.org/10.1371/journal.pone.0212761 |
id |
doaj-7b5e2288cd1a48fe9826fb1e881d3e6b |
---|---|
record_format |
Article |
spelling |
doaj-7b5e2288cd1a48fe9826fb1e881d3e6b2021-03-03T19:45:46ZengPublic Library of Science (PLoS)PLoS ONE1932-62032019-01-01142e021276110.1371/journal.pone.0212761Improving the proof of "Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms".Shangping WangQian ZhangYaling ZhangJin SunJuanjuan ChenXiaoqing SunMost recently, Kan Yang et al. proposed an attribute-keyword based encryption scheme for data publish-subscribe service(AKPS), which is highly useful for cloud storage scenario. Unfortunately, we discover that there is a flaw in the security proof of indistinguishability of the tag and trapdoor against chosen keyword attack under the Bilinear Diffie-Hellman (BDH) assumption. As the security proof is a key component for a cryptographic scheme, based on the Decisional Diffie-Hellman (DDH) assumption, we improve the security proof method and give a new security proof of the AKPS scheme for indistinguishability of the tag and trapdoor in our proposal, which is more rigorous than the original one. Furthermore, we also demonstrate that the AKPS scheme is secure against data Replayable Chosen Ciphertext Attack (RCCA).https://doi.org/10.1371/journal.pone.0212761 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Shangping Wang Qian Zhang Yaling Zhang Jin Sun Juanjuan Chen Xiaoqing Sun |
spellingShingle |
Shangping Wang Qian Zhang Yaling Zhang Jin Sun Juanjuan Chen Xiaoqing Sun Improving the proof of "Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms". PLoS ONE |
author_facet |
Shangping Wang Qian Zhang Yaling Zhang Jin Sun Juanjuan Chen Xiaoqing Sun |
author_sort |
Shangping Wang |
title |
Improving the proof of "Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms". |
title_short |
Improving the proof of "Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms". |
title_full |
Improving the proof of "Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms". |
title_fullStr |
Improving the proof of "Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms". |
title_full_unstemmed |
Improving the proof of "Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms". |
title_sort |
improving the proof of "privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms". |
publisher |
Public Library of Science (PLoS) |
series |
PLoS ONE |
issn |
1932-6203 |
publishDate |
2019-01-01 |
description |
Most recently, Kan Yang et al. proposed an attribute-keyword based encryption scheme for data publish-subscribe service(AKPS), which is highly useful for cloud storage scenario. Unfortunately, we discover that there is a flaw in the security proof of indistinguishability of the tag and trapdoor against chosen keyword attack under the Bilinear Diffie-Hellman (BDH) assumption. As the security proof is a key component for a cryptographic scheme, based on the Decisional Diffie-Hellman (DDH) assumption, we improve the security proof method and give a new security proof of the AKPS scheme for indistinguishability of the tag and trapdoor in our proposal, which is more rigorous than the original one. Furthermore, we also demonstrate that the AKPS scheme is secure against data Replayable Chosen Ciphertext Attack (RCCA). |
url |
https://doi.org/10.1371/journal.pone.0212761 |
work_keys_str_mv |
AT shangpingwang improvingtheproofofprivacypreservingattributekeywordbaseddatapublishsubscribeserviceoncloudplatforms AT qianzhang improvingtheproofofprivacypreservingattributekeywordbaseddatapublishsubscribeserviceoncloudplatforms AT yalingzhang improvingtheproofofprivacypreservingattributekeywordbaseddatapublishsubscribeserviceoncloudplatforms AT jinsun improvingtheproofofprivacypreservingattributekeywordbaseddatapublishsubscribeserviceoncloudplatforms AT juanjuanchen improvingtheproofofprivacypreservingattributekeywordbaseddatapublishsubscribeserviceoncloudplatforms AT xiaoqingsun improvingtheproofofprivacypreservingattributekeywordbaseddatapublishsubscribeserviceoncloudplatforms |
_version_ |
1714825678667382784 |