基于有效撤销的无代理隐私保护任务的安全性研究

Jianhong Zhang, Zian Yan, Zhaorui Deng, Haoting Han, Jing Cao, Zhengtao Jiang
{"title":"基于有效撤销的无代理隐私保护任务的安全性研究","authors":"Jianhong Zhang, Zian Yan, Zhaorui Deng, Haoting Han, Jing Cao, Zhengtao Jiang","doi":"10.1109/ICCC51575.2020.9344933","DOIUrl":null,"url":null,"abstract":"Task matching is an important part to realize task assignment in crowdsourcing computing. However, privacy of tasks and workers is usually ignored in most of exiting task matching schemes. To solve this issue, recently, Shu et al. proposed a privacy-preserving task matching with efficient revocation in Crowdsourcing (IEEE Transactions on Dependable and Secure Computing DOI 10.1109/TDSC.2018.2875682) to ensure privacy protection of tasks and workers and achieve the worker revocation. Their scheme had claimed to be selective IND-CKA secure, and realized efficient revocation of the worker. Unfortunately, in this work, by analyzing the security of Shu et al. scheme, we show that their scheme is insecure. It cannot really provide IND-CKA security and realize the revocation of the worker. This is to say, their scheme does not satisfy the confidentiality of keyword since an adversary can distinguish the ciphertexts of arbitrary keywords without trapdoor information. Finally, after the corresponding attacks are given, we analyze the reason to produce such attacks.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"On the Security of a Proxy-free Privacy-preserving Task Matching with Efficient Revocation\",\"authors\":\"Jianhong Zhang, Zian Yan, Zhaorui Deng, Haoting Han, Jing Cao, Zhengtao Jiang\",\"doi\":\"10.1109/ICCC51575.2020.9344933\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Task matching is an important part to realize task assignment in crowdsourcing computing. However, privacy of tasks and workers is usually ignored in most of exiting task matching schemes. To solve this issue, recently, Shu et al. proposed a privacy-preserving task matching with efficient revocation in Crowdsourcing (IEEE Transactions on Dependable and Secure Computing DOI 10.1109/TDSC.2018.2875682) to ensure privacy protection of tasks and workers and achieve the worker revocation. Their scheme had claimed to be selective IND-CKA secure, and realized efficient revocation of the worker. Unfortunately, in this work, by analyzing the security of Shu et al. scheme, we show that their scheme is insecure. It cannot really provide IND-CKA security and realize the revocation of the worker. This is to say, their scheme does not satisfy the confidentiality of keyword since an adversary can distinguish the ciphertexts of arbitrary keywords without trapdoor information. Finally, after the corresponding attacks are given, we analyze the reason to produce such attacks.\",\"PeriodicalId\":386048,\"journal\":{\"name\":\"2020 IEEE 6th International Conference on Computer and Communications (ICCC)\",\"volume\":\"76 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE 6th International Conference on Computer and Communications (ICCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCC51575.2020.9344933\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCC51575.2020.9344933","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

任务匹配是众包计算中实现任务分配的重要环节。然而,在现有的大多数任务匹配方案中,任务和工作者的隐私性往往被忽略。为了解决这一问题,最近Shu等人提出了一种Crowdsourcing中具有高效撤销的隐私保护任务匹配(IEEE Transactions on reliable and Secure Computing DOI 10.1109/TDSC.2018.2875682),以确保任务和工作人员的隐私保护,实现工作人员的撤销。他们的方案声称是选择性IND-CKA安全的,并实现了工人的有效撤销。不幸的是,在这项工作中,通过分析Shu等人方案的安全性,我们表明他们的方案是不安全的。它不能真正提供IND-CKA安全性和实现工作者的撤销。也就是说,他们的方案不满足关键字的机密性,因为攻击者可以在没有陷阱门信息的情况下区分任意关键字的密文。最后,在给出了相应的攻击后,分析了产生这些攻击的原因。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
On the Security of a Proxy-free Privacy-preserving Task Matching with Efficient Revocation
Task matching is an important part to realize task assignment in crowdsourcing computing. However, privacy of tasks and workers is usually ignored in most of exiting task matching schemes. To solve this issue, recently, Shu et al. proposed a privacy-preserving task matching with efficient revocation in Crowdsourcing (IEEE Transactions on Dependable and Secure Computing DOI 10.1109/TDSC.2018.2875682) to ensure privacy protection of tasks and workers and achieve the worker revocation. Their scheme had claimed to be selective IND-CKA secure, and realized efficient revocation of the worker. Unfortunately, in this work, by analyzing the security of Shu et al. scheme, we show that their scheme is insecure. It cannot really provide IND-CKA security and realize the revocation of the worker. This is to say, their scheme does not satisfy the confidentiality of keyword since an adversary can distinguish the ciphertexts of arbitrary keywords without trapdoor information. Finally, after the corresponding attacks are given, we analyze the reason to produce such attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Safe and Stable Timing Method over Air Interface Based on Multi-Base Station Cooperation Peak to Average Power Ratio (PAPR) Mitigation for Underwater Acoustic OFDM System by Using an Efficient Hybridization Technique Monocular Visual-Inertial Odometry Based on Point and Line Features Block Halftoning for Size-Invariant Visual Cryptography Based on Two-Dimensional Lattices Airborne STAP with Unknown Mutual Coupling for Coprime Sampling Structure
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1