当前位置: X-MOL 学术IEEE Trans. Inform. Forensics Secur. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Cryptoanalysis of an Authenticated Data Structure Scheme With Public Privacy-Preserving Auditing
IEEE Transactions on Information Forensics and Security ( IF 6.8 ) Pub Date : 2021-02-12 , DOI: 10.1109/tifs.2021.3059270
Shiyu Li , Yuan Zhang , Chunxiang Xu , Kefei Chen

In this letter, we point out that the privacy-preserving adaptive trapdoor hash authentication tree scheme (published in IEEE TIFS, doi: 10.1109/TIFS.2020.2986879) can be invalidated by an adversarial cloud server: if the outsourced data is arbitrarily modified, the cloud server still can pass the third-party auditor’s auditing.

中文翻译:

带有公共隐私保护审核的认证数据结构方案的密码分析

在这封信中,我们指出,对抗性云服务器可能会使保护隐私的自适应陷门哈希认证树方案(在IEEE TIFS,doi:10.1109 / TIFS.2020.2986879中发布)无效:如果对外包数据进行了任意修改,则云服务器仍可以通过第三方审核员的审核。
更新日期:2021-02-26
down
wechat
bug