Paper 2024/1983
UTRA: Universe Token Reusability Attack and Verifiable Delegatable Order-Revealing Encryption
Abstract
As dataset sizes continue to grow, users face increasing difficulties in performing processing tasks on their local machines. From this, privacy concerns about data leakage have led data owners to upload encrypted data and utilize secure range queries to cloud servers. To address these challenges, order-revealing encryption (ORE) has emerged as a promising solution for large numerical datasets. Building on this, delegatable order-revealing encryption (DORE) was introduced, allowing operations between encrypted datasets with different secret keys in multi-client ORE environments. DORE operates through authorization tokens issued by the data owner. However, security concerns had arisen about unauthorized users exploiting data without permission, leading to the development of a secure order-revealing encryption scheme (SEDORE). These attacks can result in unauthorized data access and significant financial losses in modern cloud service providers (CSPs) utilizing pay-per-query systems. In addition, efficient delegatable order-revealing encryption (EDORE), which improves speed and storage compared to SEDORE with identical security levels, was also introduced. Although both SEDORE and EDORE were designed to be robust against these attacks, we have identified that they still retain the same vulnerabilities within the same threat model. To address these issues, we propose Verifiable Delegatable Order-Revealing Encryption (VDORE), which protects against attacks by using the Schnorr Signature Scheme to verify the validity of the token that users send. We propose a precise definition and robust proof to improve the unclear definition and insufficient proof regarding token unforgeability in the SEDORE. Furthermore, the token generation algorithm in VDORE provides about a $1.5\times$ speed-up compared to SEDORE.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Preprint.
- Keywords
- order-revealing encryptioncross-database systemtoken-based authentication
- Contact author(s)
-
jpark127 @ utk edu
leehb3706 @ hanyang ac kr
jbhur @ isslab korea ac kr
jaehongseo @ hanyang ac kr
doowon @ utk edu - History
- 2024-12-12: approved
- 2024-12-08: received
- See all versions
- Short URL
- https://ia.cr/2024/1983
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/1983, author = {Jaehwan Park and Hyeonbum Lee and Junbeom Hur and Jae Hong Seo and Doowon Kim}, title = {{UTRA}: Universe Token Reusability Attack and Verifiable Delegatable Order-Revealing Encryption}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1983}, year = {2024}, url = {https://eprint.iacr.org/2024/1983} }