Paper 2024/1983

UTRA: Universe Token Reusability Attack and Verifiable Delegatable Order-Revealing Encryption

Jaehwan Park, University of Tennessee, Knoxville
Hyeonbum Lee, Hanyang University
Junbeom Hur, Korea University
Jae Hong Seo, Hanyang University
Doowon Kim, University of Tennessee, Knoxville
Abstract

As dataset sizes continue to grow, users face increasing difficulties in performing processing tasks on their local machines. From this, privacy concerns about data leakage have led data owners to upload encrypted data and utilize secure range queries to cloud servers. To address these challenges, order-revealing encryption (ORE) has emerged as a promising solution for large numerical datasets. Building on this, delegatable order-revealing encryption (DORE) was introduced, allowing operations between encrypted datasets with different secret keys in multi-client ORE environments. DORE operates through authorization tokens issued by the data owner. However, security concerns had arisen about unauthorized users exploiting data without permission, leading to the development of a secure order-revealing encryption scheme (SEDORE). These attacks can result in unauthorized data access and significant financial losses in modern cloud service providers (CSPs) utilizing pay-per-query systems. In addition, efficient delegatable order-revealing encryption (EDORE), which improves speed and storage compared to SEDORE with identical security levels, was also introduced. Although both SEDORE and EDORE were designed to be robust against these attacks, we have identified that they still retain the same vulnerabilities within the same threat model. To address these issues, we propose Verifiable Delegatable Order-Revealing Encryption (VDORE), which protects against attacks by using the Schnorr Signature Scheme to verify the validity of the token that users send. We propose a precise definition and robust proof to improve the unclear definition and insufficient proof regarding token unforgeability in the SEDORE. Furthermore, the token generation algorithm in VDORE provides about a $1.5\times$ speed-up compared to SEDORE.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint.
Keywords
order-revealing encryptioncross-database systemtoken-based authentication
Contact author(s)
jpark127 @ utk edu
leehb3706 @ hanyang ac kr
jbhur @ isslab korea ac kr
jaehongseo @ hanyang ac kr
doowon @ utk edu
History
2024-12-12: approved
2024-12-08: received
See all versions
Short URL
https://ia.cr/2024/1983
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1983,
      author = {Jaehwan Park and Hyeonbum Lee and Junbeom Hur and Jae Hong Seo and Doowon Kim},
      title = {{UTRA}: Universe Token Reusability Attack and Verifiable Delegatable Order-Revealing Encryption},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1983},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1983}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.