The ISC International Journal of Information Security, 2022
This paper analyses the security and efficiency of some notable privacy preserving data aggregati... more This paper analyses the security and efficiency of some notable privacy preserving data aggregation schemes, SP 2 DAS, 3PDA, and EPPA. For SP 2 DAS and 3PDA schemes, We show that despite the designers' claims, there are efficient forgery attacks on the signature scheme used. We present a selective forgery attack on the signature scheme of SP 2 DAS in the key-only attack model and a selective forgery attack on the 3PDA's signature scheme in the known-message attack model, requiring only two pairs of message-signature. These attacks enable the attacker to inject any arbitrary faulty data into the data aggregated by the network, without being detected, which is a serious threat to the performance of the whole network. We also present an improved version of the broadcast encryption scheme used in EPPA scheme, in which the decryption key is half, the decryption complexity is half, and the ciphertext size is 3/4 of the original one. The semantic security of the proposed scheme is proved under the same assumption as the original scheme.
The ISC International Journal of Information Security, 2022
This paper analyses the security and efficiency of some notable privacy preserving data aggregati... more This paper analyses the security and efficiency of some notable privacy preserving data aggregation schemes, SP 2 DAS, 3PDA, and EPPA. For SP 2 DAS and 3PDA schemes, We show that despite the designers' claims, there are efficient forgery attacks on the signature scheme used. We present a selective forgery attack on the signature scheme of SP 2 DAS in the key-only attack model and a selective forgery attack on the 3PDA's signature scheme in the known-message attack model, requiring only two pairs of message-signature. These attacks enable the attacker to inject any arbitrary faulty data into the data aggregated by the network, without being detected, which is a serious threat to the performance of the whole network. We also present an improved version of the broadcast encryption scheme used in EPPA scheme, in which the decryption key is half, the decryption complexity is half, and the ciphertext size is 3/4 of the original one. The semantic security of the proposed scheme is proved under the same assumption as the original scheme.
Uploads
Papers by Zahra Ahmadian
https://www.isecure-journal.com/article_143030.html
https://www.isecure-journal.com/article_143030.html