Mosharaka for Research and Studies
Login/Sign Up
Main Menu
Papers Menu
Quick Links
Next Congress
Congresses

All Forthcoming Congresses

Conferences

All Forthcoming Conferences

MIC-Things 2024 will be held in Irbid
Papers Links
  • Browse
  • Subjects
  • Years
  • CCA
  • GC-CCA 2012
  • 34.Cnf-479
Papers Published at GC-CCA 2012
All 14 Papers
IDAuthors and TitlePages
34.Cnf-227 Ms. Imane Benkhelifa
Dr. Samira Moussaoui
Speed and Direction Prediction-based Localization for Wireless Sensor Networks
1-6
34.Cnf-266 Dr. Imad Zyout
Dr. Ikhlas Abdel-Qader
An Improvement of Texture-Based Classification of Microcalcification Clusters in Mammography using PSO-SVM Approach
7-12
34.Cnf-349 Mr. Ali Ihbeel
Dr. Hasein I. Sigiuk
Performance Evaluation of Three MANET Protocols on WSN
13-21
34.Cnf-357 Mr. Gaojie Chen
Mr. Ousama Alnatouh
Ms. Lu Ge
Prof. Jonathon Chambers
A Distributed Differential Space-Time Coding With Full Interference Cancellation Scheme for A Cooperative Four Relay Network
22-26
34.Cnf-363 Prof. Thamer M. Jamel
Mr. Karam Naji
Simple Variable Step Size LMS Algorithm for Adaptive Identification of IIR Filtering System
27-32
34.Cnf-365 Dr. M Ayyash
Dr. Yazeed A. Al-Sbou
Towards A Cross-Layer Framework for Quality of Service Provisioning in Cognitive Radio Networks
33-38
34.Cnf-415 Dr. Mohammad Reza Salehi
Dr. Ebrahim Abiri
Mr. Hamed Shahraki
Design of a 4-10 GHz low noise amplifier based on coupled inductors for communication systems
39-44
34.Cnf-435 Ms. Faiza Mekhalfa
Prof. Daoud Berkani
Comparison of fractal compression methods impact on radiographic images of weld defects
45-50
34.Cnf-436 Mrs. Besat Jafarian
Prof. Nasser Yazdani
B-tree based packet classification (B2-PC)
51-56
34.Cnf-437 Dr. Kerem Kucuk
Dr. Necla Bandirmali
Prof. Adnan Kavak
Modeling of the modified SSLE in OPNET for large scale wireless sensor networks
57-62
34.Cnf-441 Mr. Gökhan Seçinti
Dr. Turgay Altilar
Virtual Laxity Driven Scheduling for Multiprocessor Real-Time Systems
63-68
34.Cnf-443 Dr. Takeshi Matsuda
Dr. Daiki Koizumi
Mr. Michio Sonoda
Cross Site Scripting Attacks Detection Algorithm Based on the Appearance Position of Characters
69-74
34.Cnf-446 Mr. Afonso J. Faria
Prof. Jose Brito
Average Delay in Cognitive Radio Networks Using Slotted ALOHA
75-80
34.Cnf-447 Mr. Helmi Ahmed
Prof. Mohamed Massmoudi
intensive Computing in advanced wireless sensor node: potential solution
81-87
34.Cnf-479 Paper View Page
Title Weakness of provably secure searchable encryption against frequency analysis
Authors Mr. Takanori Suga, Kyushu University, Fukuoka, Japan
Dr. Takashi Nishide, Kyushu University, Fukuoka, Japan
Prof. Kouichi Sakurai, Kyushu University, Fukuoka, Japan
Abstract There are encryption schemes called searchable encryption schemes. We can prove the security of these schemes based on a security model. However, we face the risk of the frequency analysis in some constructions because these schemes encrypt the keywords per word in the file as well as itself. In this attack, we assume an adversary knows the frequency distribution of plaintexts (i.e., keywords), and an adversary measures the frequency of the ciphertext and guesses the plaintext by comparing the frequency of the plaintext with it. In this work, we apply this attack to the existing works and evaluate the resistance of the searchable encryption to this attack by considering the difference between the deterministic encryption and the probabilistic encryption, and the supported types of searches.
Track SaP: Security and Privacy
Conference 5th Mosharaka International Conference on Communications, Computers and Applications (MIC-CCA 2012)
Congress 2012 Global Congress on Communications, Computers and Applications (GC-CCA 2012), 12-14 October 2012, Istanbul, Turkey
Pages --1
Topics Internet and Web Security
Cryptography and Data Security
ISSN 2227-331X
DOI
BibTeX @inproceedings{479CCA2012,
title={Weakness of provably secure searchable encryption against frequency analysis},
author={Takanori Suga, and Takashi Nishide, and Kouichi Sakurai},
booktitle={2012 Global Congress on Communications, Computers and Applications (GC-CCA 2012)},
year={2012},
pages={--1},
doi={}},
organization={Mosharaka for Research and Studies} }
Paper Views 13 Paper Views Rank 417/524
Paper Downloads 4 Paper Downloads Rank 413/524
GC-CCA 2012 Visits: 13672||MIC-CCA 2012 Visits: 11365||SaP Track Visits: 1753