Comment on “Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data”

Zhiguang Qin,Yan Wu,Hu Xiong
DOI: https://doi.org/10.1109/tcc.2020.3000513
IF: 5.697
2021-10-01
IEEE Transactions on Cloud Computing
Abstract:Recently in IEEE Transactions on Cloud Computing (TCC), Yin et al. [5] designed a fine-grained query verification mechanism where a novel certificateless short signature scheme is proposed for validating the data of encrypted query results. Despite the authors alleged that their scheme achieves the existential unforgeability to ensure the authenticity of verification objects, we found that this scheme fails to resist the forgery attack. Specifically, through launching the concrete attacks, a malicious adversary can forge a signature on any verification object without being detected.
computer science, information systems, theory & methods
What problem does this paper attempt to address?
The problem this paper attempts to address is the security flaw in the certificate-less signature (CLS) scheme proposed by Yin et al. in the context of cloud data encryption query result verification mechanisms. Specifically, Yin et al. claimed that their scheme could prevent any malicious adversary (including a compromised Key Generation Center, KGC) from forging the signature of a verification object. However, the authors of this paper found that the scheme has a public key replacement attack vulnerability, where a malicious adversary can forge a valid signature of any verification object by replacing the data owner's public key without being detected. ### Main Issues: 1. **Public Key Replacement Attack**: Yin et al.'s scheme fails to effectively prevent public key replacement attacks, allowing a malicious adversary to forge valid signatures. 2. **Security Flaw**: The scheme has a critical security flaw because the master public key `mpk` is not used as an input to the verification algorithm. ### Solution: This paper demonstrates the specific attack steps to exploit the public key replacement attack to forge signatures and points out the security vulnerabilities in Yin et al.'s scheme. The authors suggest that when designing similar certificate-less signature schemes, the master public key `mpk` should be correctly used in the verification algorithm to prevent such attacks.