Cryptoanalysis of an Authenticated Data Structure Scheme With Public Privacy-Preserving Auditing

Shiyu Li,Yuan Zhang,Chunxiang Xu,Kefei Chen
DOI: https://doi.org/10.1109/tifs.2021.3059270
IF: 7.231
2021-01-01
IEEE Transactions on Information Forensics and Security
Abstract:In this letter, we point out that the privacy-preserving adaptive trapdoor hash authentication tree scheme (published in IEEE TIFS, doi: 10.1109/TIFS.2020.2986879) can be invalidated by an adversarial cloud server: if the outsourced data is arbitrarily modified, the cloud server still can pass the third-party auditor's auditing.
computer science, theory & methods,engineering, electrical & electronic
What problem does this paper attempt to address?