Side-Channel Analysis for Searchable Encryption System and Its Security Evaluation
Title | Side-Channel Analysis for Searchable Encryption System and Its Security Evaluation |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Yoshikawa, Masaya, Nozaki, Yusuke |
Conference Name | 2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC) |
Date Published | aug |
ISBN Number | 978-1-7281-1664-8 |
Keywords | artificial intelligence, Big Data, Ciphers, cryptography, embedded searchable encryption, Encryption, Hamming distance, Human Behavior, human factors, illegal attacks, Immune system, Indexes, medical computing, Medical services, Metrics, power analysis, Power demand, pubcrawl, Scalability, Searchable encryption, searchable encryption system, security evaluation, side channel attack, side-channel analysis, Tamper resistance |
Abstract | Searchable encryption will become more important as medical services intensify their use of big data and artificial intelligence. To use searchable encryption safely, the resistance of terminals with embedded searchable encryption to illegal attacks (tamper resistance) is extremely important. This study proposes a searchable encryption system embedded in terminals and evaluate the tamper resistance of the proposed system. This study also proposes attack scenarios and quantitatively evaluates the tamper resistance of the proposed system by performing experiments following the proposed attack scenarios. |
URL | https://ieeexplore.ieee.org/document/8919531 |
DOI | 10.1109/CSE/EUC.2019.00092 |
Citation Key | yoshikawa_side-channel_2019 |
- Indexes
- Tamper resistance
- side-channel analysis
- side channel attack
- Security Evaluation
- searchable encryption system
- Scalability
- pubcrawl
- Power demand
- power analysis
- Metrics
- Medical services
- medical computing
- searchable encryption
- Immune system
- illegal attacks
- Human Factors
- Human behavior
- Hamming distance
- encryption
- embedded searchable encryption
- Cryptography
- Ciphers
- Big Data
- Artificial Intelligence