Message-Locked Encryption and Secure Deduplication

VenueCategory
EuroCrypto'13Secure Deduplication

Message-Locked Encryption and Secure Deduplication1. SummaryMotivation of this paperMLE definitionsImplementation and Evaluation2. Strength (Contributions of the paper)3. Weakness (Limitations of the paper)4. Some Insights (Future work)

1. Summary

Motivation of this paper

MLE definitions

image-20210223234507807

Implementation and Evaluation

2. Strength (Contributions of the paper)

  1. Practical contribution ROM security analyses of a natural family of MLE schemes (include deployed schemes).
  2. Theoretical contribution Standard model solution, the connection with deterministic encryption, hash functions.

different trade-offs between assumptions made and the message distributions for which security is proven.

  1. Provide four MLE schemes with different trade-offs between the security and performance.

CE, HCE1, HCE2. RCE

3. Weakness (Limitations of the paper)

4. Some Insights (Future work)

  1. This paper mentions the issue that how to generate the tag?

: , , : , ,

The can offer better performance for the server who can simply read the tag as the second part of the ciphertext rather than needing to compute it by hashing the possibly long ciphertext.

vulnerable to duplicate faking attacks

  1. the length of the key It insists that an MLE scheme have keys that are shorter than the message.
  2. Tag consistency theorem