Continuous Leakage-Resilient Identity-Based Encryption Scheme with CCA Security

被引:0
|
作者
ZHOU Yanwei [1 ,2 ,3 ]
YANG Bo [1 ,2 ,3 ]
机构
[1] Engineering Laboratory of Teaching Information Technology of Shaanxi Province, Shaanxi Normal University
[2] School of Computer Science, Shaanxi Normal University
[3] State Key Laboratory of Information Security, Institute of Information Engineering
基金
中央高校基本科研业务费专项资金资助; 中国国家自然科学基金; 国家重点研发计划;
关键词
Continuous leakage-resilience; Identity based encryption; CCA security; Standard model;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
Leakage of private information including private key has become a threat to the security of computing systems. It has become a common security requirement that a cryptographic scheme should withstand various leakage attacks, including continuous leakage attacks. In order to obtain an Identity-based encryption(IBE) scheme which can keep its original security in the continuous leakage setting, we propose a new construction method of IBE scheme with Chosen-ciphertext attacks(CCA) security, which can tolerate continuous leakage attacks on many private keys of each identity, and whose security is proved based on the hardness of the classical Decisional bilinear Diffie-Hellman(DBDH) assumption in the standard model. The leakage parameter is independent of the plaintext space and has the constant size.
引用
收藏
页码:682 / 689
页数:8
相关论文
共 50 条
  • [21] A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption
    Zhou, Yanwei
    Cao, Lei
    Yang, Bo
    Xia, Zhe
    Gu, Chunxiang
    Zhang, Mingwu
    [J]. COMPUTER STANDARDS & INTERFACES, 2023, 83
  • [22] Leakage-resilient Attribute-Based Encryption with CCA2 security
    Zhang, Leyou
    Shang, Yujie
    [J]. International Journal of Network Security, 2019, 21 (05) : 819 - 827
  • [23] Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
    Chow, Sherman S. M.
    Dodis, Yevgeniy
    Rouselakis, Yannis
    Waters, Brent
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 152 - 161
  • [24] Novel generic construction of leakage-resilient PKE scheme with CCA security
    Yanwei Zhou
    Bo Yang
    Zhe Xia
    Mingwu Zhang
    Yi Mu
    [J]. Designs, Codes and Cryptography, 2021, 89 : 1575 - 1614
  • [25] Novel generic construction of leakage-resilient PKE scheme with CCA security
    Zhou, Yanwei
    Yang, Bo
    Xia, Zhe
    Zhang, Mingwu
    Mu, Yi
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (07) : 1575 - 1614
  • [26] Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting
    Cai, Cailing
    Qin, Xianrui
    Yuen, Tsz Hon
    Yiu, Siu Ming
    [J]. ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 42 - 53
  • [27] Continuous leakage-resilient certificate-based encryption
    Li, Jiguo
    Guo, Yuyan
    Yu, Qihong
    Lu, Yang
    Zhang, Yichen
    Zhang, Futai
    [J]. INFORMATION SCIENCES, 2016, 355 : 1 - 14
  • [28] Continuous Leakage-resilient Broadcast Key-encapsulation Mechanism with CCA Security
    Qiao, Zi-Rui
    Yang, Qi-Liang
    Zhou, Yan-Wei
    Yang, Bo
    Xia, Zhe
    Zhang, Ming-Wu
    [J]. Ruan Jian Xue Bao/Journal of Software, 2023, 34 (02): : 818 - 832
  • [29] Structure-preserving public-key encryption with leakage-resilient CCA security
    Lyu, Lin
    Liu, Shengli
    Gu, Dawu
    [J]. THEORETICAL COMPUTER SCIENCE, 2019, 795 : 57 - 80
  • [30] Leakage-resilient identity-based cryptography from minimal assumptions
    Yanwei Zhou
    Bo Yang
    Zirui Qiao
    Zhe Xia
    Mingwu Zhang
    Yi Mu
    [J]. Designs, Codes and Cryptography, 2023, 91 : 3757 - 3801