Continuous Leakage-Resilient Identity-Based Encryption Scheme with CCA Security

被引:0
|
作者
ZHOU Yanwei [1 ,2 ,3 ]
YANG Bo [1 ,2 ,3 ]
机构
[1] Engineering Laboratory of Teaching Information Technology of Shaanxi Province, Shaanxi Normal University
[2] School of Computer Science, Shaanxi Normal University
[3] State Key Laboratory of Information Security, Institute of Information Engineering
基金
中央高校基本科研业务费专项资金资助; 中国国家自然科学基金; 国家重点研发计划;
关键词
Continuous leakage-resilience; Identity based encryption; CCA security; Standard model;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
Leakage of private information including private key has become a threat to the security of computing systems. It has become a common security requirement that a cryptographic scheme should withstand various leakage attacks, including continuous leakage attacks. In order to obtain an Identity-based encryption(IBE) scheme which can keep its original security in the continuous leakage setting, we propose a new construction method of IBE scheme with Chosen-ciphertext attacks(CCA) security, which can tolerate continuous leakage attacks on many private keys of each identity, and whose security is proved based on the hardness of the classical Decisional bilinear Diffie-Hellman(DBDH) assumption in the standard model. The leakage parameter is independent of the plaintext space and has the constant size.
引用
收藏
页码:682 / 689
页数:8
相关论文
共 50 条
  • [31] Leakage-resilient identity-based cryptography from minimal assumptions
    Zhou, Yanwei
    Yang, Bo
    Qiao, Zirui
    Xia, Zhe
    Zhang, Mingwu
    Mu, Yi
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (11) : 3757 - 3801
  • [32] Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings
    Zhou, Yanwei
    Yang, Bo
    Wang, Tao
    Xia, Zhe
    Hou, Hongxia
    [J]. COMPUTER JOURNAL, 2020, 63 (04): : 508 - 524
  • [33] Identity-Based Encryption Resilient to Continual Auxiliary Leakage
    Yuen, Tsz Hon
    Chow, Sherman S. M.
    Zhang, Ye
    Yiu, Siu Ming
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 117 - 134
  • [34] New leakage-resilient CCA-secure public key encryption
    Kurosawa, Kaoru
    Nojima, Ryo
    Phong, Le Trieu
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2013, 7 (04) : 297 - 312
  • [35] Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments
    Tseng, Yuh-Min
    Wu, Jui-Di
    Hung, Ruo-Wei
    Chien, Hung-Yu
    [J]. 2018 9TH INTERNATIONAL CONFERENCE ON AWARENESS SCIENCE AND TECHNOLOGY (ICAST), 2018, : 251 - 256
  • [36] CCA-Secure Deterministic Identity-Based Encryption Scheme
    Huang, Meijuan
    Yang, Bo
    Zhao, Yi
    Liang, Kaitai
    Xue, Liang
    Yang, Xiaoyi
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (03) : 245 - 269
  • [37] Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Tsai, Tung-Tso
    [J]. INFORMATICA, 2020, 31 (03) : 597 - 620
  • [38] Identity-based broadcast encryption with continuous leakage resilience
    Li, Jiguo
    Yu, Qihong
    Zhang, Yichen
    [J]. INFORMATION SCIENCES, 2018, 429 : 177 - 193
  • [39] After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange
    Ruan, Ou
    Zhang, Yuanyuan
    Zhang, Mingwu
    Zhou, Jing
    Harn, Lein
    [J]. IEEE SYSTEMS JOURNAL, 2018, 12 (02): : 2017 - 2026
  • [40] Leakage-resilient certificate-based encryption
    Yu, Qihong
    Li, Jiguo
    Zhang, Yichen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3346 - 3355