Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme

被引:1
|
作者
Tsai, Tung-Tso [1 ]
Tseng, Yuh-Min [2 ]
Huang, Sen-Shan [2 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung, Taiwan
[2] Natl Changhua Univ Educ, Dept Math, Changhua, Taiwan
关键词
Leakage-resilient; side-channel attacks; certificate-based; anonymity; multi-receiver; IDENTITY-BASED ENCRYPTION; SECURE;
D O I
10.1109/ACCESS.2023.3280056
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key encapsulation schemes in public key system (PKS) can be used to protect sensitive or private data. Unlike traditional PKS and identity-based PKS, certificate-based PKS (CB-PKS) not only avoids the establishment of complex public key infrastructures, but also does not encounter the key escrow problem. Anonymous multi-receiver certificate-based encryption (AMR-CBE) or anonymous multi-receiver certificate-based key encapsulation (AMR-CB-KE) scheme enables a sender to use multiple receivers' public keys to perform one-time encryption process for a message and send the encrypted ciphertext to these receivers, while these receivers do not know the other receiver's identity. However, the existing AMR-CBE and AMR-CB-KE schemes cannot resist side-channel attacks. Attackers with the ability of such attacks can continuously obtain part (several bits) of the secret keys and then calculate the complete secret keys. In such a case, such attacks make a cryptographic scheme (including AMR-CBE and AMR-CB-KE schemes) insecure. Leakage-resilient cryptography is an important research topic to resist side-channel attacks. In this paper, we propose the first leakage-resilient anonymous multi-receiver certificate-based key encapsulation (LR-AMR-CB-KE) scheme. Based on the discrete logarithm and hash function assumptions, we demonstrate the scheme has the indistinguishability of two ciphertexts against chosen ciphertext attacks (IND-CCA) and the anonymous indistinguishability of two identities against chosen ciphertext attacks (ANON-IND-CCA) for two types of attackers in CB-PKS settings.
引用
收藏
页码:51617 / 51630
页数:14
相关论文
共 50 条
  • [1] Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Tsai, Tung-Tso
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2020, 1 (01): : 131 - 144
  • [2] Leakage-Resilient Key Encapsulation Mechanism with Anonymity and Multi-Receiver
    Zhou Y.-W.
    Han Y.
    Xu R.
    Wang J.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (12): : 3431 - 3436
  • [3] Anonymous Multi-Receiver Certificate-Based Encryption
    Fan, Chun-, I
    Tsai, Pei-Jen
    Huang, Jheng-Jia
    Chen, Wen-Tsuen
    2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2013, : 19 - 26
  • [4] Leakage-resilient certificate-based encryption
    Yu, Qihong
    Li, Jiguo
    Zhang, Yichen
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3346 - 3355
  • [5] Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments
    Tseng, Yuh-Min
    Wu, Jui-Di
    Hung, Ruo-Wei
    Chien, Hung-Yu
    2018 9TH INTERNATIONAL CONFERENCE ON AWARENESS SCIENCE AND TECHNOLOGY (ICAST), 2018, : 251 - 256
  • [6] Leakage-Resilient Certificate-Based Authenticated Key Exchange Protocol
    Tsai, Tung-Tso
    Huang, Sen-Shan
    Tseng, Yuh-Min
    Chuang, Yun-Hsin
    Hung, Ying-Hao
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2022, 3 : 137 - 148
  • [7] Continuous leakage-resilient certificate-based encryption
    Li, Jiguo
    Guo, Yuyan
    Yu, Qihong
    Lu, Yang
    Zhang, Yichen
    Zhang, Futai
    INFORMATION SCIENCES, 2016, 355 : 1 - 14
  • [8] Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing
    Zhou, Yanwei
    Xu, Yuan
    Qiao, Zirui
    Yang, Bo
    Zhang, Mingwu
    THEORETICAL COMPUTER SCIENCE, 2021, 860 : 1 - 22
  • [9] Leakage-Resilient Certificateless Key Encapsulation Scheme
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Chou, Wei-Chieh
    INFORMATICA, 2018, 29 (01) : 125 - 155
  • [10] Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    Huang, Sen-Shan
    INFORMATICA, 2023, 34 (01) : 199 - 222