Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme

被引:1
|
作者
Tsai, Tung-Tso [1 ]
Tseng, Yuh-Min [2 ]
Huang, Sen-Shan [2 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung, Taiwan
[2] Natl Changhua Univ Educ, Dept Math, Changhua, Taiwan
关键词
Leakage-resilient; side-channel attacks; certificate-based; anonymity; multi-receiver; IDENTITY-BASED ENCRYPTION; SECURE;
D O I
10.1109/ACCESS.2023.3280056
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key encapsulation schemes in public key system (PKS) can be used to protect sensitive or private data. Unlike traditional PKS and identity-based PKS, certificate-based PKS (CB-PKS) not only avoids the establishment of complex public key infrastructures, but also does not encounter the key escrow problem. Anonymous multi-receiver certificate-based encryption (AMR-CBE) or anonymous multi-receiver certificate-based key encapsulation (AMR-CB-KE) scheme enables a sender to use multiple receivers' public keys to perform one-time encryption process for a message and send the encrypted ciphertext to these receivers, while these receivers do not know the other receiver's identity. However, the existing AMR-CBE and AMR-CB-KE schemes cannot resist side-channel attacks. Attackers with the ability of such attacks can continuously obtain part (several bits) of the secret keys and then calculate the complete secret keys. In such a case, such attacks make a cryptographic scheme (including AMR-CBE and AMR-CB-KE schemes) insecure. Leakage-resilient cryptography is an important research topic to resist side-channel attacks. In this paper, we propose the first leakage-resilient anonymous multi-receiver certificate-based key encapsulation (LR-AMR-CB-KE) scheme. Based on the discrete logarithm and hash function assumptions, we demonstrate the scheme has the indistinguishability of two ciphertexts against chosen ciphertext attacks (IND-CCA) and the anonymous indistinguishability of two identities against chosen ciphertext attacks (ANON-IND-CCA) for two types of attackers in CB-PKS settings.
引用
收藏
页码:51617 / 51630
页数:14
相关论文
共 50 条
  • [21] Improved identity based multi-receiver anonymous signcryption scheme
    School of Information Science and Engineering, University of Jinan, Jinan
    250022, China
    不详
    250022, China
    不详
    250101, China
    Tongxin Xuebao, 9 (109-118):
  • [22] An improved anonymous multi-receiver identity-based encryption scheme
    Zhang, Jianhong
    Mao, Jian
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (04) : 645 - 658
  • [23] Efficient certificateless multi-receiver anonymous signcryption scheme
    Qin Y.-L.
    Wu X.-P.
    Hu W.
    1600, Editorial Board of Journal on Communications (37): : 129 - 136
  • [24] Efficient constructions of certificate-based key encapsulation mechanism
    Lu, Yang
    Li, Jiguo
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2014, 8 (2-3) : 96 - 106
  • [25] Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model
    Guo, Yuyan
    Li, Jiguo
    Jiang, Mingming
    Yu, Lei
    Wei, Shimin
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [26] Multi-receiver identity-based key encapsulation with shortened ciphertext
    Chatterjee, Sanjit
    Sarkar, Palash
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 394 - +
  • [27] Certificate-Based Signature Scheme with Continuous Leakage Resilience
    Zhou Y.-W.
    Ma K.
    Qiao Z.-R.
    Yang B.
    Gu C.-X.
    Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (11): : 2363 - 2376
  • [28] Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Xie, Jia-Yi
    Hung, Ying-Hao
    IEEE ACCESS, 2022, 10 : 104636 - 104648
  • [29] An anonymous multi-receiver encryption based on RSA
    Harn, Lein
    Chang, Chin-Chen
    Wu, Hsiao-Ling
    International Journal of Network Security, 2013, 15 (04) : 307 - 312
  • [30] Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme
    Wang, H.
    Zhang, Y.
    Xiong, H.
    Qin, B.
    IET INFORMATION SECURITY, 2012, 6 (01) : 20 - 27