Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme

被引:1
|
作者
Tsai, Tung-Tso [1 ]
Tseng, Yuh-Min [2 ]
Huang, Sen-Shan [2 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung, Taiwan
[2] Natl Changhua Univ Educ, Dept Math, Changhua, Taiwan
关键词
Leakage-resilient; side-channel attacks; certificate-based; anonymity; multi-receiver; IDENTITY-BASED ENCRYPTION; SECURE;
D O I
10.1109/ACCESS.2023.3280056
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key encapsulation schemes in public key system (PKS) can be used to protect sensitive or private data. Unlike traditional PKS and identity-based PKS, certificate-based PKS (CB-PKS) not only avoids the establishment of complex public key infrastructures, but also does not encounter the key escrow problem. Anonymous multi-receiver certificate-based encryption (AMR-CBE) or anonymous multi-receiver certificate-based key encapsulation (AMR-CB-KE) scheme enables a sender to use multiple receivers' public keys to perform one-time encryption process for a message and send the encrypted ciphertext to these receivers, while these receivers do not know the other receiver's identity. However, the existing AMR-CBE and AMR-CB-KE schemes cannot resist side-channel attacks. Attackers with the ability of such attacks can continuously obtain part (several bits) of the secret keys and then calculate the complete secret keys. In such a case, such attacks make a cryptographic scheme (including AMR-CBE and AMR-CB-KE schemes) insecure. Leakage-resilient cryptography is an important research topic to resist side-channel attacks. In this paper, we propose the first leakage-resilient anonymous multi-receiver certificate-based key encapsulation (LR-AMR-CB-KE) scheme. Based on the discrete logarithm and hash function assumptions, we demonstrate the scheme has the indistinguishability of two ciphertexts against chosen ciphertext attacks (IND-CCA) and the anonymous indistinguishability of two identities against chosen ciphertext attacks (ANON-IND-CCA) for two types of attackers in CB-PKS settings.
引用
收藏
页码:51617 / 51630
页数:14
相关论文
共 50 条
  • [31] PUF-Based Multi-Receiver Anonymous Signcryption Scheme in Edge Computing
    Li, Sen-Sen
    Liu, Yan-Jiang
    Yu, Bin
    Li, Jun-Quan
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2024, 52 (12): : 4087 - 4100
  • [32] Leakage-Resilient Signature Scheme Based on BLS Signature
    Wang Zhiwei
    CHINA COMMUNICATIONS, 2011, 8 (03) : 212 - 215
  • [33] Leakage-resilient verifiable multi-secret sharing scheme
    Shen H.
    Chen M.-W.
    Zhang M.-W.
    Beijing Youdian Daxue Xuebao, 1 (87-91): : 87 - 91
  • [34] Continuous Leakage-resilient Broadcast Key-encapsulation Mechanism with CCA Security
    Qiao Z.-R.
    Yang Q.-L.
    Zhou Y.-W.
    Yang B.
    Xia Z.
    Zhang M.-W.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (02): : 818 - 832
  • [35] Leakage-resilient identity-based encryption scheme
    Li, Sujuan
    Zhang, Futai
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 187 - 196
  • [36] Security Analysis of a Multi-Receiver Identity-Based Key Encapsulation Mechanism
    Park, Jong Hwan
    Lee, Dong Hoon
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (01) : 329 - 331
  • [37] Certificate-Based Anonymous Device Access Control Scheme for IoT Environment
    Malani, Saurav
    Srinivas, Jangirala
    Das, Ashok Kumar
    Srinathan, Kannan
    Jo, Minho
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 9762 - 9773
  • [38] An efficient multi-receiver certificate less digital multisignature scheme with anonymity
    Sarvesh Tanwar
    Anil Kumar
    CSI Transactions on ICT, 2020, 8 (3) : 311 - 318
  • [39] Efficient and Anonymous Certificateless Multi-Message and Multi-Receiver Signcryption Scheme Based on ECC
    Pang, Liaojun
    Wei, Mengmeng
    Li, Huixian
    IEEE ACCESS, 2019, 7 : 24511 - 24526
  • [40] Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Secure Channel
    Pang, Liaojun
    Kou, Man
    Wei, Mengmeng
    Li, Huixian
    IEEE ACCESS, 2019, 7 : 84091 - 84106