Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme

被引:1
|
作者
Tsai, Tung-Tso [1 ]
Tseng, Yuh-Min [2 ]
Huang, Sen-Shan [2 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung, Taiwan
[2] Natl Changhua Univ Educ, Dept Math, Changhua, Taiwan
关键词
Leakage-resilient; side-channel attacks; certificate-based; anonymity; multi-receiver; IDENTITY-BASED ENCRYPTION; SECURE;
D O I
10.1109/ACCESS.2023.3280056
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key encapsulation schemes in public key system (PKS) can be used to protect sensitive or private data. Unlike traditional PKS and identity-based PKS, certificate-based PKS (CB-PKS) not only avoids the establishment of complex public key infrastructures, but also does not encounter the key escrow problem. Anonymous multi-receiver certificate-based encryption (AMR-CBE) or anonymous multi-receiver certificate-based key encapsulation (AMR-CB-KE) scheme enables a sender to use multiple receivers' public keys to perform one-time encryption process for a message and send the encrypted ciphertext to these receivers, while these receivers do not know the other receiver's identity. However, the existing AMR-CBE and AMR-CB-KE schemes cannot resist side-channel attacks. Attackers with the ability of such attacks can continuously obtain part (several bits) of the secret keys and then calculate the complete secret keys. In such a case, such attacks make a cryptographic scheme (including AMR-CBE and AMR-CB-KE schemes) insecure. Leakage-resilient cryptography is an important research topic to resist side-channel attacks. In this paper, we propose the first leakage-resilient anonymous multi-receiver certificate-based key encapsulation (LR-AMR-CB-KE) scheme. Based on the discrete logarithm and hash function assumptions, we demonstrate the scheme has the indistinguishability of two ciphertexts against chosen ciphertext attacks (IND-CCA) and the anonymous indistinguishability of two identities against chosen ciphertext attacks (ANON-IND-CCA) for two types of attackers in CB-PKS settings.
引用
收藏
页码:51617 / 51630
页数:14
相关论文
共 50 条
  • [41] Using chaotic maps to construct anonymous multi-receiver scheme based on BAN logic
    Zhu, Hongfeng
    Zhu, Dan
    Zhang, Yan
    Journal of Information Hiding and Multimedia Signal Processing, 2016, 7 (04): : 685 - 696
  • [42] Anonymous Multi-Receiver Public Key Encryption Based on Third Order Linear Sequences
    Chillali, Abdelhakim
    El Fadil, Lhoussain
    2ND INTERNATIONAL CONFERENCE ON APPLIED MATHEMATICS, ICAM'2018, 2019, 2074
  • [43] CALRA: Practical Conditional Anonymous and Leakage-Resilient Authentication Scheme for Vehicular Crowdsensing Communication
    Xiao, Jianru
    Ren, Yilong
    Du, Jiewei
    Zhao, Yanan
    Kumari, Saru
    Alenazi, Mohammed J. F.
    Yu, Haiyang
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2025, 26 (01) : 1273 - 1285
  • [44] Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices
    He, Debiao
    Wang, Huaqun
    Wang, Lina
    Shen, Jian
    Yang, Xianzhao
    SOFT COMPUTING, 2017, 21 (22) : 6801 - 6810
  • [45] Completely Anonymous Certificateless Multi-Receiver Signcryption Scheme with Sender Traceability
    Li, Huixian
    Wu, Chenhao
    Pang, Liaojun
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 71
  • [46] Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices
    Debiao He
    Huaqun Wang
    Lina Wang
    Jian Shen
    Xianzhao Yang
    Soft Computing, 2017, 21 : 6801 - 6810
  • [47] A continuous leakage-resilient CCA secure identity-based key encapsulation mechanism in the standard model
    Qiao, Zirui
    Zhu, Yasi
    Zhou, Yanwei
    Yang, Bo
    JOURNAL OF SYSTEMS ARCHITECTURE, 2025, 162
  • [48] Leakage-Resilient Password-Based Authenticated Key Exchange
    Ruan, Ou
    Zhang, Mingwu
    Chen, Jing
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017, 2017, 10393 : 285 - 296
  • [49] Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security
    Zhou, Yanwei
    Yang, Bo
    COMPUTER JOURNAL, 2017, 60 (08): : 1161 - 1172
  • [50] Efficient certificate-based public-key encryption scheme
    Information Security and National Grid Computing Laboratory, Southwest Jiaotong University, Chengdu 610031, China
    Tien Tzu Hsueh Pao, 2008, 10 (2055-2059): : 2055 - 2059