Public-key encryption scheme with optimal continuous leakage resilience

被引:1
|
作者
Zhou, Yanwei [1 ,2 ,5 ,6 ]
Xu, Ran [1 ,5 ]
Zhang, Wenzheng [3 ]
Xia, Zhe [4 ]
Yang, Bo [1 ]
Gu, Chunxiang [5 ]
Huang, Meijuan [7 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing, Peoples R China
[3] Sci & Technol Commun Secur Lab, Chengdu, Peoples R China
[4] Wuhan Univ Technol, Sch Comp Sci & Technol, Zhengzhou, Peoples R China
[5] Henan Key Lab Network Cryptog Technol, Zhengzhou, Peoples R China
[6] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
[7] Baoji Univ Arts & Sci, Sch Math & Informat Sci, Baoji, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Public-key encryption; Continuous leakage resilience; Chosen-ciphertext attacks; SIGNCRYPTION SCHEME; SECURE;
D O I
10.1016/j.ipl.2022.106318
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In real-world applications, adversaries can launch leakage attacks, such as side-channel attacks, to obtain some information of the secret states (e.g. secret key, random value, etc.) in cryptographic protocols, compromising their security. Moreover, adversaries can obtain more leakage information by performing leakage attacks continuously, and the leakage attacks can be performed at any time by the adversary. Therefore, when designing public-key encryption (PKE) schemes, one should consider the continuous leakage setting. And it is desirable that the designed schemes can resist the leakage attacks. In this paper, to achieve better continuous leakage resilience, a novel construction of continuous leakage-resilient PKE scheme is proposed. The chosen-ciphertext attacks security of our proposed scheme can be proved based on the hardness of the decisional Diffie-Hellman assumption. Our construction tolerates a large key leakage rate, which is one of the best among existing PKE schemes. Moreover, the level of leakage resilience can be adjusted based on the specific requirements in real-world applications. The analyses demonstrate that our proposal also enjoys low computational overheads, outperforming the existing leakage-resilient PKE schemes.(c) 2022 Published by Elsevier B.V.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Li, Tong
    Kong, Fanyu
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (06): : 3099 - 3122
  • [2] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
    Chengyu Hu
    Rupeng Yang
    Pengtao Liu
    Tong Li
    Fanyu Kong
    The Journal of Supercomputing, 2019, 75 : 3099 - 3122
  • [3] Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security
    Zhou, Yanwei
    Yang, Bo
    COMPUTER JOURNAL, 2017, 60 (08): : 1161 - 1172
  • [4] Novel Public-Key Encryption with Continuous Leakage Amplification
    Qiao, Zirui
    Yang, Qiliang
    Zhou, Yanwei
    Xia, Zhe
    Zhang, Mingwu
    COMPUTER JOURNAL, 2021, 64 (08): : 1163 - 1177
  • [5] Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience
    Qin, Baodong
    Liu, Shengli
    Chen, Kefei
    IET INFORMATION SECURITY, 2015, 9 (01) : 32 - 42
  • [6] Continuous Leakage-Amplified Public-Key Encryption With CCA Security
    Zhang, Wenzheng
    Qiao, Zirui
    Yang, Bo
    Zhou, Yanwei
    Zhang, Mingwu
    COMPUTER JOURNAL, 2022, 65 (07): : 1760 - 1775
  • [7] A New Public-Key Encryption Scheme
    Hai-Bo Tian
    Xi Sun
    Yu-Min Wang
    Journal of Computer Science and Technology, 2007, 22 : 95 - 102
  • [8] A new public-key encryption scheme
    Tian, Hai-Bo
    Sun, Xi
    Wang, Yu-Min
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 95 - 102
  • [9] Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs
    Manh Ha Nguyen
    Yasunaga, Kenji
    Tanaka, Keisuke
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (06) : 1100 - 1111
  • [10] Post-challenge leakage in public-key encryption
    Zhang, Zongyang
    Chow, Sherman S. M.
    Cao, Zhenfu
    THEORETICAL COMPUTER SCIENCE, 2015, 572 : 25 - 49