Public-key encryption scheme with optimal continuous leakage resilience

被引:1
|
作者
Zhou, Yanwei [1 ,2 ,5 ,6 ]
Xu, Ran [1 ,5 ]
Zhang, Wenzheng [3 ]
Xia, Zhe [4 ]
Yang, Bo [1 ]
Gu, Chunxiang [5 ]
Huang, Meijuan [7 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing, Peoples R China
[3] Sci & Technol Commun Secur Lab, Chengdu, Peoples R China
[4] Wuhan Univ Technol, Sch Comp Sci & Technol, Zhengzhou, Peoples R China
[5] Henan Key Lab Network Cryptog Technol, Zhengzhou, Peoples R China
[6] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
[7] Baoji Univ Arts & Sci, Sch Math & Informat Sci, Baoji, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Public-key encryption; Continuous leakage resilience; Chosen-ciphertext attacks; SIGNCRYPTION SCHEME; SECURE;
D O I
10.1016/j.ipl.2022.106318
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In real-world applications, adversaries can launch leakage attacks, such as side-channel attacks, to obtain some information of the secret states (e.g. secret key, random value, etc.) in cryptographic protocols, compromising their security. Moreover, adversaries can obtain more leakage information by performing leakage attacks continuously, and the leakage attacks can be performed at any time by the adversary. Therefore, when designing public-key encryption (PKE) schemes, one should consider the continuous leakage setting. And it is desirable that the designed schemes can resist the leakage attacks. In this paper, to achieve better continuous leakage resilience, a novel construction of continuous leakage-resilient PKE scheme is proposed. The chosen-ciphertext attacks security of our proposed scheme can be proved based on the hardness of the decisional Diffie-Hellman assumption. Our construction tolerates a large key leakage rate, which is one of the best among existing PKE schemes. Moreover, the level of leakage resilience can be adjusted based on the specific requirements in real-world applications. The analyses demonstrate that our proposal also enjoys low computational overheads, outperforming the existing leakage-resilient PKE schemes.(c) 2022 Published by Elsevier B.V.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] PUBLIC-KEY ENCRYPTION
    STUBBS, E
    EDN MAGAZINE-ELECTRICAL DESIGN NEWS, 1984, 29 (04): : 29 - 29
  • [22] CCA2 secure public-key encryption scheme tolerating continual leakage attacks
    Zhou, YanWei
    Yang, Bo
    Zhang, Wenzheng
    Mu, Yi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4505 - 4519
  • [23] Leakage-Resilient Public-Key Encryption from Obfuscation
    Dachman-Soled, Dana
    Gordon, S. Dov
    Liu, Feng-Hao
    O'Neill, Adam
    Zhou, Hong-Sheng
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 101 - 128
  • [24] Continual Leakage-Resilient Hedged Public-Key Encryption
    Huang, Meijuan
    Yang, Bo
    Zhou, Yanwei
    Hu, Xuewei
    COMPUTER JOURNAL, 2022, 65 (06): : 1574 - 1585
  • [25] Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
    Faonio, Antonio
    Venturi, Daniele
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 877 - 907
  • [26] More Efficient Public-Key Cryptography with Leakage and Tamper Resilience
    Han, Shuai
    Liu, Shengli
    Gu, Dawu
    PUBLIC-KEY CRYPTOGRAPHY, PT IV, PKC 2024, 2024, 14604 : 3 - 34
  • [27] Optimal-resilience proactive public-key cryptosystems
    Frankel, Y
    Gemmell, P
    MacKenzie, PD
    Yung, MT
    38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, : 384 - 393
  • [28] Secure public-key encryption scheme without random oracles
    Tan, Chik How
    INFORMATION SCIENCES, 2008, 178 (17) : 3435 - 3442
  • [29] A public-key encryption scheme with pseudo-random ciphertexts
    Möller, B
    COMPUTER SECURITY ESORICS 2004, PROCEEDINGS, 2004, 3193 : 335 - 351
  • [30] Efficient certificate-based public-key encryption scheme
    Information Security and National Grid Computing Laboratory, Southwest Jiaotong University, Chengdu 610031, China
    Tien Tzu Hsueh Pao, 2008, 10 (2055-2059): : 2055 - 2059