Leakage-Resilient Certificateless Signcryption Scheme Under a Continual Leakage Model

被引:1
|
作者
Tsai, Tung-Tso [1 ]
Tseng, Yuh-Min [2 ]
Huang, Sen-Shan [2 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
[2] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
关键词
Leakage-resilience; side-channel attacks; certificateless; signcryption; SECURE; ENCRYPTION; SIGNATURE;
D O I
10.1109/ACCESS.2023.3281612
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Signature can be used to verify the integrity of both a message and the identity of a signer, whereas encryption can be used to ensure the confidentiality of a message. In the past, cryptography researchers have studied and proposed numerous certificateless signcryption (CLSC) schemes to combine the benefits of both signature and encryption. However, these schemes may not be robust enough to withstand side-channel attacks. Through such attacks, an attacker can constantly retrieve a portion of a private key of the system, and could eventually recover the entire private key. Leakage-resilient certificateless signcryption (LR-CLSC) can ensure its security when the attacker launches such attacks. As far as we know, the existing LR-CLSC schemes can only guarantee the security under a bounded leakage model, where the portion of the private key that an attacker can obtain through side-channel attacks is limited. In this paper, we propose the $first$ LR-CLSC scheme under a continual leakage model. Also, we demonstrate the proposed scheme is secure for the existential unforgeability and the ciphertexts indistinguishability against attackers with side-channel attacking abilities.
引用
收藏
页码:54448 / 54461
页数:14
相关论文
共 50 条
  • [1] Leakage-resilient Certificateless Signcryption Scheme
    Yang, Qiliang
    Thou, Yanwei
    Yu, Yong
    [J]. 2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
  • [2] Leakage-Resilient Certificateless Signature Under Continual Leakage Model
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (02): : 363 - 386
  • [3] Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Xie, Jia-Yi
    Hung, Ying-Hao
    [J]. IEEE ACCESS, 2022, 10 : 104636 - 104648
  • [4] Provably secure leakage-resilient certificateless hybrid signcryption scheme
    [J]. Yang, Bo (byang@snnu.edu.cn), 2016, Chinese Academy of Sciences (27):
  • [5] Leakage-Resilient Certificateless Key Encapsulation Scheme
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Chou, Wei-Chieh
    [J]. INFORMATICA, 2018, 29 (01) : 125 - 155
  • [6] Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing
    Zhou Yanwei
    Yang Bo
    Zhang Wenzheng
    [J]. DISCRETE APPLIED MATHEMATICS, 2016, 204 : 185 - 202
  • [7] Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Tsai, Tung-Tso
    [J]. IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2020, 1 (01): : 131 - 144
  • [8] A New Leakage-Resilient IBE Scheme in the Relative Leakage Model
    Chen, Yu
    Luo, Song
    Chen, Zhong
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 263 - 270
  • [9] Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. IEEE ACCESS, 2018, 6 : 17130 - 17142
  • [10] Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    Huang, Sen-Shan
    [J]. INFORMATICA, 2023, 34 (01) : 199 - 222