Functional Encryption Resilient to Hard-to-Invert Leakage

被引:9
|
作者
Zhang, Mingwu [1 ,2 ]
Wang, Chunzhi [1 ]
Takagi, Tsuyoshi [2 ]
Mu, Yi [3 ]
机构
[1] Hubei Univ Technol, Sch Comp Sci, Wuhan 430068, Peoples R China
[2] Kyushu Univ, Inst Math Ind, Fukuoka 8190395, Japan
[3] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
来源
COMPUTER JOURNAL | 2015年 / 58卷 / 04期
基金
中国国家自然科学基金;
关键词
functional encryption; leakage resilience; hard-to-invert function; minimal set; ATTRIBUTE-BASED ENCRYPTION; CRYPTOGRAPHY;
D O I
10.1093/comjnl/bxt105
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Functional encryption (FE) systems provide a flexible and expressive encryption mechanism that private keys and ciphertexts are associated with attributes (x) over right arrow and predicate formulae Gamma and decryption are possible whenever keys and ciphertexts are related, i.e. Gamma((x) over right arrow) = 1. In this work, we put forward a leakage-resilient FE scheme against the amount of leakage output over a hard-to-invert function family. In our scheme, the encryption policy is specified as an arbitrary monotonic formula, and the adversary can learn the arbitrary length output of the master key and the private key from any computationally irreversible function with the input (master) keys. To improve the efficiency, we employ the set of minimal sets to describe the predicate formula or access structure, and initiate the formal model of leakage-resilient FE, which is a generic extension of identity-based encryption and attribute-based encryption in the presence of key leakage with auxiliary inputs. We provide the concrete construction in bilinear groups of composite order, and prove the adaptively leakage-resilient security in the standard model based on static assumptions. Our hard-to-invert leakage resilience employs the Goldreich-Levin theorem and its extension as a hard-core value over large fields. We also give an extensional construction in the case of obtaining the hard-to-invert randomness leakage of the encryption, which uses a strong extractor to prevent leakage of randomness and a hard-to-invert encryption to prevent the leakage of the key. Finally, we analyze and discuss the stepped-up security on master leakage and continual leakage, and the lower bound of the irreversible leakage function.
引用
收藏
页码:735 / 749
页数:15
相关论文
共 50 条
  • [41] Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments
    Tseng, Yuh-Min
    Wu, Jui-Di
    Hung, Ruo-Wei
    Chien, Hung-Yu
    [J]. 2018 9TH INTERNATIONAL CONFERENCE ON AWARENESS SCIENCE AND TECHNOLOGY (ICAST), 2018, : 251 - 256
  • [42] Efficient leakage-resilient public key encryption from DDH assumption
    Sujuan Li
    Futai Zhang
    Yinxia Sun
    Limin Shen
    [J]. Cluster Computing, 2013, 16 : 797 - 806
  • [43] Identity-Based Encryption Resilient to Continual Leakage Without Random Oracles
    Guo, Yuyan
    Jiang, Mingming
    Wei, Shimin
    Xie, Ming
    Sun, Mei
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 53 - 64
  • [44] Efficient leakage-resilient public key encryption from DDH assumption
    Li, Sujuan
    Zhang, Futai
    Sun, Yinxia
    Shen, Limin
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 797 - 806
  • [45] New leakage-resilient CCA-secure public key encryption
    Kurosawa, Kaoru
    Nojima, Ryo
    Phong, Le Trieu
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2013, 7 (04) : 297 - 312
  • [46] Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding
    Zhang, Yijian
    Ling, Yunhao
    Chen, Jie
    Wang, Luping
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2023, PT II, 2024, 14562 : 113 - 132
  • [47] Continuous Leakage-Resilient Identity-Based Encryption with Tight Security
    Zhou, Yanwei
    Yang, Bo
    Hou, Hongxia
    Zhang, Lina
    Wang, Tao
    Hu, Mingxiao
    [J]. COMPUTER JOURNAL, 2019, 62 (08): : 1092 - 1105
  • [48] Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity
    Zhang, Yinghui
    Yang, Menglei
    Zheng, Dong
    Zhang, Tiantian
    Guo, Rui
    Ren, Fang
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 665 - 681
  • [49] RCB: leakage-resilient authenticated encryption via re-keying
    Agrawal, Megha
    Bansal, Tarun Kumar
    Chang, Donghoon
    Chauhan, Amit Kumar
    Hong, Seokhie
    Kang, Jinkeon
    Sanadhya, Somitra Kumar
    [J]. JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4173 - 4198
  • [50] Continuous leakage-resilient certificateless public key encryption with CCA security
    Zhou, Yanwei
    Yang, Bo
    [J]. KNOWLEDGE-BASED SYSTEMS, 2017, 136 : 27 - 36