Continuous Leakage-Resilient Identity-Based Encryption Scheme with CCA Security

被引:1
|
作者
Zhou Yanwei [1 ,2 ,3 ]
Yang Bo [1 ,2 ,3 ]
机构
[1] Shaanxi Normal Univ, Engn Lab Teaching Informat Technol Shaanxi Prov, Xian 710119, Shaanxi, Peoples R China
[2] Shaanxi Normal Univ, Sch Comp Sci, Xian 710119, Shaanxi, Peoples R China
[3] Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Continuous leakage-resilience; Identity based encryption; CCA security; Standard model; PUBLIC-KEY ENCRYPTION;
D O I
10.1049/cje.2019.04.004
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Leakage of private information including private key has become a threat to the security of computing systems. It has become a common security requirement that a cryptographic scheme should withstand various leakage attacks, including continuous leakage attacks. In order to obtain an Identity-based encryption (IBE) scheme which can keep its original security in the continuous leakage setting, we propose a new construction method of IBE scheme with Chosen-ciphertext attacks (CCA) security, which can tolerate continuous leakage attacks on many private keys of each identity, and whose security is proved based on the hardness of the classical Decisional bilinear Diffie-Hellman (DBDH) assumption in the standard model. The leakage parameter is independent of the plaintext space and has the constant size.
引用
收藏
页码:682 / 689
页数:8
相关论文
共 50 条
  • [1] Continuous Leakage-Resilient Identity-Based Encryption Scheme with CCA Security
    ZHOU Yanwei
    YANG Bo
    [J]. Chinese Journal of Electronics, 2019, 28 (04) : 682 - 689
  • [2] A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme
    Li, Jiguo
    Teng, Meilin
    Zhang, Yichen
    Yu, Qihong
    [J]. COMPUTER JOURNAL, 2016, 59 (07): : 1066 - 1075
  • [3] Practical continuous leakage-resilient CCA secure identity-based encryption
    Zhou, Yanwei
    Yang, Bo
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2020, 14 (04)
  • [4] Practical continuous leakage-resilient CCA secure identity-based encryption
    Yanwei Zhou
    Bo Yang
    [J]. Frontiers of Computer Science, 2020, 14
  • [5] Continuous Leakage-Resilient Identity-Based Encryption with Tight Security
    Zhou, Yanwei
    Yang, Bo
    Hou, Hongxia
    Zhang, Lina
    Wang, Tao
    Hu, Mingxiao
    [J]. COMPUTER JOURNAL, 2019, 62 (08): : 1092 - 1105
  • [6] Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption
    Zhou, Yanwei
    Wang, Zhaolong
    Qiao, Zirui
    Wang, Ying
    Yang, Bo
    Mu, Yi
    Zhang, Mingwu
    [J]. COMPUTER JOURNAL, 2023, 66 (04): : 924 - 940
  • [7] Leakage-resilient identity-based encryption scheme
    Li, Sujuan
    Zhang, Futai
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 187 - 196
  • [8] Continuous leakage-resilient identity-based encryption with leakage amplification
    Yanwei Zhou
    Bo Yang
    Yi Mu
    [J]. Designs, Codes and Cryptography, 2019, 87 : 2061 - 2090
  • [9] Continuous leakage-resilient identity-based encryption with leakage amplification
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (09) : 2061 - 2090
  • [10] Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security
    Zhou, Yanwei
    Yang, Bo
    [J]. COMPUTER JOURNAL, 2017, 60 (08): : 1161 - 1172