Continuous Leakage-Resilient Identity-Based Encryption Scheme with CCA Security

被引:1
|
作者
Zhou Yanwei [1 ,2 ,3 ]
Yang Bo [1 ,2 ,3 ]
机构
[1] Shaanxi Normal Univ, Engn Lab Teaching Informat Technol Shaanxi Prov, Xian 710119, Shaanxi, Peoples R China
[2] Shaanxi Normal Univ, Sch Comp Sci, Xian 710119, Shaanxi, Peoples R China
[3] Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Continuous leakage-resilience; Identity based encryption; CCA security; Standard model; PUBLIC-KEY ENCRYPTION;
D O I
10.1049/cje.2019.04.004
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Leakage of private information including private key has become a threat to the security of computing systems. It has become a common security requirement that a cryptographic scheme should withstand various leakage attacks, including continuous leakage attacks. In order to obtain an Identity-based encryption (IBE) scheme which can keep its original security in the continuous leakage setting, we propose a new construction method of IBE scheme with Chosen-ciphertext attacks (CCA) security, which can tolerate continuous leakage attacks on many private keys of each identity, and whose security is proved based on the hardness of the classical Decisional bilinear Diffie-Hellman (DBDH) assumption in the standard model. The leakage parameter is independent of the plaintext space and has the constant size.
引用
收藏
页码:682 / 689
页数:8
相关论文
共 50 条
  • [41] Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
    Kraemer, Juliane
    Struck, Patrick
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 315 - 337
  • [42] CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not q-type) Assumptions
    Tomita, Toi
    Ogata, Wakaha
    Kurosawa, Kaoru
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2019, 2019, 11689 : 3 - 22
  • [43] SECURITY ANALYSIS OF A FUZZY IDENTITY-BASED ENCRYPTION SCHEME
    Tian, Miaomiao
    Huang, Liusheng
    Yang, Wei
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2014, 23 (03)
  • [44] Identity-Based Encryption Resilient to Continual Leakage Without Random Oracles
    Guo, Yuyan
    Jiang, Mingming
    Wei, Shimin
    Xie, Ming
    Sun, Mei
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 53 - 64
  • [45] Revocable Identity-Based Encryption Scheme with Leakage-Resilience
    Zhou, Yan-Wei
    Yang, Bo
    Xia, Zhe
    Lai, Qi-Qi
    Zhang, Ming-Wu
    Mu, Yi
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (08): : 1534 - 1554
  • [46] Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage
    Li, Jiguo
    Guo, Yuyan
    Yu, Qihong
    Lu, Yang
    Zhang, Yichen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (10) : 1016 - 1024
  • [47] Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security
    Fan, Chun-I
    Tseng, Yi-Fan
    [J]. SYMMETRY-BASEL, 2015, 7 (04): : 1856 - 1881
  • [48] Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes
    Qi-Qi Lai
    Bo Yang
    Yong Yu
    Zhe Xia
    Yan-Wei Zhou
    Yuan Chen
    [J]. Journal of Computer Science and Technology, 2018, 33 : 1243 - 1260
  • [49] Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes
    Lai, Qi-Qi
    Yang, Bo
    Yu, Yong
    Xia, Zhe
    Zhou, Yan-Wei
    Chen, Yuan
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2018, 33 (06) : 1243 - 1260
  • [50] Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing
    Zhou, Yanwei
    Yang, Bo
    [J]. INFORMATION PROCESSING LETTERS, 2018, 130 : 16 - 24