Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate

被引:27
|
作者
Zhang, Mingwu [1 ,2 ]
Yang, Bo [3 ]
Takagi, Tsuyoshi [2 ]
机构
[1] South China Agr Univ, Sch Informat, Guangzhou 510642, Guangdong, Peoples R China
[2] Kyushu Univ, Inst Math Ind, Fukuoka 8190395, Japan
[3] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
来源
COMPUTER JOURNAL | 2013年 / 56卷 / 04期
基金
中国国家自然科学基金;
关键词
leakage resilience; hidden-vector; functional encryption; attribute-hiding; IDENTITY-BASED ENCRYPTION; DUAL SYSTEM ENCRYPTION; PUBLIC-KEY ENCRYPTION; CRYPTOGRAPHY; HIBE; IBE;
D O I
10.1093/comjnl/bxs133
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recent research shows that many public-key or identity-based encryption schemes are vulnerable to side-channel attacks on the keys by the interaction of an adversary with a physical device. To tolerate the possible key leakage, leakage-resilient cryptography models a class of leakage output by allowing the adversary to be able to specify a computable leakage function and obtaining the partial keys or other possibly internal states from the output of function. In this article, we propose a leakage-resilient hidden-vector encryption (HVE) scheme that supports the predicate operators such as conjunction, disjunction, comparison, range query and subset query, etc. The proposed scheme is leakage-resilient attribute-hiding secure in the sense that the adversary cannot only obtain the tokens of non-match vectors but also learn amount of key information of the vector that matches the challenge vector. To the best of our knowledge, this is the first HVE that supports token-leakage resilience. We prove the security with a series of computationally indistinguishable games that uses the dual system encryption mechanism. We also analyze and discuss the performance of leakage bound parameters and leakage fraction in the practical security level. Finally, we also give an extensive scheme to achieve the security of both attribute-hiding and payload-hiding, and analyze the performance in larger alphabets.
引用
收藏
页码:464 / 477
页数:14
相关论文
共 50 条
  • [1] Bounded leakage-resilient functional encryption with hidden vector predicate
    [J]. Zhang, M. (mwzhang@imi.kyushu-u.ac.jp), 1600, Oxford University Press (56):
  • [2] Leakage-Resilient Functional Encryption via Pair Encodings
    Yu, Zuoxia
    Au, Man Ho
    Xu, Qiuliang
    Yang, Rupeng
    Han, Jinguang
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 443 - 460
  • [3] Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
    Kraemer, Juliane
    Struck, Patrick
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 315 - 337
  • [4] Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
    Zhang, Jie
    Chen, Jie
    Gong, Junqing
    Ge, Aijun
    Ma, Chuangui
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (06) : 1339 - 1366
  • [5] Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
    Jie Zhang
    Jie Chen
    Junqing Gong
    Aijun Ge
    Chuangui Ma
    [J]. Designs, Codes and Cryptography, 2018, 86 : 1339 - 1366
  • [6] Memory leakage-resilient searchable symmetric encryption
    Dai, Shuguang
    Li, Huige
    Zhang, Fangguo
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 76 - 84
  • [7] Constructing Committing and Leakage-Resilient Authenticated Encryption
    Struck, Patrick
    Weishaeupl, Maximiliane
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 497 - 528
  • [8] Leakage-resilient certificate-based encryption
    Yu, Qihong
    Li, Jiguo
    Zhang, Yichen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3346 - 3355
  • [9] Verifiable memory leakage-resilient dynamic searchable encryption
    Guan, Wenhao
    Wang, Yunling
    Wang, Jianfeng
    Fu, Xiaotong
    [J]. JOURNAL OF HIGH SPEED NETWORKS, 2018, 24 (03) : 201 - 217
  • [10] Leakage-resilient identity-based encryption scheme
    Li, Sujuan
    Zhang, Futai
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 187 - 196