Continuous leakage-resilient certificateless public key encryption with CCA security

被引:18
|
作者
Zhou, Yanwei [1 ,2 ]
Yang, Bo [1 ,2 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian, Shaanxi, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Certificateless public-key encryption; Continuous leakage-resilience; CCA2; Security; Decisional Diffie-Hellman; SCHEME;
D O I
10.1016/j.knosys.2017.08.019
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, much attention has been focused on designing provably secure cryptographic scheme in the presence of key leakage, and many constructions are proposed by cryptography researchers. However, most of them are researched in the bounded-leakage model, and cannot keep their claimed security in the continuous-leakage setting. It has been a research challenge to achieve the claimed security in continuous leakage setting. Also, for any polynomial time adversary, most of pre-existing constructions cannot ensure that their output is random in the leakage setting, and any adversary can get a certain amount of additional information on the private key from the output of cryptographic scheme. To obtain better performance (e.g., continuous leakage-resilience, etc.), a new construction of CCA2 secure continuous leakage-resilient certificateless public-key encryption scheme is proposed in this paper, and the scheme's security is proved based on the hardness of the classical decisional Diffie-Hellman assumption. According to the results of analysis, we can get that our construction not only tolerates continuous leakage attacks on the private key through periodically update, but also enjoys better performances, such as the round leakage parameter has the constant size, and any polynomial time adversary are unable to get leakage on the private key from the corresponding ciphertext, etc. In particular, the striking advantage of our method is the key leakage ratio, which can achieve 3/4. Because these good performance features, our proposal may have some significant value in the practical applications. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:27 / 36
页数:10
相关论文
共 50 条
  • [31] A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme
    Li, Jiguo
    Teng, Meilin
    Zhang, Yichen
    Yu, Qihong
    [J]. COMPUTER JOURNAL, 2016, 59 (07): : 1066 - 1075
  • [32] Leakage-Resilient Anonymous Multireceiver Certificateless Encryption Resistant to Side-Channel Attacks
    Xie, Jia-Yi
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2674 - 2685
  • [33] Leakage-Resilient Certificateless Signature Under Continual Leakage Model
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (02): : 363 - 386
  • [34] On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes
    Hajiabadi, Mohammad
    Kapron, Bruce M.
    Srinivasan, Venkatesh
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 129 - 158
  • [35] Continuous After-the-Fact Leakage-Resilient Key Exchange
    Alawatugoda, Janaka
    Boyd, Colin
    Stebila, Douglas
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 258 - 273
  • [36] On the Security of a Certificateless Public Key Encryption with Keyword Search
    Wu, Tsu-Yang
    Meng, Chao
    Chen, Chien-Ming
    Wang, King-Hang
    Pan, Jeng-Shyang
    [J]. ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT I, 2018, 81 : 191 - 197
  • [37] On the Security of a Certificateless Searchable Public Key Encryption Scheme
    Wu, Tsu-Yang
    Meng, Fanya
    Chen, Chien-Ming
    Liu, Shuai
    Pan, Jeng-Shyang
    [J]. GENETIC AND EVOLUTIONARY COMPUTING, 2017, 536 : 113 - 119
  • [38] Leakage-Resilient Certificateless Signcryption Scheme Under a Continual Leakage Model
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. IEEE ACCESS, 2023, 11 : 54448 - 54461
  • [39] Memory leakage-resilient searchable symmetric encryption
    Dai, Shuguang
    Li, Huige
    Zhang, Fangguo
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 76 - 84
  • [40] Constructing Committing and Leakage-Resilient Authenticated Encryption
    Struck, Patrick
    Weishaeupl, Maximiliane
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 497 - 528