Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments

被引:0
|
作者
Tseng, Yuh-Min [1 ]
Wu, Jui-Di [1 ]
Hung, Ruo-Wei [2 ]
Chien, Hung-Yu [3 ]
机构
[1] Natl Changhua Univ Educ, Dept Math, Changhua, Taiwan
[2] Chaoyang Univ Technol, Dept Comput Sci Inform Eng, Taichung, Taiwan
[3] Natl Chi Nan Univ, Dept Inform Management, Tantou, Taiwan
关键词
side-channel attacks; certificate-based encryption; Leakage resilience; Internet of Things; IDENTITY-BASED ENCRYPTION; SIGNATURE SCHEME; SECURE;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Now, Internet of Things (IoT) brings people innovative experiences and applications through connectivity of numerous computing devices. In these applications, computing devices generate and exchange a large number of critical and sensitive data. Typically, these computing devices are putted on some unprotected environments that make them to be attractive attack targets while easily suffering from a new kind of threat, called "side-channel attacks". By side-channel attacks, an adversary could obtain partial information of secret values (or internal states) stored in these devices by observing execution timing or energy consumption. However, most adversary models of previous cryptographic schemes/protocols do not concern with such side-channel attacks. Indeed, leakage-resilient cryptography is a flexible solution for resisting to side-channel attacks. So far, little work focuses on the design of leakage-resilient certificate based encryption (LR-CBE) schemes. In the article, we propose the first LR-CBE scheme resilient to continuous key leakage of user's private keys, system secret key and random values. In the generic bilinear group model, security analysis is given to show that the proposed LR-CBE scheme is provably secure against chosen cipher-text attacks under the continual leakage model. Performance evaluation is made to demonstrate that our scheme is suitable for embedded devices.
引用
收藏
页码:251 / 256
页数:6
相关论文
共 50 条
  • [1] Leakage-resilient certificate-based encryption
    Yu, Qihong
    Li, Jiguo
    Zhang, Yichen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3346 - 3355
  • [2] Continuous leakage-resilient certificate-based encryption
    Li, Jiguo
    Guo, Yuyan
    Yu, Qihong
    Lu, Yang
    Zhang, Yichen
    Zhang, Futai
    [J]. INFORMATION SCIENCES, 2016, 355 : 1 - 14
  • [3] Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings
    Zhou, Yanwei
    Yang, Bo
    Wang, Tao
    Xia, Zhe
    Hou, Hongxia
    [J]. COMPUTER JOURNAL, 2020, 63 (04): : 508 - 524
  • [4] Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Tsai, Tung-Tso
    [J]. IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2020, 1 (01): : 131 - 144
  • [5] Certificate-based encryption resilient to key leakage
    Yu, Qihong
    Li, Jiguo
    Zhang, Yichen
    Wu, Wei
    Huang, Xinyi
    Xiang, Yang
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 116 : 101 - 112
  • [6] Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing
    Zhou, Yanwei
    Xu, Yuan
    Qiao, Zirui
    Yang, Bo
    Zhang, Mingwu
    [J]. THEORETICAL COMPUTER SCIENCE, 2021, 860 : 1 - 22
  • [7] Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    Huang, Sen-Shan
    [J]. INFORMATICA, 2023, 34 (01) : 199 - 222
  • [8] Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. IEEE ACCESS, 2023, 11 : 51617 - 51630
  • [9] Leakage-Resilient Certificate-Based Authenticated Key Exchange Protocol
    Tsai, Tung-Tso
    Huang, Sen-Shan
    Tseng, Yuh-Min
    Chuang, Yun-Hsin
    Hung, Ying-Hao
    [J]. IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2022, 3 : 137 - 148
  • [10] Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model
    Guo, Yuyan
    Li, Jiguo
    Jiang, Mingming
    Yu, Lei
    Wei, Shimin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020