Public key encryption resilient to leakage and tampering attacks

被引:2
|
作者
Sun, Shi-Feng [1 ,2 ]
Gu, Dawu [1 ]
Parampalli, Udaya [2 ]
Yu, Yu [1 ]
Qin, Baodong [3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Univ Melbourne, Dept Comp & Informat Syst, Melbourne, Vic 3010, Australia
[3] Southwest Univ Sci & Technol, Sch Comp Sci & Technol, Mianyang 250100, Peoples R China
关键词
Public key encryption; Hash proof system; Chosen-ciphertext security; Key-leakage attack; Tampering attack; CRYPTOGRAPHY; SECURITY;
D O I
10.1016/j.jcss.2017.03.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we investigate how to protect public key encryption from both key-leakage attacks and tampering attacks. First, we formalize the notions of chosen ciphertext (CCA) security against key-leakage and tampering attacks. To this goal, we then introduce the concept of key-homomorphic hash proof systems and present a generic construction of public key encryption based on this new primitive. Our construction, compared with previous works, realizes leakage-resilience and tampering-resilience simultaneously but completely independently, so it can tolerate a larger amount of bounded-memory leakage and be instantiated with more flexibility. Moreover, it allows for an unbounded number of affine-tampering queries, even after the challenge phase. With slight adaptations, our construction also achieves CCA security against subexponentially hard auxiliary-input leakage attacks and a polynomial of affine-tampering attacks. Thus, to the best of our knowledge, we get the first public key encryption scheme secure against both auxiliary input leakage attacks and tampering attacks. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:142 / 156
页数:15
相关论文
共 50 条
  • [1] Leakage-Resilient Public Key Encryption with Equality Test Resistant to Side-channel Attacks
    Tsai, Tung-tso
    Lin, Han-yu
    Chen, Yu-chi
    Chen, Yuan-chin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2025, 41 (01) : 155 - 176
  • [2] Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
    Fujisaki, Eiichiro
    Xagawa, Keita
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 908 - 938
  • [3] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
    Chengyu Hu
    Rupeng Yang
    Pengtao Liu
    Tong Li
    Fanyu Kong
    The Journal of Supercomputing, 2019, 75 : 3099 - 3122
  • [4] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Li, Tong
    Kong, Fanyu
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (06): : 3099 - 3122
  • [5] Public-Key Encryption Resilient to Linear Related-Key Attacks
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 182 - 196
  • [6] Continual Leakage-Resilient Hedged Public-Key Encryption
    Huang, Meijuan
    Yang, Bo
    Zhou, Yanwei
    Hu, Xuewei
    COMPUTER JOURNAL, 2022, 65 (06): : 1574 - 1585
  • [7] Leakage-Resilient Public-Key Encryption from Obfuscation
    Dachman-Soled, Dana
    Gordon, S. Dov
    Liu, Feng-Hao
    O'Neill, Adam
    Zhou, Hong-Sheng
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 101 - 128
  • [8] Efficient leakage-resilient public key encryption from DDH assumption
    Sujuan Li
    Futai Zhang
    Yinxia Sun
    Limin Shen
    Cluster Computing, 2013, 16 : 797 - 806
  • [9] New leakage-resilient CCA-secure public key encryption
    Kurosawa, Kaoru
    Nojima, Ryo
    Phong, Le Trieu
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2013, 7 (04) : 297 - 312
  • [10] Efficient leakage-resilient public key encryption from DDH assumption
    Li, Sujuan
    Zhang, Futai
    Sun, Yinxia
    Shen, Limin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 797 - 806