Public key encryption resilient to leakage and tampering attacks

被引:2
|
作者
Sun, Shi-Feng [1 ,2 ]
Gu, Dawu [1 ]
Parampalli, Udaya [2 ]
Yu, Yu [1 ]
Qin, Baodong [3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Univ Melbourne, Dept Comp & Informat Syst, Melbourne, Vic 3010, Australia
[3] Southwest Univ Sci & Technol, Sch Comp Sci & Technol, Mianyang 250100, Peoples R China
关键词
Public key encryption; Hash proof system; Chosen-ciphertext security; Key-leakage attack; Tampering attack; CRYPTOGRAPHY; SECURITY;
D O I
10.1016/j.jcss.2017.03.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we investigate how to protect public key encryption from both key-leakage attacks and tampering attacks. First, we formalize the notions of chosen ciphertext (CCA) security against key-leakage and tampering attacks. To this goal, we then introduce the concept of key-homomorphic hash proof systems and present a generic construction of public key encryption based on this new primitive. Our construction, compared with previous works, realizes leakage-resilience and tampering-resilience simultaneously but completely independently, so it can tolerate a larger amount of bounded-memory leakage and be instantiated with more flexibility. Moreover, it allows for an unbounded number of affine-tampering queries, even after the challenge phase. With slight adaptations, our construction also achieves CCA security against subexponentially hard auxiliary-input leakage attacks and a polynomial of affine-tampering attacks. Thus, to the best of our knowledge, we get the first public key encryption scheme secure against both auxiliary input leakage attacks and tampering attacks. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:142 / 156
页数:15
相关论文
共 50 条
  • [21] PUBLIC-KEY CRYPTOSYSTEMS RESILIENT TO KEY LEAKAGE
    Naor, Moni
    Segev, Gil
    SIAM JOURNAL ON COMPUTING, 2012, 41 (04) : 772 - 814
  • [22] Structure-preserving public-key encryption with leakage-resilient CCA security
    Lyu, Lin
    Liu, Shengli
    Gu, Dawu
    THEORETICAL COMPUTER SCIENCE, 2019, 795 : 57 - 80
  • [23] Threshold public key encryption scheme resilient against continual leakage without random oracles
    Zhang, Xiujie
    Xu, Chunxiang
    Zhang, Wenzheng
    Li, Wanpeng
    FRONTIERS OF COMPUTER SCIENCE, 2013, 7 (06) : 955 - 968
  • [24] A leakage-resilient certificateless public key encryption scheme with CCA2 security
    Yan-wei ZHOU
    Bo YANG
    Hao CHENG
    Qing-long WANG
    Frontiers of Information Technology & Electronic Engineering, 2018, 19 (04) : 481 - 493
  • [25] Threshold public key encryption scheme resilient against continual leakage without random oracles
    Xiujie ZHANG
    Chunxiang XU
    Wenzheng ZHANG
    Wanpeng LI
    Frontiers of Computer Science, 2013, 7 (06) : 955 - 968
  • [26] Threshold public key encryption scheme resilient against continual leakage without random oracles
    Xiujie Zhang
    Chunxiang Xu
    Wenzheng Zhang
    Wanpeng Li
    Frontiers of Computer Science, 2013, 7 : 955 - 968
  • [27] Public Key Encryption against Related Key Attacks
    Wee, Hoeteck
    PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 262 - 279
  • [28] Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption
    Hu, Chengyu
    Yu, Zuoxia
    Yang, Rupeng
    Xu, Qiuliang
    Zhou, Yongbin
    Yuan, Qixia
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) : 216 - 229
  • [29] Identity-based encryption resilient to continuous key leakage
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    Wang, Tao
    Wang, Xin
    IET INFORMATION SECURITY, 2019, 13 (05) : 426 - 434
  • [30] Related Randomness Attacks for Public Key Encryption
    Paterson, Kenneth G.
    Schuldt, Jacob C. N.
    Sibborn, Dale L.
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 465 - 482