Public key encryption resilient to leakage and tampering attacks

被引:2
|
作者
Sun, Shi-Feng [1 ,2 ]
Gu, Dawu [1 ]
Parampalli, Udaya [2 ]
Yu, Yu [1 ]
Qin, Baodong [3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Univ Melbourne, Dept Comp & Informat Syst, Melbourne, Vic 3010, Australia
[3] Southwest Univ Sci & Technol, Sch Comp Sci & Technol, Mianyang 250100, Peoples R China
关键词
Public key encryption; Hash proof system; Chosen-ciphertext security; Key-leakage attack; Tampering attack; CRYPTOGRAPHY; SECURITY;
D O I
10.1016/j.jcss.2017.03.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we investigate how to protect public key encryption from both key-leakage attacks and tampering attacks. First, we formalize the notions of chosen ciphertext (CCA) security against key-leakage and tampering attacks. To this goal, we then introduce the concept of key-homomorphic hash proof systems and present a generic construction of public key encryption based on this new primitive. Our construction, compared with previous works, realizes leakage-resilience and tampering-resilience simultaneously but completely independently, so it can tolerate a larger amount of bounded-memory leakage and be instantiated with more flexibility. Moreover, it allows for an unbounded number of affine-tampering queries, even after the challenge phase. With slight adaptations, our construction also achieves CCA security against subexponentially hard auxiliary-input leakage attacks and a polynomial of affine-tampering attacks. Thus, to the best of our knowledge, we get the first public key encryption scheme secure against both auxiliary input leakage attacks and tampering attacks. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:142 / 156
页数:15
相关论文
共 50 条
  • [41] Deterministic Public-Key Encryption Under Continual Leakage
    Koppula, Venkata
    Pandey, Omkant
    Rouselakis, Yannis
    Waters, Brent
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 304 - 323
  • [42] Novel Public-Key Encryption with Continuous Leakage Amplification
    Qiao, Zirui
    Yang, Qiliang
    Zhou, Yanwei
    Xia, Zhe
    Zhang, Mingwu
    COMPUTER JOURNAL, 2021, 64 (08): : 1163 - 1177
  • [43] Post-challenge leakage in public-key encryption
    Zhang, Zongyang
    Chow, Sherman S. M.
    Cao, Zhenfu
    THEORETICAL COMPUTER SCIENCE, 2015, 572 : 25 - 49
  • [44] After-the-Fact Leakage in Public-Key Encryption
    Halevi, Shai
    Lin, Huijia
    THEORY OF CRYPTOGRAPHY, 2011, 6597 : 107 - +
  • [45] Leakage Resilient Fully Homomorphic Encryption
    Berkoff, Alexandra
    Liu, Feng-Hao
    THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 515 - 539
  • [46] Public key cryptosystems secure against memory leakage attacks
    Sun, Shi-Feng
    Han, Shuai
    Gu, Dawu
    Liu, Shengli
    IET INFORMATION SECURITY, 2016, 10 (06) : 403 - 412
  • [47] A generic construction for intrusion-resilient public-key encryption
    Dodis, Y
    Franklin, M
    Katz, J
    Miyaji, A
    Yung, M
    TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 81 - 98
  • [48] Leakage-Resilient Anonymous Multireceiver Certificateless Encryption Resistant to Side-Channel Attacks
    Xie, Jia-Yi
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2674 - 2685
  • [49] Leakage-Resilient Anonymous Heterogeneous Multi-Receiver Hybrid Encryption in Heterogeneous Public-Key System Settings
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    Huang, Sen-Shan
    Ho, Ting-Chieh
    IEEE ACCESS, 2024, 12 : 28155 - 28168
  • [50] Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing
    Zhou, Yanwei
    Yang, Bo
    INFORMATION PROCESSING LETTERS, 2018, 130 : 16 - 24