Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs

被引:12
|
作者
Hu, Chengyu [1 ]
Liu, Pengtao [2 ]
Guo, Shanqing [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Peoples R China
[2] Shandong Univ Polit Sci & Law, Sch Informat, Jinan 250014, Peoples R China
基金
中国国家自然科学基金;
关键词
Public-key encryption; Related-key security; Extractable hash proofs; Leakage resilience; ATTRIBUTE-BASED ENCRYPTION; CRYPTOGRAPHY; RESILIENT;
D O I
10.1007/s12652-015-0329-0
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Public-key encryption (PKE) can be used in cloud system to protect data in data sharing, identity authentication, etc. However, the security model of traditional PKE does not capture the "key-leakage attacks" which can leak partial information about the secret key. Also, the adversary can inject fault to tamper with the secret key and observe the output of the public key encryption scheme under this modified key which is called "related-key attack". In this paper, we present a method to construct public key encryption schemes secure against both weak key-leakage attacks and affine related-key attacks directly from extractable hash proof systems. Specifically, we first add Key Homomorphism and Fingerprinting properties to all-but-one (ABO) extractable hash proofs and construct a key encapsulation mechanism scheme secure against related-key attacks via it and thus public key encryption scheme secure against related-key attacks. Also, we prove that if the based ABO-extractable hash proof with Key Homomorphism and Fingerprinting properties is weak leakage-resilient, then the key encapsulation mechanism scheme constructed from it is weak leakage-resilient and related-key attack secure. Moreover, we propose a public key encryption scheme secure against affine related-key attacks based on lattice.
引用
收藏
页码:681 / 692
页数:12
相关论文
共 50 条
  • [1] Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs
    Chengyu Hu
    Pengtao Liu
    Shanqing Guo
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2016, 7 : 681 - 692
  • [2] Tightly Secure Encryption Schemes against Related-Key Attacks
    Han, Shuai
    Liu, Shengli
    Lyu, Lin
    Gu, Dawu
    [J]. COMPUTER JOURNAL, 2018, 61 (12): : 1825 - 1844
  • [3] Ciphers secure against related-key attacks
    Lucks, S
    [J]. FAST SOFTWARE ENCRYPTION, 2004, 3017 : 359 - 370
  • [4] Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 268 - 275
  • [5] Public Key Encryption against Related Key Attacks
    Wee, Hoeteck
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 262 - 279
  • [6] Public-Key Encryption Resilient to Linear Related-Key Attacks
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 182 - 196
  • [7] Signcryption Secure Against Linear Related-Key Attacks
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    [J]. COMPUTER JOURNAL, 2014, 57 (10): : 1472 - 1483
  • [8] Cryptography Secure against Related-Key Attacks and Tampering
    Bellare, Mihir
    Cash, David
    Miller, Rachel
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 486 - +
  • [9] Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks
    Boehl, Florian
    Davies, Gareth T.
    Hofheinz, Dennis
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 483 - 500
  • [10] ON THE RELATED-KEY ATTACKS AGAINST AES
    Daemen, Joan
    Rijmen, Vincent
    [J]. PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2012, 13 (04): : 395 - 400