Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs

被引:12
|
作者
Hu, Chengyu [1 ]
Liu, Pengtao [2 ]
Guo, Shanqing [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Peoples R China
[2] Shandong Univ Polit Sci & Law, Sch Informat, Jinan 250014, Peoples R China
基金
中国国家自然科学基金;
关键词
Public-key encryption; Related-key security; Extractable hash proofs; Leakage resilience; ATTRIBUTE-BASED ENCRYPTION; CRYPTOGRAPHY; RESILIENT;
D O I
10.1007/s12652-015-0329-0
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Public-key encryption (PKE) can be used in cloud system to protect data in data sharing, identity authentication, etc. However, the security model of traditional PKE does not capture the "key-leakage attacks" which can leak partial information about the secret key. Also, the adversary can inject fault to tamper with the secret key and observe the output of the public key encryption scheme under this modified key which is called "related-key attack". In this paper, we present a method to construct public key encryption schemes secure against both weak key-leakage attacks and affine related-key attacks directly from extractable hash proof systems. Specifically, we first add Key Homomorphism and Fingerprinting properties to all-but-one (ABO) extractable hash proofs and construct a key encapsulation mechanism scheme secure against related-key attacks via it and thus public key encryption scheme secure against related-key attacks. Also, we prove that if the based ABO-extractable hash proof with Key Homomorphism and Fingerprinting properties is weak leakage-resilient, then the key encapsulation mechanism scheme constructed from it is weak leakage-resilient and related-key attack secure. Moreover, we propose a public key encryption scheme secure against affine related-key attacks based on lattice.
引用
收藏
页码:681 / 692
页数:12
相关论文
共 50 条
  • [41] Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
    Lixue Sun
    Chunxiang Xu
    Mingwu Zhang
    Kefei Chen
    Hongwei Li
    [J]. Science China Information Sciences, 2018, 61
  • [42] The resistance of PRESENT-80 against related-key differential attacks
    Sareh Emami
    San Ling
    Ivica Nikolić
    Josef Pieprzyk
    Huaxiong Wang
    [J]. Cryptography and Communications, 2014, 6 : 171 - 187
  • [43] The resistance of PRESENT-80 against related-key differential attacks
    Emami, Sareh
    Ling, San
    Nikolic, Ivica
    Pieprzyk, Josef
    Wang, Huaxiong
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2014, 6 (03): : 171 - 187
  • [44] CCA2 secure public-key encryption scheme tolerating continual leakage attacks
    Zhou, YanWei
    Yang, Bo
    Zhang, Wenzheng
    Mu, Yi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4505 - 4519
  • [45] Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks
    Chengyu Hu
    Zhen Li
    Pengtao Liu
    Rupeng Yang
    Shanqing Guo
    Hailong Zhang
    [J]. Mobile Networks and Applications, 2021, 26 : 2490 - 2500
  • [46] Improved public key encryption scheme secure against adaptive chosen-ciphertext attacks
    Chen, Min-Rong
    Zhang, Xi
    He, Kai
    Guan, Chao-Wen
    Liu, Dan
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2013, 36 (06): : 1149 - 1154
  • [47] Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks
    Hu, Chengyu
    Li, Zhen
    Liu, Pengtao
    Yang, Rupeng
    Guo, Shanqing
    Zhang, Hailong
    [J]. MOBILE NETWORKS & APPLICATIONS, 2021, 26 (06): : 2490 - 2500
  • [48] New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model
    Yang, Wenjie
    Weng, Jian
    Zhang, Futai
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 236 - 247
  • [49] CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs
    Zhao, Yi
    Liang, Kaitai
    Yang, Bo
    Chen, Liqun
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [50] Security of Related-Key Differential Attacks on TWINE, Revisited
    Sakamoto, Kosei
    Minematsu, Kazuhiko
    Shibata, Nao
    Shigeri, Maki
    Kubo, Hiroyasu
    Funabiki, Yuki
    Isobe, Takanori
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 212 - 214