Continuous leakage-resilient access control for wireless sensor networks

被引:8
|
作者
Zhou, Yanwei [1 ,2 ,3 ]
Yang, Bo [1 ,3 ]
Mu, Yi [2 ]
Xia, Zhe [4 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian, Shaanxi, Peoples R China
[2] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW, Australia
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[4] Wuhan Univ Technol, Sch Comp Sci & Technol, Wuhan, Hubei, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Access control scheme; Certificate-based signcryption; Continuous leakage resilience; Wireless sensor networks; Provable security; PUBLIC-KEY CRYPTOGRAPHY; ENCRYPTION; SECURE;
D O I
10.1016/j.adhoc.2018.07.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An important objective of cryptographic schemes is to withstand various attacks, including leakage attacks. Otherwise, leakage of the secret key may cause serious threats to the security of computer systems. However, leakage attacks have not received adequate attention in the literature. For example, most of the existing security protocols in the wireless sensor networks (WSNs) lack the consideration of leakage attacks. Instead, they are only designed in the traditional security model, in which an adversary is assumed not to obtain any information of the internal secret states. Obviously, this is not ideal because partial information of the secret key may be leaked in practice due to side channel attacks or fault injection attack. In this paper, we propose a new construction of secure continuous leakage-resilient certificate-based signcryption (CBS) scheme with access control without using bilinear pairings, and its security can be proved based on the assumptions that solving the classical decisional Diffie-Hellman problem and discrete logarithm problem is infeasible. We then propose a novel certificate-based access control scheme for the WSNs. The analysis shows that our construction not only achieves high computational efficiency in the continuous leakage setting, but also has superior performance regarding communication efficiency and storage requirement. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:41 / 53
页数:13
相关论文
共 50 条
  • [1] Continuous leakage-resilient IBE in cloud computing
    Xiang, Xinyin
    Zhao, Xingwen
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (10)
  • [2] Towards leakage-resilient fine-grained access control in fog computing
    Yu, Zuoxia
    Au, Man Ho
    Xu, Qiuliang
    Yang, Rupeng
    Han, Jinguang
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 763 - 777
  • [3] Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
    Kraemer, Juliane
    Struck, Patrick
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 315 - 337
  • [4] Continuous leakage-resilient certificate-based encryption
    Li, Jiguo
    Guo, Yuyan
    Yu, Qihong
    Lu, Yang
    Zhang, Yichen
    Zhang, Futai
    [J]. INFORMATION SCIENCES, 2016, 355 : 1 - 14
  • [5] Leakage-Resilient Storage
    Davi, Francesco
    Dziembowski, Stefan
    Venturi, Daniele
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 121 - +
  • [6] Leakage-Resilient Cryptography
    Dziembowski, Stefan
    Pietrzak, Krzysztof
    [J]. PROCEEDINGS OF THE 49TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2008, : 293 - +
  • [7] Continuous leakage-resilient identity-based encryption with leakage amplification
    Yanwei Zhou
    Bo Yang
    Yi Mu
    [J]. Designs, Codes and Cryptography, 2019, 87 : 2061 - 2090
  • [8] Continuous leakage-resilient identity-based encryption with leakage amplification
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (09) : 2061 - 2090
  • [9] Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks
    Fathi, H
    Shin, SH
    Kobara, K
    Chakraborty, SS
    Imai, H
    Prasad, R
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (11) : 2182 - 2193
  • [10] Leakage-Resilient Signatures
    Faust, Sebastian
    Kiltz, Eike
    Pietrzak, Krzysztof
    Rothblum, Guy N.
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 : 343 - +