Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage

被引:7
|
作者
Wu, Jui-Di [1 ]
Tseng, Yuh-Min [1 ]
Huang, Sen-Shan [1 ]
Tsai, Tung-Tso [2 ]
机构
[1] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
[2] Foxconn, Dept Res, Taipei 114, Taiwan
来源
关键词
Leakage resilience; side-channel attacks; key encapsulation; public-key encryption; certificate-based public-key setting; IDENTITY-BASED ENCRYPTION; SIGNATURE SCHEME; PROTOCOL; CRYPTOGRAPHY; SECURE;
D O I
10.1109/OJCS.2020.3008961
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the past, the security of most public-key encryption or key encapsulation schemes is shown in an ideal model, where private keys, secret keys and random values are assumed to be absolutely secure to adversaries. However, this ideal model is not practical due to side-channel attacks in the sense that adversaries could gain partial information of these secret values involved in decryption operations by perceiving energy consumption or execution timing. In such a case, these schemes under the ideal model could suffer from side-channel attacks. Recently, leakage-resilient cryptography resistant to side-channel attacks is an emerging research topic. Certificate-based encryption (CBE) or certificate-based key encapsulation (CB-KE) schemes are a class of important public-key encryption. However, little work addresses the design of leakage-resilient CBE (LR-CBE) or leakage-resilient CB-KE (LR-CB-KE) schemes. In this paper, we present the first LR-CBKE scheme with overall unbounded leakage property which permits adversaries to continuously gain partial information of the system secret key of a trusted certificate authority (CA), the private keys and certificates of users, and random values. In the generic bilinear group model, formal security analysis is made to prove that the proposed LR-CB-KE scheme is secure against chosen ciphertext attacks.
引用
收藏
页码:131 / 144
页数:14
相关论文
共 50 条
  • [1] Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE ACCESS, 2023, 11 : 51617 - 51630
  • [2] Leakage-resilient certificate-based encryption
    Yu, Qihong
    Li, Jiguo
    Zhang, Yichen
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3346 - 3355
  • [3] Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments
    Tseng, Yuh-Min
    Wu, Jui-Di
    Hung, Ruo-Wei
    Chien, Hung-Yu
    2018 9TH INTERNATIONAL CONFERENCE ON AWARENESS SCIENCE AND TECHNOLOGY (ICAST), 2018, : 251 - 256
  • [4] Leakage-Resilient Certificate-Based Authenticated Key Exchange Protocol
    Tsai, Tung-Tso
    Huang, Sen-Shan
    Tseng, Yuh-Min
    Chuang, Yun-Hsin
    Hung, Ying-Hao
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2022, 3 : 137 - 148
  • [5] Continuous leakage-resilient certificate-based encryption
    Li, Jiguo
    Guo, Yuyan
    Yu, Qihong
    Lu, Yang
    Zhang, Yichen
    Zhang, Futai
    INFORMATION SCIENCES, 2016, 355 : 1 - 14
  • [6] Leakage-Resilient Certificateless Key Encapsulation Scheme
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Chou, Wei-Chieh
    INFORMATICA, 2018, 29 (01) : 125 - 155
  • [7] Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing
    Zhou, Yanwei
    Xu, Yuan
    Qiao, Zirui
    Yang, Bo
    Zhang, Mingwu
    THEORETICAL COMPUTER SCIENCE, 2021, 860 : 1 - 22
  • [8] Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    Huang, Sen-Shan
    INFORMATICA, 2023, 34 (01) : 199 - 222
  • [9] Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Tsai, Tung-Tso
    IEEE ACCESS, 2019, 7 : 19041 - 19053
  • [10] Certificate-based encryption resilient to key leakage
    Yu, Qihong
    Li, Jiguo
    Zhang, Yichen
    Wu, Wei
    Huang, Xinyi
    Xiang, Yang
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 116 : 101 - 112