Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage

被引:7
|
作者
Wu, Jui-Di [1 ]
Tseng, Yuh-Min [1 ]
Huang, Sen-Shan [1 ]
Tsai, Tung-Tso [2 ]
机构
[1] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
[2] Foxconn, Dept Res, Taipei 114, Taiwan
来源
关键词
Leakage resilience; side-channel attacks; key encapsulation; public-key encryption; certificate-based public-key setting; IDENTITY-BASED ENCRYPTION; SIGNATURE SCHEME; PROTOCOL; CRYPTOGRAPHY; SECURE;
D O I
10.1109/OJCS.2020.3008961
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the past, the security of most public-key encryption or key encapsulation schemes is shown in an ideal model, where private keys, secret keys and random values are assumed to be absolutely secure to adversaries. However, this ideal model is not practical due to side-channel attacks in the sense that adversaries could gain partial information of these secret values involved in decryption operations by perceiving energy consumption or execution timing. In such a case, these schemes under the ideal model could suffer from side-channel attacks. Recently, leakage-resilient cryptography resistant to side-channel attacks is an emerging research topic. Certificate-based encryption (CBE) or certificate-based key encapsulation (CB-KE) schemes are a class of important public-key encryption. However, little work addresses the design of leakage-resilient CBE (LR-CBE) or leakage-resilient CB-KE (LR-CB-KE) schemes. In this paper, we present the first LR-CBKE scheme with overall unbounded leakage property which permits adversaries to continuously gain partial information of the system secret key of a trusted certificate authority (CA), the private keys and certificates of users, and random values. In the generic bilinear group model, formal security analysis is made to prove that the proposed LR-CB-KE scheme is secure against chosen ciphertext attacks.
引用
收藏
页码:131 / 144
页数:14
相关论文
共 50 条
  • [21] Leakage-Resilient Signature Scheme Based on BLS Signature
    Wang Zhiwei
    CHINA COMMUNICATIONS, 2011, 8 (03) : 212 - 215
  • [22] Leakage-resilient identity-based encryption scheme
    Li, Sujuan
    Zhang, Futai
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 187 - 196
  • [23] A New Leakage-Resilient IBE Scheme in the Relative Leakage Model
    Chen, Yu
    Luo, Song
    Chen, Zhong
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 263 - 270
  • [24] Continuous Leakage-resilient Broadcast Key-encapsulation Mechanism with CCA Security
    Qiao Z.-R.
    Yang Q.-L.
    Zhou Y.-W.
    Yang B.
    Xia Z.
    Zhang M.-W.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (02): : 818 - 832
  • [25] Leakage-resilient authenticated key establishment protocols
    Shin, SH
    Kobara, K
    Imai, H
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 155 - 172
  • [26] Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Xie, Jia-Yi
    Hung, Ying-Hao
    IEEE ACCESS, 2022, 10 : 104636 - 104648
  • [27] Leakage-Resilient Storage Scheme for Cryptographic Applications
    Alawatugoda, Janaka
    Ragel, Roshan
    Eranga, Danushka
    Jayanath, Nalaka
    Somathilaka, Chinthaka
    2016 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION FOR SUSTAINABILITY (ICIAFS): INTEROPERABLE SUSTAINABLE SMART SYSTEMS FOR NEXT GENERATION, 2016,
  • [28] Leakage-Resilient Password-Based Authenticated Key Exchange
    Ruan, Ou
    Zhang, Mingwu
    Chen, Jing
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017, 2017, 10393 : 285 - 296
  • [29] Strongly Leakage-Resilient Authenticated Key Exchange
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Susilo, Willy
    Guo, Fuchun
    TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 19 - 36
  • [30] A Note on Leakage-Resilient Authenticated Key Exchange
    Chun, Ji Young
    Hwang, Jung Yeon
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (05) : 2274 - 2279