A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme

被引:57
|
作者
Li, Jiguo [1 ]
Teng, Meilin [1 ]
Zhang, Yichen [1 ]
Yu, Qihong [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat, Nanjing 211100, Jiangsu, Peoples R China
来源
COMPUTER JOURNAL | 2016年 / 59卷 / 07期
基金
中国国家自然科学基金;
关键词
leakage resilient; identity-based encryption; CCA2-secure; standard model; q-TABDHE assumption; PUBLIC-KEY ENCRYPTION;
D O I
10.1093/comjnl/bxv128
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based encryption (IBE) has many appealing applications. However, some traditional IBE schemes may not be secure in the real world due to the side-channel attacks. Leakage-resilient cryptography can capture these attacks by modeling information leakage that adversary can access. In this paper, we apply a hash proof technique in the existing CCA-secure variant of the Gentry's IBE scheme to construct a new leakage-resilient IBE scheme in the bounded-leakage model. The proposed scheme is more computationally efficient than the original Alwen et al.'s leakage-resilient IBE scheme. It enjoys a shorter key (public/secret key) length, and a higher relative key leakage ratio. The new leakage-resilient scheme is proved semantically secure against adaptive chosen ciphertext attack in the standard model under the truncated augmented bilinear Diffie-Hellman exponent (-TABDHE) assumption.
引用
收藏
页码:1066 / 1075
页数:10
相关论文
共 50 条
  • [1] CCA-Secure Leakage-Resilient Identity-Based Encryption without q-Type Assumptions
    Tomita, Toi
    Ogata, Wakaha
    Kurosawa, Kaoru
    Kuwayama, Ryo
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (10) : 1157 - 1166
  • [2] Practical continuous leakage-resilient CCA secure identity-based encryption
    Zhou, Yanwei
    Yang, Bo
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2020, 14 (04)
  • [3] Practical continuous leakage-resilient CCA secure identity-based encryption
    Yanwei Zhou
    Bo Yang
    [J]. Frontiers of Computer Science, 2020, 14
  • [4] Continuous Leakage-Resilient Identity-Based Encryption Scheme with CCA Security
    Zhou Yanwei
    Yang Bo
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (04) : 682 - 689
  • [5] Continuous Leakage-Resilient Identity-Based Encryption Scheme with CCA Security
    ZHOU Yanwei
    YANG Bo
    [J]. Chinese Journal of Electronics, 2019, 28 (04) : 682 - 689
  • [6] Leakage-resilient identity-based encryption scheme
    Li, Sujuan
    Zhang, Futai
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 187 - 196
  • [7] CCA-Secure Deterministic Identity-Based Encryption Scheme
    Huang, Meijuan
    Yang, Bo
    Zhao, Yi
    Liang, Kaitai
    Xue, Liang
    Yang, Xiaoyi
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (03) : 245 - 269
  • [8] New leakage-resilient CCA-secure public key encryption
    Kurosawa, Kaoru
    Nojima, Ryo
    Phong, Le Trieu
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2013, 7 (04) : 297 - 312
  • [9] Constructions of CCA-Secure Revocable Identity-Based Encryption
    Ishida, Yuu
    Watanabe, Yohei
    Shikata, Junji
    [J]. INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 174 - 191
  • [10] CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not q-type) Assumptions
    Tomita, Toi
    Ogata, Wakaha
    Kurosawa, Kaoru
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2019, 2019, 11689 : 3 - 22