A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme

被引:57
|
作者
Li, Jiguo [1 ]
Teng, Meilin [1 ]
Zhang, Yichen [1 ]
Yu, Qihong [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat, Nanjing 211100, Jiangsu, Peoples R China
来源
COMPUTER JOURNAL | 2016年 / 59卷 / 07期
基金
中国国家自然科学基金;
关键词
leakage resilient; identity-based encryption; CCA2-secure; standard model; q-TABDHE assumption; PUBLIC-KEY ENCRYPTION;
D O I
10.1093/comjnl/bxv128
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based encryption (IBE) has many appealing applications. However, some traditional IBE schemes may not be secure in the real world due to the side-channel attacks. Leakage-resilient cryptography can capture these attacks by modeling information leakage that adversary can access. In this paper, we apply a hash proof technique in the existing CCA-secure variant of the Gentry's IBE scheme to construct a new leakage-resilient IBE scheme in the bounded-leakage model. The proposed scheme is more computationally efficient than the original Alwen et al.'s leakage-resilient IBE scheme. It enjoys a shorter key (public/secret key) length, and a higher relative key leakage ratio. The new leakage-resilient scheme is proved semantically secure against adaptive chosen ciphertext attack in the standard model under the truncated augmented bilinear Diffie-Hellman exponent (-TABDHE) assumption.
引用
收藏
页码:1066 / 1075
页数:10
相关论文
共 50 条
  • [21] Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity
    Zhang, Yinghui
    Yang, Menglei
    Zheng, Dong
    Zhang, Tiantian
    Guo, Rui
    Ren, Fang
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 665 - 681
  • [22] CCA-Secure Identity-Based Matchmaking Encryption from Standard Assumptions
    Lin, Shen
    Li, Yu
    Chen, Jie
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 253 - 273
  • [23] Improved efficiency for CCA-secure cryptosystems built using identity-based encryption
    Boneh, D
    Katz, J
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2005, PROCEEDINGS, 2005, 3376 : 87 - 103
  • [24] Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    [J]. COMPUTER JOURNAL, 2018, 61 (04): : 586 - 600
  • [25] Continuous Leakage-resilient and Hierarchical Identity-based Online/Offline Encryption
    Yu, Qihong
    Shen, Jian
    Lai, Jin-Feng
    Ji, Sai
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (06): : 1287 - 1296
  • [26] Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model
    Zhang, Leyou
    Wang, Zhuanning
    Wu, Qing
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 201 - 210
  • [27] Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
    Chow, Sherman S. M.
    Dodis, Yevgeniy
    Rouselakis, Yannis
    Waters, Brent
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 152 - 161
  • [28] An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption
    Yang Xiao-yuan
    Wu Li-qiang
    Zhang Min-qing
    Chen Xiao-feng
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2013, 65 (09) : 1254 - 1263
  • [29] Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction
    Baek, Joonsang
    Wong, Duncan S.
    Li, Jin
    Au, Man Ho
    [J]. COMPUTER JOURNAL, 2016, 59 (04): : 508 - 521
  • [30] A Generic Construction of CCA-Secure Identity-Based Encryption with Equality Test against Insider Attacks
    Emura, Keita
    Takayasu, Atsushi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2023, E106A (03) : 193 - 202