A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme

被引:57
|
作者
Li, Jiguo [1 ]
Teng, Meilin [1 ]
Zhang, Yichen [1 ]
Yu, Qihong [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat, Nanjing 211100, Jiangsu, Peoples R China
来源
COMPUTER JOURNAL | 2016年 / 59卷 / 07期
基金
中国国家自然科学基金;
关键词
leakage resilient; identity-based encryption; CCA2-secure; standard model; q-TABDHE assumption; PUBLIC-KEY ENCRYPTION;
D O I
10.1093/comjnl/bxv128
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based encryption (IBE) has many appealing applications. However, some traditional IBE schemes may not be secure in the real world due to the side-channel attacks. Leakage-resilient cryptography can capture these attacks by modeling information leakage that adversary can access. In this paper, we apply a hash proof technique in the existing CCA-secure variant of the Gentry's IBE scheme to construct a new leakage-resilient IBE scheme in the bounded-leakage model. The proposed scheme is more computationally efficient than the original Alwen et al.'s leakage-resilient IBE scheme. It enjoys a shorter key (public/secret key) length, and a higher relative key leakage ratio. The new leakage-resilient scheme is proved semantically secure against adaptive chosen ciphertext attack in the standard model under the truncated augmented bilinear Diffie-Hellman exponent (-TABDHE) assumption.
引用
收藏
页码:1066 / 1075
页数:10
相关论文
共 50 条
  • [31] Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security
    Zhou, Yanwei
    Yang, Bo
    [J]. COMPUTER JOURNAL, 2017, 60 (08): : 1161 - 1172
  • [32] Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting
    Cai, Cailing
    Qin, Xianrui
    Yuen, Tsz Hon
    Yiu, Siu Ming
    [J]. ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 42 - 53
  • [33] Efficient CCA-Secure PKE from Identity-Based Techniques
    Lai, Junzuo
    Deng, Robert H.
    Liu, Shengli
    Kou, Weidong
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 132 - +
  • [34] A Generic Construction of CCA-secure Identity-based Encryption with Equality Test against Insider Attacks
    Emura, Keita
    Takayasu, Atsushi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105 (08)
  • [35] Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Matsuura, Kanta
    Imai, Hideki
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 1 - +
  • [36] A leakage-resilient certificateless public key encryption scheme with CCA2 security
    Yan-wei ZHOU
    Bo YANG
    Hao CHENG
    Qing-long WANG
    [J]. Frontiers of Information Technology & Electronic Engineering, 2018, 19 (04) : 481 - 493
  • [37] Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing
    Zhou, Yanwei
    Yang, Bo
    [J]. INFORMATION PROCESSING LETTERS, 2018, 130 : 16 - 24
  • [38] The generic construction of continuous leakage-resilient identity-based cryptosystems
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    [J]. THEORETICAL COMPUTER SCIENCE, 2019, 772 : 1 - 45
  • [39] Leakage-resilient identity-based cryptography from minimal assumptions
    Yanwei Zhou
    Bo Yang
    Zirui Qiao
    Zhe Xia
    Mingwu Zhang
    Yi Mu
    [J]. Designs, Codes and Cryptography, 2023, 91 : 3757 - 3801
  • [40] Leakage-resilient identity-based cryptography from minimal assumptions
    Zhou, Yanwei
    Yang, Bo
    Qiao, Zirui
    Xia, Zhe
    Zhang, Mingwu
    Mu, Yi
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (11) : 3757 - 3801