A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme

被引:57
|
作者
Li, Jiguo [1 ]
Teng, Meilin [1 ]
Zhang, Yichen [1 ]
Yu, Qihong [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat, Nanjing 211100, Jiangsu, Peoples R China
来源
COMPUTER JOURNAL | 2016年 / 59卷 / 07期
基金
中国国家自然科学基金;
关键词
leakage resilient; identity-based encryption; CCA2-secure; standard model; q-TABDHE assumption; PUBLIC-KEY ENCRYPTION;
D O I
10.1093/comjnl/bxv128
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based encryption (IBE) has many appealing applications. However, some traditional IBE schemes may not be secure in the real world due to the side-channel attacks. Leakage-resilient cryptography can capture these attacks by modeling information leakage that adversary can access. In this paper, we apply a hash proof technique in the existing CCA-secure variant of the Gentry's IBE scheme to construct a new leakage-resilient IBE scheme in the bounded-leakage model. The proposed scheme is more computationally efficient than the original Alwen et al.'s leakage-resilient IBE scheme. It enjoys a shorter key (public/secret key) length, and a higher relative key leakage ratio. The new leakage-resilient scheme is proved semantically secure against adaptive chosen ciphertext attack in the standard model under the truncated augmented bilinear Diffie-Hellman exponent (-TABDHE) assumption.
引用
收藏
页码:1066 / 1075
页数:10
相关论文
共 50 条
  • [41] Leakage-resilient Attribute-Based Encryption with CCA2 security
    Zhang, Leyou
    Shang, Yujie
    [J]. International Journal of Network Security, 2019, 21 (05) : 819 - 827
  • [42] Identity-based encryption resilient to continuous key leakage
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    Wang, Tao
    Wang, Xin
    [J]. IET INFORMATION SECURITY, 2019, 13 (05) : 426 - 434
  • [43] Identity-Based Encryption Resilient to Continual Auxiliary Leakage
    Yuen, Tsz Hon
    Chow, Sherman S. M.
    Zhang, Ye
    Yiu, Siu Ming
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 117 - 134
  • [44] Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption
    Hu, Chengyu
    Yu, Zuoxia
    Yang, Rupeng
    Xu, Qiuliang
    Zhou, Yongbin
    Yuan, Qixia
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) : 216 - 229
  • [45] Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments
    Tseng, Yuh-Min
    Wu, Jui-Di
    Hung, Ruo-Wei
    Chien, Hung-Yu
    [J]. 2018 9TH INTERNATIONAL CONFERENCE ON AWARENESS SCIENCE AND TECHNOLOGY (ICAST), 2018, : 251 - 256
  • [46] Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Tsai, Tung-Tso
    [J]. INFORMATICA, 2020, 31 (03) : 597 - 620
  • [47] Tightly CCA-secure inner product functional encryption scheme
    Liu, Xiangyu
    Liu, Shengli
    Han, Shuai
    Gu, Dawu
    [J]. THEORETICAL COMPUTER SCIENCE, 2022, 898 : 1 - 19
  • [48] Continuous leakage-resilient certificateless public key encryption with CCA security
    Zhou, Yanwei
    Yang, Bo
    [J]. KNOWLEDGE-BASED SYSTEMS, 2017, 136 : 27 - 36
  • [49] An efficient leakage-resilient and CCA2-secure PKE system
    Zhang, Ming-Wu
    Chen, Mi-Wen
    He, De-Biao
    Yang, Bo
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2016, 39 (03): : 492 - 502
  • [50] Forward-secure identity-based encryption scheme
    Yang, Hao-Miao
    Sun, Shi-Xin
    Li, Hong-Wei
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (03): : 534 - 537