Leakage-Resilient Functional Encryption via Pair Encodings

被引:6
|
作者
Yu, Zuoxia [1 ]
Au, Man Ho [1 ]
Xu, Qiuliang [2 ]
Yang, Rupeng [2 ]
Han, Jinguang [3 ,4 ]
机构
[1] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
[2] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Peoples R China
[3] Nanjing Univ Finance & Econ, Jiangsu Prov Key Lab E Business, Nanjing 210003, Jiangsu, Peoples R China
[4] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
来源
关键词
IDENTITY-BASED ENCRYPTION; DUAL SYSTEM ENCRYPTION; HIBE;
D O I
10.1007/978-3-319-40253-6_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Leakage-resilient cryptography is proposed to address physical attacks on real world crypto-systems. Dual system encryption methodology is developed to guide design and analysis of various functional encryption schemes (FEs) with adaptive security. Observing the compatibility of dual system methodology and leakage-resilience, Lewko et al. present constructions of a number of strong leakage-resilient functional encryptions. In particular, they present fully secure identity-based encryption (IBE), hierarchical IBE (HIBE) and attribute-based encryption (ABE) satisfying the continual memory leakage (CML) model, one of the strongest models that allows continuous leakage on both user and master secret keys. Inspired by the recent work from Attrapadung on pair encodings which greatly simplifies the design and analysis of FE, we propose a generic framework for constructing fully secure FEs in the CML model (LR-FEs). Specifically, our framework "compiles" predicate encodings into fully secure LR-FEs in a two-step process. Firstly, we propose a generic transformation of pair encoding schemes into their leakage-resilient forms. Next, we present another conversion that turns leakage-resilient pair encodings into fully secure LR-FEs. Our framework is highly compatible with Attrapadung's, meaning that it is applicable to many existing pair encoding schemes. The contribution of this paper is threefold. Firstly, our framework simplifies the design and analysis of LR-FEs into the design and analysis of predicate encodings. Secondly, our framework allows us to improve the security of some existing LR-FEs, such as LR-IBE with a tighter reduction. Thirdly, we discover new adaptively secure LR-FEs, including FE for regular languages, ABE for large universe and ABE with short ciphertext.
引用
收藏
页码:443 / 460
页数:18
相关论文
共 50 条
  • [1] Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
    Zhang, Jie
    Chen, Jie
    Gong, Junqing
    Ge, Aijun
    Ma, Chuangui
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (06) : 1339 - 1366
  • [2] Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
    Jie Zhang
    Jie Chen
    Junqing Gong
    Aijun Ge
    Chuangui Ma
    [J]. Designs, Codes and Cryptography, 2018, 86 : 1339 - 1366
  • [3] Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
    Kraemer, Juliane
    Struck, Patrick
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 315 - 337
  • [4] Bounded leakage-resilient functional encryption with hidden vector predicate
    [J]. Zhang, M. (mwzhang@imi.kyushu-u.ac.jp), 1600, Oxford University Press (56):
  • [5] Leakage-Resilient Symmetric Encryption via Re-keying
    Abdalla, Michel
    Belaid, Sonia
    Fouque, Pierre-Alain
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2013, 2013, 8086 : 471 - 488
  • [6] Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate
    Zhang, Mingwu
    Yang, Bo
    Takagi, Tsuyoshi
    [J]. COMPUTER JOURNAL, 2013, 56 (04): : 464 - 477
  • [7] RCB: leakage-resilient authenticated encryption via re-keying
    Megha Agrawal
    Tarun Kumar Bansal
    Donghoon Chang
    Amit Kumar Chauhan
    Seokhie Hong
    Jinkeon Kang
    Somitra Kumar Sanadhya
    [J]. The Journal of Supercomputing, 2018, 74 : 4173 - 4198
  • [8] Memory leakage-resilient searchable symmetric encryption
    Dai, Shuguang
    Li, Huige
    Zhang, Fangguo
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 76 - 84
  • [9] RCB: leakage-resilient authenticated encryption via re-keying
    Agrawal, Megha
    Bansal, Tarun Kumar
    Chang, Donghoon
    Chauhan, Amit Kumar
    Hong, Seokhie
    Kang, Jinkeon
    Sanadhya, Somitra Kumar
    [J]. JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4173 - 4198
  • [10] Constructing Committing and Leakage-Resilient Authenticated Encryption
    Struck, Patrick
    Weishaeupl, Maximiliane
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 497 - 528