Leakage-Resilient Functional Encryption via Pair Encodings

被引:6
|
作者
Yu, Zuoxia [1 ]
Au, Man Ho [1 ]
Xu, Qiuliang [2 ]
Yang, Rupeng [2 ]
Han, Jinguang [3 ,4 ]
机构
[1] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
[2] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Peoples R China
[3] Nanjing Univ Finance & Econ, Jiangsu Prov Key Lab E Business, Nanjing 210003, Jiangsu, Peoples R China
[4] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
来源
关键词
IDENTITY-BASED ENCRYPTION; DUAL SYSTEM ENCRYPTION; HIBE;
D O I
10.1007/978-3-319-40253-6_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Leakage-resilient cryptography is proposed to address physical attacks on real world crypto-systems. Dual system encryption methodology is developed to guide design and analysis of various functional encryption schemes (FEs) with adaptive security. Observing the compatibility of dual system methodology and leakage-resilience, Lewko et al. present constructions of a number of strong leakage-resilient functional encryptions. In particular, they present fully secure identity-based encryption (IBE), hierarchical IBE (HIBE) and attribute-based encryption (ABE) satisfying the continual memory leakage (CML) model, one of the strongest models that allows continuous leakage on both user and master secret keys. Inspired by the recent work from Attrapadung on pair encodings which greatly simplifies the design and analysis of FE, we propose a generic framework for constructing fully secure FEs in the CML model (LR-FEs). Specifically, our framework "compiles" predicate encodings into fully secure LR-FEs in a two-step process. Firstly, we propose a generic transformation of pair encoding schemes into their leakage-resilient forms. Next, we present another conversion that turns leakage-resilient pair encodings into fully secure LR-FEs. Our framework is highly compatible with Attrapadung's, meaning that it is applicable to many existing pair encoding schemes. The contribution of this paper is threefold. Firstly, our framework simplifies the design and analysis of LR-FEs into the design and analysis of predicate encodings. Secondly, our framework allows us to improve the security of some existing LR-FEs, such as LR-IBE with a tighter reduction. Thirdly, we discover new adaptively secure LR-FEs, including FE for regular languages, ABE for large universe and ABE with short ciphertext.
引用
收藏
页码:443 / 460
页数:18
相关论文
共 50 条
  • [21] Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives
    Pereira, Olivier
    Standaert, Francois-Xavier
    Vivek, Srinivas
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 96 - 108
  • [22] Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
    Armknecht, Frederik
    Maes, Roel
    Sadeghi, Ahmad-Reza
    Sunar, Berk
    Tuyls, Pim
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 685 - +
  • [23] Leakage-Resilient Cryptography
    Dziembowski, Stefan
    Pietrzak, Krzysztof
    PROCEEDINGS OF THE 49TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2008, : 293 - +
  • [24] Leakage-Resilient Storage
    Davi, Francesco
    Dziembowski, Stefan
    Venturi, Daniele
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 121 - +
  • [25] Functional encryption for computational hiding in prime order groups via pair encodings
    Jongkil Kim
    Willy Susilo
    Fuchun Guo
    Man Ho Au
    Designs, Codes and Cryptography, 2018, 86 : 97 - 120
  • [26] Functional encryption for computational hiding in prime order groups via pair encodings
    Kim, Jongkil
    Susilo, Willy
    Guo, Fuchun
    Au, Man Ho
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (01) : 97 - 120
  • [27] Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments
    Tseng, Yuh-Min
    Wu, Jui-Di
    Hung, Ruo-Wei
    Chien, Hung-Yu
    2018 9TH INTERNATIONAL CONFERENCE ON AWARENESS SCIENCE AND TECHNOLOGY (ICAST), 2018, : 251 - 256
  • [28] Leakage-Resilient Signatures
    Faust, Sebastian
    Kiltz, Eike
    Pietrzak, Krzysztof
    Rothblum, Guy N.
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 : 343 - +
  • [29] Continuous Leakage-Resilient Identity-Based Encryption with Tight Security
    Zhou, Yanwei
    Yang, Bo
    Hou, Hongxia
    Zhang, Lina
    Wang, Tao
    Hu, Mingxiao
    COMPUTER JOURNAL, 2019, 62 (08): : 1092 - 1105
  • [30] Efficient leakage-resilient public key encryption from DDH assumption
    Sujuan Li
    Futai Zhang
    Yinxia Sun
    Limin Shen
    Cluster Computing, 2013, 16 : 797 - 806