Continuous Leakage-resilient and Hierarchical Identity-based Online/Offline Encryption

被引:0
|
作者
Yu, Qihong [1 ]
Shen, Jian [2 ]
Lai, Jin-Feng [3 ]
Ji, Sai [1 ]
机构
[1] Suqian Univ, Coll Informat Engn, Suqian, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Peoples R China
[3] Natl Cheng Kung Univ, Dept Engn Sci, Tainan, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2022年 / 23卷 / 06期
基金
中国国家自然科学基金;
关键词
Continuous leakage attacks; Hierarchical encryption; Online; offline encryption; Key updation technology; TIMING ATTACK; SCHEME; SECURE;
D O I
10.53106/160792642022112306011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
By dividing encryption as online and offline stages, the online/offline encryption schemes are very suitable to lightweight equipment. For the offline stage, high-performance equipment is used for complex preprocessing calculation, and the online stage the lightweight devices only make some simple calculations. In addition, side channel attacks can disclose some secret information of the cryptosystem, which leads to the destruction of the security of the cryptography schemes. Most of the online/offline identity -based encryption schemes cannot resist side channel attacks. The paper proposes a concrete hierarchical identity-based and online/offline encryption scheme that can resist continuous leakage of secret key. By the dual system encryption technology, we prove that the given scheme is fully secure. Through key updation technology, our proposed scheme resists continual leakage of private key. The relative leakage rate of the private key can reach 1/3. In addition, the presented scheme has the hierarchical function which effectively solves the problem of heavy load in a single key generation center. The given scheme is suitable for applications in distributed environment.
引用
收藏
页码:1287 / 1296
页数:10
相关论文
共 50 条
  • [1] Continuous leakage-resilient identity-based encryption with leakage amplification
    Yanwei Zhou
    Bo Yang
    Yi Mu
    [J]. Designs, Codes and Cryptography, 2019, 87 : 2061 - 2090
  • [2] Continuous leakage-resilient identity-based encryption with leakage amplification
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (09) : 2061 - 2090
  • [3] Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity
    Zhang, Yinghui
    Yang, Menglei
    Zheng, Dong
    Zhang, Tiantian
    Guo, Rui
    Ren, Fang
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 665 - 681
  • [4] Continuous Leakage-Resilient Identity-Based Encryption with Tight Security
    Zhou, Yanwei
    Yang, Bo
    Hou, Hongxia
    Zhang, Lina
    Wang, Tao
    Hu, Mingxiao
    [J]. COMPUTER JOURNAL, 2019, 62 (08): : 1092 - 1105
  • [5] Leakage-resilient identity-based encryption scheme
    Li, Sujuan
    Zhang, Futai
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 187 - 196
  • [6] Continuous Leakage-Resilient Identity-Based Encryption Scheme with CCA Security
    Zhou Yanwei
    Yang Bo
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (04) : 682 - 689
  • [7] Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    [J]. COMPUTER JOURNAL, 2018, 61 (04): : 586 - 600
  • [8] Practical continuous leakage-resilient CCA secure identity-based encryption
    Zhou, Yanwei
    Yang, Bo
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2020, 14 (04)
  • [9] Continuous Leakage-Resilient Identity-Based Encryption Scheme with CCA Security
    ZHOU Yanwei
    YANG Bo
    [J]. Chinese Journal of Electronics, 2019, 28 (04) : 682 - 689
  • [10] Practical continuous leakage-resilient CCA secure identity-based encryption
    Yanwei Zhou
    Bo Yang
    [J]. Frontiers of Computer Science, 2020, 14