Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions

被引:16
|
作者
Fujisaki, Eiichiro [1 ]
Xagawa, Keita [1 ]
机构
[1] NTT Secure Platform Labs, 3-9-11 Midori Cho, Musashino, Tokyo 1808585, Japan
关键词
Public-key encryption; Digital signature; Continuous tampering attacks; Bounded or continuous memory leakage; CRYPTOGRAPHY; ENCRYPTION; PARADIGM;
D O I
10.1007/978-3-662-53887-6_33
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present the first chosen-ciphertext secure public-key encryption schemes resilient to continuous tampering of arbitrary (efficiently computable) functions. Since it is impossible to realize such a scheme without a self-destruction or key-updating mechanism, our proposals allow for either of them. As in the previous works resilient to this type of tampering attacks, our schemes also tolerate bounded or continuous memory leakage attacks at the same time. Unlike the previous results, our schemes have efficient instantiations, without relying on zero-knowledge proofs. We also prove that there is no secure digital signature scheme resilient to arbitrary tampering functions against a stronger variant of continuous tampering attacks, even if it has a self-destruction mechanism.
引用
收藏
页码:908 / 938
页数:31
相关论文
共 50 条
  • [1] Public-Key Cryptosystems Resilient to Key Leakage
    Naor, Moni
    Segev, Gil
    ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 18 - 35
  • [2] PUBLIC-KEY CRYPTOSYSTEMS RESILIENT TO KEY LEAKAGE
    Naor, Moni
    Segev, Gil
    SIAM JOURNAL ON COMPUTING, 2012, 41 (04) : 772 - 814
  • [3] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
    Chengyu Hu
    Rupeng Yang
    Pengtao Liu
    Tong Li
    Fanyu Kong
    The Journal of Supercomputing, 2019, 75 : 3099 - 3122
  • [4] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Li, Tong
    Kong, Fanyu
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (06): : 3099 - 3122
  • [5] Public key encryption resilient to leakage and tampering attacks
    Sun, Shi-Feng
    Gu, Dawu
    Parampalli, Udaya
    Yu, Yu
    Qin, Baodong
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 89 : 142 - 156
  • [6] Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security
    Zhou, Yanwei
    Yang, Bo
    COMPUTER JOURNAL, 2017, 60 (08): : 1161 - 1172
  • [7] Coalition public-key cryptosystems
    Anisimov A.V.
    Cybernetics and Systems Analysis, 2001, 37 (1) : 1 - 12
  • [8] A survey of public-key cryptosystems
    Koblitz, N
    Menezes, AJ
    SIAM REVIEW, 2004, 46 (04) : 599 - 634
  • [9] Quantum public-key cryptosystems
    Okamoto, T
    Tanaka, K
    Uchiyama, S
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 147 - 165
  • [10] EVALUATION OF PUBLIC-KEY CRYPTOSYSTEMS
    DAVIES, DW
    PRICE, WL
    PARKIN, GI
    INFORMATION PRIVACY, 1980, 2 (04): : 138 - 154