Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption

被引:0
|
作者
Ishizaka, Masahito [1 ]
Matsuura, Kanta [1 ]
机构
[1] Univ Tokyo, Inst Ind Sci, Tokyo, Japan
来源
CRYPTOLOGY AND NETWORK SECURITY, CANS 2018 | 2018年 / 11124卷
关键词
Identity-based encryption; Leakage-resilience; Auxiliary leakage; ATTRIBUTE-BASED ENCRYPTION; PUBLIC-KEY CRYPTOGRAPHY; DUAL SYSTEM ENCRYPTION; HIBE;
D O I
10.1007/978-3-030-00434-7_21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Leakage-resilience guarantees that even if some information about the secret key is partially leaked, the security is maintained. Several security models considering leakage-resilience have been proposed. Among them, auxiliary leakage model proposed by Dodis et al. in STOC'09 is especially important, since it can deal with a leakage caused by a function which information-theoretically reveals the secret key, e.g., one-way permutation. Contribution of this work is two-fold. Firstly, we propose an identity-based encryption (IBE) scheme and prove that it is fully secure and resilient to the auxiliary leakage under the decisional linear assumption in the standard model. Secondly, although the IBE scheme proposed by Yuen et al. in Eurocrypt'12 has been considered to be the only IBE scheme resilient to auxiliary leakage, we prove that the security proof for the IBE scheme is defective. We insist that our IBE scheme is the only IBE scheme resilient to auxiliary leakage.
引用
收藏
页码:417 / 439
页数:23
相关论文
共 50 条
  • [1] Identity-Based Encryption Resilient to Continual Auxiliary Leakage
    Yuen, Tsz Hon
    Chow, Sherman S. M.
    Zhang, Ye
    Yiu, Siu Ming
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 117 - 134
  • [2] Leakage-resilient identity-based encryption scheme
    Li, Sujuan
    Zhang, Futai
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 187 - 196
  • [3] Identity-based encryption resilient to continuous key leakage
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    Wang, Tao
    Wang, Xin
    IET INFORMATION SECURITY, 2019, 13 (05) : 426 - 434
  • [4] Continuous leakage-resilient identity-based encryption with leakage amplification
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (09) : 2061 - 2090
  • [5] Continuous leakage-resilient identity-based encryption with leakage amplification
    Yanwei Zhou
    Bo Yang
    Yi Mu
    Designs, Codes and Cryptography, 2019, 87 : 2061 - 2090
  • [6] Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption
    Zhou, Yanwei
    Wang, Zhaolong
    Qiao, Zirui
    Wang, Ying
    Yang, Bo
    Mu, Yi
    Zhang, Mingwu
    COMPUTER JOURNAL, 2023, 66 (04): : 924 - 940
  • [7] Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage
    Li, Jiguo
    Guo, Yuyan
    Yu, Qihong
    Lu, Yang
    Zhang, Yichen
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (10) : 1016 - 1024
  • [8] Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity
    Zhang, Yinghui
    Yang, Menglei
    Zheng, Dong
    Zhang, Tiantian
    Guo, Rui
    Ren, Fang
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 665 - 681
  • [9] Continuous Leakage-Resilient Identity-Based Encryption with Tight Security
    Zhou, Yanwei
    Yang, Bo
    Hou, Hongxia
    Zhang, Lina
    Wang, Tao
    Hu, Mingxiao
    COMPUTER JOURNAL, 2019, 62 (08): : 1092 - 1105
  • [10] Identity-Based Encryption Resilient to Continual Leakage Without Random Oracles
    Guo, Yuyan
    Jiang, Mingming
    Wei, Shimin
    Xie, Ming
    Sun, Mei
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 53 - 64