Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption

被引:0
|
作者
Ishizaka, Masahito [1 ]
Matsuura, Kanta [1 ]
机构
[1] Univ Tokyo, Inst Ind Sci, Tokyo, Japan
来源
CRYPTOLOGY AND NETWORK SECURITY, CANS 2018 | 2018年 / 11124卷
关键词
Identity-based encryption; Leakage-resilience; Auxiliary leakage; ATTRIBUTE-BASED ENCRYPTION; PUBLIC-KEY CRYPTOGRAPHY; DUAL SYSTEM ENCRYPTION; HIBE;
D O I
10.1007/978-3-030-00434-7_21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Leakage-resilience guarantees that even if some information about the secret key is partially leaked, the security is maintained. Several security models considering leakage-resilience have been proposed. Among them, auxiliary leakage model proposed by Dodis et al. in STOC'09 is especially important, since it can deal with a leakage caused by a function which information-theoretically reveals the secret key, e.g., one-way permutation. Contribution of this work is two-fold. Firstly, we propose an identity-based encryption (IBE) scheme and prove that it is fully secure and resilient to the auxiliary leakage under the decisional linear assumption in the standard model. Secondly, although the IBE scheme proposed by Yuen et al. in Eurocrypt'12 has been considered to be the only IBE scheme resilient to auxiliary leakage, we prove that the security proof for the IBE scheme is defective. We insist that our IBE scheme is the only IBE scheme resilient to auxiliary leakage.
引用
收藏
页码:417 / 439
页数:23
相关论文
共 50 条
  • [21] Continuous Leakage-Resilient Identity-Based Encryption Scheme with CCA Security
    ZHOU Yanwei
    YANG Bo
    Chinese Journal of Electronics, 2019, 28 (04) : 682 - 689
  • [22] Leakage resilient identity-based aggregate signcryption
    College of Computer, Nanjing University of Posts and Telecommunications, Nanjing
    210023, China
    Beijing Youdian Daxue Xuebao, 1600, 5 (20-25):
  • [23] Identity-Based and Leakage-Resilient Broadcast Encryption Scheme for Cloud Storage Service
    Yu, Qihong
    Li, Jiguo
    Ji, Sai
    APPLIED SCIENCES-BASEL, 2022, 12 (22):
  • [24] Revocable Identity-Based Encryption Scheme Under LWE Assumption the Standard Model
    Zhang, Yaling
    Wang, Shangping
    Du, Qing
    IEEE ACCESS, 2018, 6 : 65298 - 65307
  • [25] POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption
    Tran Viet Xuan Phuong
    Yang, Guomin
    Susilo, Willy
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1490 - 1492
  • [26] Compact hierarchical identity-based encryption based on a harder decisional problem
    Galindo, David
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2015, 92 (03) : 463 - 472
  • [27] IRIBE: Intrusion-resilient identity-based encryption
    Yu, Jia
    Hao, Rong
    Zhao, Huawei
    Shu, Minglei
    Fan, Jianxi
    INFORMATION SCIENCES, 2016, 329 : 90 - 104
  • [28] Identity-based encryption and hierarchical identity-based encryption
    University of Waterloo, Canada
    不详
    Cryptology Inf. Secur. Ser., 2009, (45-64):
  • [29] Fully secure wicked identity -based encryption resilient to continual auxiliary- inputs leakage ?
    Hou, Hongxia
    Yang, Bo
    Zhang, Mingrui
    Zhou, Yanwei
    Huang, Meijuan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53
  • [30] Identity-Based Encryption with Keyword Search from Lattice Assumption
    Zhang, Xiaojun
    Xu, Chunxiang
    Mu, Liming
    Zhao, Jie
    CHINA COMMUNICATIONS, 2018, 15 (04) : 164 - 178