Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption

被引:0
|
作者
Ishizaka, Masahito [1 ]
Matsuura, Kanta [1 ]
机构
[1] Univ Tokyo, Inst Ind Sci, Tokyo, Japan
来源
CRYPTOLOGY AND NETWORK SECURITY, CANS 2018 | 2018年 / 11124卷
关键词
Identity-based encryption; Leakage-resilience; Auxiliary leakage; ATTRIBUTE-BASED ENCRYPTION; PUBLIC-KEY CRYPTOGRAPHY; DUAL SYSTEM ENCRYPTION; HIBE;
D O I
10.1007/978-3-030-00434-7_21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Leakage-resilience guarantees that even if some information about the secret key is partially leaked, the security is maintained. Several security models considering leakage-resilience have been proposed. Among them, auxiliary leakage model proposed by Dodis et al. in STOC'09 is especially important, since it can deal with a leakage caused by a function which information-theoretically reveals the secret key, e.g., one-way permutation. Contribution of this work is two-fold. Firstly, we propose an identity-based encryption (IBE) scheme and prove that it is fully secure and resilient to the auxiliary leakage under the decisional linear assumption in the standard model. Secondly, although the IBE scheme proposed by Yuen et al. in Eurocrypt'12 has been considered to be the only IBE scheme resilient to auxiliary leakage, we prove that the security proof for the IBE scheme is defective. We insist that our IBE scheme is the only IBE scheme resilient to auxiliary leakage.
引用
收藏
页码:417 / 439
页数:23
相关论文
共 50 条
  • [41] Leakage-resilient identity-based cryptography from minimal assumptions
    Yanwei Zhou
    Bo Yang
    Zirui Qiao
    Zhe Xia
    Mingwu Zhang
    Yi Mu
    Designs, Codes and Cryptography, 2023, 91 : 3757 - 3801
  • [42] Leakage-resilient identity-based cryptography from minimal assumptions
    Zhou, Yanwei
    Yang, Bo
    Qiao, Zirui
    Xia, Zhe
    Zhang, Mingwu
    Mu, Yi
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (11) : 3757 - 3801
  • [43] The generic construction of continuous leakage-resilient identity-based cryptosystems
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    THEORETICAL COMPUTER SCIENCE, 2019, 772 : 1 - 45
  • [44] Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience
    Yu, Qihong
    Li, Jiguo
    Ji, Sai
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [45] Wildcarded Identity-Based Encryption
    Michel Abdalla
    James Birkett
    Dario Catalano
    Alexander W. Dent
    John Malone-Lee
    Gregory Neven
    Jacob C. N. Schuldt
    Nigel P. Smart
    Journal of Cryptology, 2011, 24 : 42 - 82
  • [46] Idealizing Identity-Based Encryption
    Hofheinz, Dennis
    Matt, Christian
    Maurer, Ueli
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 495 - 520
  • [47] Fuzzy identity-based encryption
    Sahai, A
    Waters, B
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 457 - 473
  • [48] Identity-based encryption and beyond
    Martin, Luther
    IEEE SECURITY & PRIVACY, 2008, 6 (05) : 62 - 64
  • [49] On the Anonymity of Identity-Based Encryption
    Luo, Song
    Hu, Ning
    JOURNAL OF APPLIED MATHEMATICS, 2013,
  • [50] Wildcarded Identity-Based Encryption
    Abdalla, Michel
    Birkett, James
    Catalano, Dario
    Dent, Alexander W.
    Malone-Lee, John
    Neven, Gregory
    Schuldt, Jacob C. N.
    Smart, Nigel P.
    JOURNAL OF CRYPTOLOGY, 2011, 24 (01) : 42 - 82