Public-Key Encryption Resilient to Linear Related-Key Attacks

被引:0
|
作者
Cui, Hui [1 ]
Mu, Yi [1 ]
Au, Man Ho [1 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
关键词
Public-key encryption; Related-key attack; CC-RKA security; SECURE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we consider the security of public-key encryption schemes under linear related-key attacks, where an adversary is allowed to tamper the private key stored in a hardware device, and subsequently observe the outcome of a public-key encryption system under this modified private key. Following the existing work done in recent years, we define the security model for related-key attack (RKA) secure public-key encryption schemes as chosen-ciphertext and related-key attack (CC-RKA) security, in which we allow an adversary to issue queries to the decryption oracle on the linear shifts of the private keys. On the basis of the adaptive trapdoor relations via the one-time signature schemes, Wee (PKC'12) proposed a generic construction of public-key encryption schemes in the setting of related-key attacks, and some instantiations from Factoring, BDDH with CC-RKA security, and DDH but with a weaker CC-RKA security. These schemes are efficient, but one-time signatures still have their price such that in some cases they are not very efficient compared to those without one-time signatures. Bellare, Paterson and Thomson (ASIACRYPT'12) put forward a generic method to build RKA secure public-key encryption schemes, which is transformed from the identity-based encryption schemes. However, so far, the efficient identity-based encryption schemes are generally based on parings. To generate a specific construction of public-key encryption schemes against related-key attacks without pairings, after analyzing the related-key attack on the Cramer-Shoup basic public-key encryption scheme, we present an efficient public-key encryption scheme resilient against related-key attacks without using one-time signature schemes from DDH. Finally, we prove the CC-RKA security of our scheme without random oracles.
引用
收藏
页码:182 / 196
页数:15
相关论文
共 50 条
  • [1] Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 268 - 275
  • [2] Intrusion-resilient public-key encryption
    Dodis, Y
    Franklin, M
    Katz, J
    Miyaji, A
    Yung, M
    TOPICS IN CRYPTOLOGY - CT-RSA 2003, PROCEEDINGS, 2003, 2612 : 19 - 32
  • [3] Proof of retrievability with public verifiability resilient against related-key attacks
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    IET INFORMATION SECURITY, 2015, 9 (01) : 43 - 49
  • [4] Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs
    Hu, Chengyu
    Liu, Pengtao
    Guo, Shanqing
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2016, 7 (05) : 681 - 692
  • [5] Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs
    Chengyu Hu
    Pengtao Liu
    Shanqing Guo
    Journal of Ambient Intelligence and Humanized Computing, 2016, 7 : 681 - 692
  • [6] PUBLIC-KEY ENCRYPTION
    STUBBS, E
    EDN MAGAZINE-ELECTRICAL DESIGN NEWS, 1984, 29 (04): : 29 - 29
  • [7] Public Key Encryption against Related Key Attacks
    Wee, Hoeteck
    PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 262 - 279
  • [8] Public key encryption resilient to leakage and tampering attacks
    Sun, Shi-Feng
    Gu, Dawu
    Parampalli, Udaya
    Yu, Yu
    Qin, Baodong
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 89 : 142 - 156
  • [9] Tightly Secure Encryption Schemes against Related-Key Attacks
    Han, Shuai
    Liu, Shengli
    Lyu, Lin
    Gu, Dawu
    COMPUTER JOURNAL, 2018, 61 (12): : 1825 - 1844
  • [10] Leakage-Resilient Public-Key Encryption from Obfuscation
    Dachman-Soled, Dana
    Gordon, S. Dov
    Liu, Feng-Hao
    O'Neill, Adam
    Zhou, Hong-Sheng
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 101 - 128