Public-Key Encryption Resilient to Linear Related-Key Attacks

被引:0
|
作者
Cui, Hui [1 ]
Mu, Yi [1 ]
Au, Man Ho [1 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
关键词
Public-key encryption; Related-key attack; CC-RKA security; SECURE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we consider the security of public-key encryption schemes under linear related-key attacks, where an adversary is allowed to tamper the private key stored in a hardware device, and subsequently observe the outcome of a public-key encryption system under this modified private key. Following the existing work done in recent years, we define the security model for related-key attack (RKA) secure public-key encryption schemes as chosen-ciphertext and related-key attack (CC-RKA) security, in which we allow an adversary to issue queries to the decryption oracle on the linear shifts of the private keys. On the basis of the adaptive trapdoor relations via the one-time signature schemes, Wee (PKC'12) proposed a generic construction of public-key encryption schemes in the setting of related-key attacks, and some instantiations from Factoring, BDDH with CC-RKA security, and DDH but with a weaker CC-RKA security. These schemes are efficient, but one-time signatures still have their price such that in some cases they are not very efficient compared to those without one-time signatures. Bellare, Paterson and Thomson (ASIACRYPT'12) put forward a generic method to build RKA secure public-key encryption schemes, which is transformed from the identity-based encryption schemes. However, so far, the efficient identity-based encryption schemes are generally based on parings. To generate a specific construction of public-key encryption schemes against related-key attacks without pairings, after analyzing the related-key attack on the Cramer-Shoup basic public-key encryption scheme, we present an efficient public-key encryption scheme resilient against related-key attacks without using one-time signature schemes from DDH. Finally, we prove the CC-RKA security of our scheme without random oracles.
引用
收藏
页码:182 / 196
页数:15
相关论文
共 50 条
  • [21] LUC - PUBLIC-KEY ENCRYPTION
    SMITH, P
    DR DOBBS JOURNAL, 1993, 18 (01): : 44 - &
  • [22] Multipurpose Public-Key Encryption
    Zhang, Rui
    He, Kai
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 69 - 84
  • [23] Related Randomness Attacks for Public Key Encryption
    Paterson, Kenneth G.
    Schuldt, Jacob C. N.
    Sibborn, Dale L.
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 465 - 482
  • [24] Related-Key Zero-Correlation Linear Attacks on Block Ciphers with Linear Key Schedules
    Yi, Zhang
    Kai, Zhang
    Ting, Cui
    CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (03) : 672 - 682
  • [25] Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond
    Persiano, Giuseppe
    Phan, Duong Hieu
    Yung, Moti
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 422 - 455
  • [26] Related-key security for hybrid encryption
    Lu, Xianhui (xhlu@is.ac.cn), 1600, Springer Verlag (8783):
  • [27] Public-key encryption indistinguishable under plaintext-checkable attacks
    Abdalla, Michel
    Benhamouda, Fabrice
    Pointcheval, David
    IET INFORMATION SECURITY, 2016, 10 (06) : 288 - 303
  • [28] Related-key boomerang and rectangle attacks
    Biham, E
    Dunkelman, O
    Keller, N
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 507 - 525
  • [29] Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
    Abdalla, Michel
    Benhamouda, Fabrice
    Pointcheval, David
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 332 - 352
  • [30] A Unified Approach to Related-Key Attacks
    Biham, Eli
    Dunkelman, Orr
    Keller, Nathan
    FAST SOFTWARE ENCRYPTION, 2008, 5086 : 73 - +