Efficient leakage-resilient public key encryption from DDH assumption

被引:0
|
作者
Sujuan Li
Futai Zhang
Yinxia Sun
Limin Shen
机构
[1] Nanjing Normal University,
[2] Nanjing University of Technology,undefined
来源
Cluster Computing | 2013年 / 16卷
关键词
Decisional Diffie-Hellman assumption; Adaptive posteriori chosen ciphertext attack; Leakage resilient; Cramer-Shoup encryption; Key leakage; Standard model;
D O I
暂无
中图分类号
学科分类号
摘要
For an encryption scheme to be applied in practical applications, it should withstand various leakage attacks. In this paper, we present a new leakage-resilient public key encryption scheme whose security is based on the classical DDH (decisional Diffie-Hellman) assumption. In the computational cost, our proposed scheme is more efficient than the original Cramer-Shoup leakage-resilient public key encryption scheme. At the same time, our new scheme also enjoys a shorter (public and secret) key length, and a higher relative key leakage ratio. We formally prove our new proposal is semantically secure against adaptive posteriori chosen ciphertext key-leakage attacks assuming the hardness of the DDH problem without random models.
引用
收藏
页码:797 / 806
页数:9
相关论文
共 50 条
  • [1] Efficient leakage-resilient public key encryption from DDH assumption
    Li, Sujuan
    Zhang, Futai
    Sun, Yinxia
    Shen, Limin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 797 - 806
  • [2] Leakage-Resilient Public-Key Encryption from Obfuscation
    Dachman-Soled, Dana
    Gordon, S. Dov
    Liu, Feng-Hao
    O'Neill, Adam
    Zhou, Hong-Sheng
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 101 - 128
  • [3] Continual Leakage-Resilient Hedged Public-Key Encryption
    Huang, Meijuan
    Yang, Bo
    Zhou, Yanwei
    Hu, Xuewei
    COMPUTER JOURNAL, 2022, 65 (06): : 1574 - 1585
  • [4] New leakage-resilient CCA-secure public key encryption
    Kurosawa, Kaoru
    Nojima, Ryo
    Phong, Le Trieu
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2013, 7 (04) : 297 - 312
  • [5] Continuous leakage-resilient certificateless public key encryption with CCA security
    Zhou, Yanwei
    Yang, Bo
    KNOWLEDGE-BASED SYSTEMS, 2017, 136 : 27 - 36
  • [6] Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
    Kraemer, Juliane
    Struck, Patrick
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 315 - 337
  • [7] Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security
    Zhou, Yanwei
    Yang, Bo
    COMPUTER JOURNAL, 2017, 60 (08): : 1161 - 1172
  • [8] Structure-preserving public-key encryption with leakage-resilient CCA security
    Lyu, Lin
    Liu, Shengli
    Gu, Dawu
    THEORETICAL COMPUTER SCIENCE, 2019, 795 : 57 - 80
  • [9] A leakage-resilient certificateless public key encryption scheme with CCA2 security
    Yan-wei ZHOU
    Bo YANG
    Hao CHENG
    Qing-long WANG
    FrontiersofInformationTechnology&ElectronicEngineering, 2018, 19 (04) : 481 - 493
  • [10] Leakage-Resilient Public Key Encryption with Equality Test Resistant to Side-channel Attacks
    Tsai, Tung-tso
    Lin, Han-yu
    Chen, Yu-chi
    Chen, Yuan-chin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2025, 41 (01) : 155 - 176