Efficient leakage-resilient public key encryption from DDH assumption

被引:0
|
作者
Sujuan Li
Futai Zhang
Yinxia Sun
Limin Shen
机构
[1] Nanjing Normal University,
[2] Nanjing University of Technology,undefined
来源
Cluster Computing | 2013年 / 16卷
关键词
Decisional Diffie-Hellman assumption; Adaptive posteriori chosen ciphertext attack; Leakage resilient; Cramer-Shoup encryption; Key leakage; Standard model;
D O I
暂无
中图分类号
学科分类号
摘要
For an encryption scheme to be applied in practical applications, it should withstand various leakage attacks. In this paper, we present a new leakage-resilient public key encryption scheme whose security is based on the classical DDH (decisional Diffie-Hellman) assumption. In the computational cost, our proposed scheme is more efficient than the original Cramer-Shoup leakage-resilient public key encryption scheme. At the same time, our new scheme also enjoys a shorter (public and secret) key length, and a higher relative key leakage ratio. We formally prove our new proposal is semantically secure against adaptive posteriori chosen ciphertext key-leakage attacks assuming the hardness of the DDH problem without random models.
引用
收藏
页码:797 / 806
页数:9
相关论文
共 50 条
  • [21] New approach to practical leakage-resilient public-key cryptography
    Chakraborty, Suvradip
    Alawatugoda, Janaka
    Rangan, Chandrasekaran Pandu
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2020, 14 (01) : 172 - 201
  • [22] Efficient and leakage-resilient authenticated key transport protocol based on RSA
    Shin, SH
    Kobara, K
    Imai, H
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3531 : 269 - 284
  • [23] Leakage-Resilient Functional Encryption via Pair Encodings
    Yu, Zuoxia
    Au, Man Ho
    Xu, Qiuliang
    Yang, Rupeng
    Han, Jinguang
    INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 443 - 460
  • [24] Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE ACCESS, 2018, 6 : 17130 - 17142
  • [25] Leakage-resilient authenticated key establishment protocols
    Shin, SH
    Kobara, K
    Imai, H
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 155 - 172
  • [26] Verifiable memory leakage-resilient dynamic searchable encryption
    Guan, Wenhao
    Wang, Yunling
    Wang, Jianfeng
    Fu, Xiaotong
    JOURNAL OF HIGH SPEED NETWORKS, 2018, 24 (03) : 201 - 217
  • [27] Leakage-resilient identity-based encryption scheme
    Li, Sujuan
    Zhang, Futai
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 187 - 196
  • [28] Continuous leakage-resilient certificate-based encryption
    Li, Jiguo
    Guo, Yuyan
    Yu, Qihong
    Lu, Yang
    Zhang, Yichen
    Zhang, Futai
    INFORMATION SCIENCES, 2016, 355 : 1 - 14
  • [29] Leakage-Resilient Certificateless Key Encapsulation Scheme
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Chou, Wei-Chieh
    INFORMATICA, 2018, 29 (01) : 125 - 155
  • [30] Leakage-Resilient Anonymous Heterogeneous Multi-Receiver Hybrid Encryption in Heterogeneous Public-Key System Settings
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    Huang, Sen-Shan
    Ho, Ting-Chieh
    IEEE ACCESS, 2024, 12 : 28155 - 28168