Efficient leakage-resilient public key encryption from DDH assumption

被引:0
|
作者
Sujuan Li
Futai Zhang
Yinxia Sun
Limin Shen
机构
[1] Nanjing Normal University,
[2] Nanjing University of Technology,undefined
来源
Cluster Computing | 2013年 / 16卷
关键词
Decisional Diffie-Hellman assumption; Adaptive posteriori chosen ciphertext attack; Leakage resilient; Cramer-Shoup encryption; Key leakage; Standard model;
D O I
暂无
中图分类号
学科分类号
摘要
For an encryption scheme to be applied in practical applications, it should withstand various leakage attacks. In this paper, we present a new leakage-resilient public key encryption scheme whose security is based on the classical DDH (decisional Diffie-Hellman) assumption. In the computational cost, our proposed scheme is more efficient than the original Cramer-Shoup leakage-resilient public key encryption scheme. At the same time, our new scheme also enjoys a shorter (public and secret) key length, and a higher relative key leakage ratio. We formally prove our new proposal is semantically secure against adaptive posteriori chosen ciphertext key-leakage attacks assuming the hardness of the DDH problem without random models.
引用
收藏
页码:797 / 806
页数:9
相关论文
共 50 条
  • [31] Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing
    Zhou, Yanwei
    Yang, Bo
    INFORMATION PROCESSING LETTERS, 2018, 130 : 16 - 24
  • [32] Strongly Leakage-Resilient Authenticated Key Exchange
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Susilo, Willy
    Guo, Fuchun
    TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 19 - 36
  • [33] A Note on Leakage-Resilient Authenticated Key Exchange
    Chun, Ji Young
    Hwang, Jung Yeon
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (05) : 2274 - 2279
  • [34] Continuous leakage-resilient identity-based encryption with leakage amplification
    Yanwei Zhou
    Bo Yang
    Yi Mu
    Designs, Codes and Cryptography, 2019, 87 : 2061 - 2090
  • [35] Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
    Alwen, Joel
    Dodis, Yevgeniy
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 36 - 54
  • [36] Continuous leakage-resilient identity-based encryption with leakage amplification
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (09) : 2061 - 2090
  • [37] An Efficient Leakage-Resilient Authenticated Key Exchange Protocol Suitable for IoT Devices
    Peng, An-Li
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE SYSTEMS JOURNAL, 2021, 15 (04): : 5343 - 5354
  • [38] Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Tsai, Tung-Tso
    Chuang, Yun-Hsin
    Hung, Ying-Hao
    INFORMATICA, 2022, 33 (01) : 151 - 179
  • [39] Implementation of a leakage-resilient ElGamal key encapsulation mechanism
    Galindo, David
    Grossschaedl, Johann
    Liu, Zhe
    Vadnala, Praveen Kumar
    Vivek, Srinivas
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2016, 6 (03) : 229 - 238
  • [40] Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
    Chow, Sherman S. M.
    Dodis, Yevgeniy
    Rouselakis, Yannis
    Waters, Brent
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 152 - 161