Efficient leakage-resilient public key encryption from DDH assumption

被引:0
|
作者
Sujuan Li
Futai Zhang
Yinxia Sun
Limin Shen
机构
[1] Nanjing Normal University,
[2] Nanjing University of Technology,undefined
来源
Cluster Computing | 2013年 / 16卷
关键词
Decisional Diffie-Hellman assumption; Adaptive posteriori chosen ciphertext attack; Leakage resilient; Cramer-Shoup encryption; Key leakage; Standard model;
D O I
暂无
中图分类号
学科分类号
摘要
For an encryption scheme to be applied in practical applications, it should withstand various leakage attacks. In this paper, we present a new leakage-resilient public key encryption scheme whose security is based on the classical DDH (decisional Diffie-Hellman) assumption. In the computational cost, our proposed scheme is more efficient than the original Cramer-Shoup leakage-resilient public key encryption scheme. At the same time, our new scheme also enjoys a shorter (public and secret) key length, and a higher relative key leakage ratio. We formally prove our new proposal is semantically secure against adaptive posteriori chosen ciphertext key-leakage attacks assuming the hardness of the DDH problem without random models.
引用
收藏
页码:797 / 806
页数:9
相关论文
共 50 条
  • [41] Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
    Armknecht, Frederik
    Maes, Roel
    Sadeghi, Ahmad-Reza
    Sunar, Berk
    Tuyls, Pim
    TOWARDS HARDWARE-INTRINSIC SECURITY: FOUNDATIONS AND PRACTICE, 2010, : 135 - 164
  • [42] Leakage-Resilient Symmetric Encryption via Re-keying
    Abdalla, Michel
    Belaid, Sonia
    Fouque, Pierre-Alain
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2013, 2013, 8086 : 471 - 488
  • [43] Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate
    Zhang, Mingwu
    Yang, Bo
    Takagi, Tsuyoshi
    COMPUTER JOURNAL, 2013, 56 (04): : 464 - 477
  • [44] Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
    Armknecht, Frederik
    Maes, Roel
    Sadeghi, Ahmad-Reza
    Sunar, Berk
    Tuyls, Pim
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 685 - +
  • [45] Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
    Qin, Baodong
    Liu, Shengli
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT II, 2013, 8270 : 381 - 400
  • [46] Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System
    Zhang, Leyou
    Zhang, Jingxia
    Mu, Yi
    COMPUTER JOURNAL, 2017, 60 (04): : 541 - 554
  • [47] Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments
    Tseng, Yuh-Min
    Wu, Jui-Di
    Hung, Ruo-Wei
    Chien, Hung-Yu
    2018 9TH INTERNATIONAL CONFERENCE ON AWARENESS SCIENCE AND TECHNOLOGY (ICAST), 2018, : 251 - 256
  • [48] Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
    Wang, Huige
    Chen, Kefei
    Liu, Joseph K.
    Hu, Ziyuan
    INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC 2018), 2018, 11125 : 119 - 140
  • [49] Efficient Leakage-Resilient MACs Without Idealized Assumptions
    Berti, Francesco
    Guo, Chun
    Peters, Thomas
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT II, 2021, 13091 : 95 - 123
  • [50] Efficient leakage-resilient blind and partially blind signatures
    Dai, Shuguang
    Jiang, Zhengjun
    Zhang, Fangguo
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2018, 10 (01) : 52 - 61