Threshold public key encryption scheme resilient against continual leakage without random oracles

被引:0
|
作者
Xiujie Zhang
Chunxiang Xu
Wenzheng Zhang
Wanpeng Li
机构
[1] University of Electronic Science and Technology of China,School of Computer Science and Engineering
[2] The 30th Research Institute of China Electronics Technology Group Corporation,Science and Technology on Communication Security Laboratory
来源
关键词
leakage-resilient; continual leakage; Threshold Public Key Encryption; adaptive chosen ciphertext security; standard model;
D O I
暂无
中图分类号
学科分类号
摘要
Threshold public key encryption allows a set of servers to decrypt a ciphertext if a given threshold of authorized servers cooperate. In the setting of threshold public key encryption, we consider the question of how to correctly decrypt a ciphertext where all servers continually leak information about their secret keys to an external attacker. Dodis et al. and Akavia et al. show two concrete schemes on how to store secrets on continually leaky servers. However, their constructions are only interactive between two servers. To achieve continual leakage security among more than two servers, we give the first threshold public key encryption scheme against adaptively chosen ciphertext attack in the continual leakage model under three static assumptions. In our model, the servers update their keys individually and asynchronously, without any communication between two servers. Moreover, the update procedure is re-randomized and the randomness can leak as well.
引用
收藏
页码:955 / 968
页数:13
相关论文
共 50 条
  • [1] Threshold public key encryption scheme resilient against continual leakage without random oracles
    Xiujie ZHANG
    Chunxiang XU
    Wenzheng ZHANG
    Wanpeng LI
    Frontiers of Computer Science, 2013, 7 (06) : 955 - 968
  • [2] Threshold public key encryption scheme resilient against continual leakage without random oracles
    Zhang, Xiujie
    Xu, Chunxiang
    Zhang, Wenzheng
    Li, Wanpeng
    FRONTIERS OF COMPUTER SCIENCE, 2013, 7 (06) : 955 - 968
  • [3] Identity-Based Encryption Resilient to Continual Leakage Without Random Oracles
    Guo, Yuyan
    Jiang, Mingming
    Wei, Shimin
    Xie, Ming
    Sun, Mei
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 53 - 64
  • [4] Secure public-key encryption scheme without random oracles
    Tan, Chik How
    INFORMATION SCIENCES, 2008, 178 (17) : 3435 - 3442
  • [5] Chosen ciphertext secure public key threshold encryption without random oracles
    Boneh, D
    Boyen, X
    Halevi, S
    TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 226 - 243
  • [6] Continual Leakage-Resilient Hedged Public-Key Encryption
    Huang, Meijuan
    Yang, Bo
    Zhou, Yanwei
    Hu, Xuewei
    COMPUTER JOURNAL, 2022, 65 (06): : 1574 - 1585
  • [7] Compact public key encryption without full random oracles
    Yoneyama, Kazuki
    Hanaoka, Goichiro
    PERVASIVE AND MOBILE COMPUTING, 2017, 41 : 286 - 299
  • [8] An Efficient Forward-Secure Public-Key Encryption Scheme without Random Oracles
    Lu, Yang
    Li, Jiguo
    THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 22 - 25
  • [9] Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    COMPUTER JOURNAL, 2018, 61 (04): : 586 - 600
  • [10] Parallel key-insulated public key encryption without random oracles
    Libert, Benoit
    Quisquater, Jean-Jacques
    Yung, Moti
    PUBLIC KEY CRYPTOGRAPHY - PKC 2007, 2007, 4450 : 298 - +