Threshold public key encryption scheme resilient against continual leakage without random oracles

被引:0
|
作者
Xiujie Zhang
Chunxiang Xu
Wenzheng Zhang
Wanpeng Li
机构
[1] University of Electronic Science and Technology of China,School of Computer Science and Engineering
[2] The 30th Research Institute of China Electronics Technology Group Corporation,Science and Technology on Communication Security Laboratory
来源
关键词
leakage-resilient; continual leakage; Threshold Public Key Encryption; adaptive chosen ciphertext security; standard model;
D O I
暂无
中图分类号
学科分类号
摘要
Threshold public key encryption allows a set of servers to decrypt a ciphertext if a given threshold of authorized servers cooperate. In the setting of threshold public key encryption, we consider the question of how to correctly decrypt a ciphertext where all servers continually leak information about their secret keys to an external attacker. Dodis et al. and Akavia et al. show two concrete schemes on how to store secrets on continually leaky servers. However, their constructions are only interactive between two servers. To achieve continual leakage security among more than two servers, we give the first threshold public key encryption scheme against adaptively chosen ciphertext attack in the continual leakage model under three static assumptions. In our model, the servers update their keys individually and asynchronously, without any communication between two servers. Moreover, the update procedure is re-randomized and the randomness can leak as well.
引用
收藏
页码:955 / 968
页数:13
相关论文
共 50 条
  • [21] A leakage-resilient certificateless public key encryption scheme with CCA2 security
    Yan-wei ZHOU
    Bo YANG
    Hao CHENG
    Qing-long WANG
    Frontiers of Information Technology & Electronic Engineering, 2018, 19 (04) : 481 - 493
  • [22] CCA2 secure public-key encryption scheme tolerating continual leakage attacks
    Zhou, YanWei
    Yang, Bo
    Zhang, Wenzheng
    Mu, Yi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4505 - 4519
  • [23] Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing
    Zhou, Yanwei
    Yang, Bo
    INFORMATION PROCESSING LETTERS, 2018, 130 : 16 - 24
  • [24] Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Tsai, Tung-Tso
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2020, 1 (01): : 131 - 144
  • [25] Practical Hierarchical Identity Based Encryption Scheme without Random Oracles
    Hu, Xiaoming
    Huang, Shangteng
    Fan, Xun
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (06) : 1494 - 1499
  • [26] An Efficient Certificate-Based Encryption Scheme Without Random Oracles
    Guo, Lan
    Lu, Yang
    Miao, Qing
    Zu, Guangao
    Wang, Zhongqi
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 97 - 107
  • [27] Cryptanalysis of an identity based broadcast encryption scheme without random oracles
    Wang, Xu An
    Weng, Jian
    Yang, Xiaoyuan
    Yang, Yanjiang
    INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 461 - 464
  • [28] Forward-Secure Identity-Based Public-Key Encryption without Random Oracles
    Yu, Jia
    Cheng, Xiangguo
    Hao, Rong
    Kong, Fanyu
    Fan, Jianxi
    FUNDAMENTA INFORMATICAE, 2011, 111 (02) : 241 - 256
  • [29] Leakage-Resilient Public-Key Encryption from Obfuscation
    Dachman-Soled, Dana
    Gordon, S. Dov
    Liu, Feng-Hao
    O'Neill, Adam
    Zhou, Hong-Sheng
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 101 - 128
  • [30] Identity-based Threshold Decryption Scheme Without Random Oracles
    Ming Yang
    Wang Yumin
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (02): : 323 - 328