Threshold public key encryption scheme resilient against continual leakage without random oracles

被引:0
|
作者
Xiujie Zhang
Chunxiang Xu
Wenzheng Zhang
Wanpeng Li
机构
[1] University of Electronic Science and Technology of China,School of Computer Science and Engineering
[2] The 30th Research Institute of China Electronics Technology Group Corporation,Science and Technology on Communication Security Laboratory
来源
关键词
leakage-resilient; continual leakage; Threshold Public Key Encryption; adaptive chosen ciphertext security; standard model;
D O I
暂无
中图分类号
学科分类号
摘要
Threshold public key encryption allows a set of servers to decrypt a ciphertext if a given threshold of authorized servers cooperate. In the setting of threshold public key encryption, we consider the question of how to correctly decrypt a ciphertext where all servers continually leak information about their secret keys to an external attacker. Dodis et al. and Akavia et al. show two concrete schemes on how to store secrets on continually leaky servers. However, their constructions are only interactive between two servers. To achieve continual leakage security among more than two servers, we give the first threshold public key encryption scheme against adaptively chosen ciphertext attack in the continual leakage model under three static assumptions. In our model, the servers update their keys individually and asynchronously, without any communication between two servers. Moreover, the update procedure is re-randomized and the randomness can leak as well.
引用
收藏
页码:955 / 968
页数:13
相关论文
共 50 条
  • [31] Adaptively anonymous public-key broadcast encryption scheme without random oracle
    Wang, Hao
    Wu, Lei
    Journal of Networks, 2014, 9 (06) : 1656 - 1663
  • [32] Parallel Key-Insulated Signature Scheme without Random Oracles
    Wan, Zhongmei
    Li, Jiguo
    Hong, Xuan
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (03) : 252 - 257
  • [33] Identity-Based Encryption Resilient to Continual Auxiliary Leakage
    Yuen, Tsz Hon
    Chow, Sherman S. M.
    Zhang, Ye
    Yiu, Siu Ming
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 117 - 134
  • [34] Parallel key-insulated signature scheme without random oracles
    1600, Korean Institute of Communications and Information Sciences (15):
  • [35] Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage
    Brakerski, Zvika
    Kalai, Yael Tauman
    Katz, Jonathan
    Vaikuntanathan, Vinod
    2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, : 501 - 510
  • [36] Public Immunization Against Complete Subversion Without Random Oracles
    Ateniese, Giuseppe
    Francati, Danilo
    Magri, Bernardo
    Venturi, Daniele
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 465 - 485
  • [37] Public key searchable encryption without random oracle
    Zhang, X. (zxf071714229@hotmail.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [38] Adaptively Secure Identity-based Threshold Broadcast Encryption without Random Oracles
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    SMART MATERIALS AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2011, 143-144 : 347 - +
  • [39] Efficient leakage-resilient public key encryption from DDH assumption
    Sujuan Li
    Futai Zhang
    Yinxia Sun
    Limin Shen
    Cluster Computing, 2013, 16 : 797 - 806
  • [40] New leakage-resilient CCA-secure public key encryption
    Kurosawa, Kaoru
    Nojima, Ryo
    Phong, Le Trieu
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2013, 7 (04) : 297 - 312