Leakage-resilient attribute based encryption in prime-order groups via predicate encodings

被引:0
|
作者
Jie Zhang
Jie Chen
Junqing Gong
Aijun Ge
Chuangui Ma
机构
[1] State Key Laboratory of Mathematical Engineering and Advanced Computing,Department of Computer Science and Engineering
[2] East China Normal University,undefined
[3] ENS de Lyon,undefined
[4] Laboratoire LIP (U. Lyon,undefined
[5] CNRS,undefined
[6] ENSL,undefined
[7] INRIA,undefined
[8] UCBL),undefined
[9] Shanghai Jiao Tong University,undefined
[10] Army Aviation Institute,undefined
来源
关键词
Attribute-based encryption; Leakage resilient; Prime-order groups; Predicate encodings; 68P25; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, leakage-resilient cryptography has become a hot research topic. It seeks to build more robust models of adversarial access to cryptographic algorithms. The main goal is to design a scheme that remains secure even when arbitrary, yet bounded, information about secret key is leaked. In this paper, we present a modular framework for designing leakage-resilient attribute-based encryption (ABE) schemes based on extended predicate encoding. We first extend the predicate encoding to the leakage-resilient predicate encoding; and then, design several leakage-resilient predicate encodings, and finally give a generic construction of leakage-resilient ABE based on the newly proposed encodings. Moreover, we can instantiate our framework in prime order bilinear groups to obtain concrete constructions, and prove their full security under the standard k-Lin assumption in the continual memory leakage model.
引用
收藏
页码:1339 / 1366
页数:27
相关论文
共 50 条
  • [31] Continuous Leakage-Resilient Identity-Based Encryption with Tight Security
    Zhou, Yanwei
    Yang, Bo
    Hou, Hongxia
    Zhang, Lina
    Wang, Tao
    Hu, Mingxiao
    COMPUTER JOURNAL, 2019, 62 (08): : 1092 - 1105
  • [32] A New Construction of Leakage-Resilient Identity-Based Encryption Scheme
    Qiao, Zirui
    Xu, Ran
    Lu, Yonghui
    Zhou, Yanwei
    Yang, Bo
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024, 2025, 15053 : 133 - 150
  • [33] Tag-based ABE in prime-order groups via pair encoding
    Atsushi Takayasu
    Designs, Codes and Cryptography, 2021, 89 : 1927 - 1963
  • [34] Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity
    Zhang, Yinghui
    Yang, Menglei
    Zheng, Dong
    Zhang, Tiantian
    Guo, Rui
    Ren, Fang
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 665 - 681
  • [35] Continuous Leakage-Resilient Identity-Based Encryption Scheme with CCA Security
    Zhou Yanwei
    Yang Bo
    CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (04) : 682 - 689
  • [36] Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    COMPUTER JOURNAL, 2018, 61 (04): : 586 - 600
  • [37] A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme
    Li, Jiguo
    Teng, Meilin
    Zhang, Yichen
    Yu, Qihong
    COMPUTER JOURNAL, 2016, 59 (07): : 1066 - 1075
  • [38] Continuous Leakage-resilient and Hierarchical Identity-based Online/Offline Encryption
    Yu, Qihong
    Shen, Jian
    Lai, Jin-Feng
    Ji, Sai
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (06): : 1287 - 1296
  • [39] Practical continuous leakage-resilient CCA secure identity-based encryption
    Zhou, Yanwei
    Yang, Bo
    FRONTIERS OF COMPUTER SCIENCE, 2020, 14 (04)
  • [40] Continuous Leakage-Resilient Identity-Based Encryption Scheme with CCA Security
    ZHOU Yanwei
    YANG Bo
    Chinese Journal of Electronics, 2019, 28 (04) : 682 - 689