Leakage-resilient attribute based encryption in prime-order groups via predicate encodings

被引:0
|
作者
Jie Zhang
Jie Chen
Junqing Gong
Aijun Ge
Chuangui Ma
机构
[1] State Key Laboratory of Mathematical Engineering and Advanced Computing,Department of Computer Science and Engineering
[2] East China Normal University,undefined
[3] ENS de Lyon,undefined
[4] Laboratoire LIP (U. Lyon,undefined
[5] CNRS,undefined
[6] ENSL,undefined
[7] INRIA,undefined
[8] UCBL),undefined
[9] Shanghai Jiao Tong University,undefined
[10] Army Aviation Institute,undefined
来源
关键词
Attribute-based encryption; Leakage resilient; Prime-order groups; Predicate encodings; 68P25; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, leakage-resilient cryptography has become a hot research topic. It seeks to build more robust models of adversarial access to cryptographic algorithms. The main goal is to design a scheme that remains secure even when arbitrary, yet bounded, information about secret key is leaked. In this paper, we present a modular framework for designing leakage-resilient attribute-based encryption (ABE) schemes based on extended predicate encoding. We first extend the predicate encoding to the leakage-resilient predicate encoding; and then, design several leakage-resilient predicate encodings, and finally give a generic construction of leakage-resilient ABE based on the newly proposed encodings. Moreover, we can instantiate our framework in prime order bilinear groups to obtain concrete constructions, and prove their full security under the standard k-Lin assumption in the continual memory leakage model.
引用
收藏
页码:1339 / 1366
页数:27
相关论文
共 50 条
  • [41] Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model
    Zhang, Leyou
    Wang, Zhuanning
    Wu, Qing
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 201 - 210
  • [42] Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
    Chow, Sherman S. M.
    Dodis, Yevgeniy
    Rouselakis, Yannis
    Waters, Brent
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 152 - 161
  • [43] Practical continuous leakage-resilient CCA secure identity-based encryption
    Yanwei Zhou
    Bo Yang
    Frontiers of Computer Science, 2020, 14
  • [44] Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups
    Li, Xiaoyi
    Liang, Kaitai
    Liu, Zhen
    Wong, Duncan
    CLOSER: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2017, : 281 - 292
  • [45] Boosting CPA to CCA2 for Leakage-Resilient Attribute-Based Encryption by Using New QA-NIZK
    Tomita, Toi
    Ogata, Wakaha
    Kurosawa, Kaoru
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105A (03) : 143 - 159
  • [46] Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings
    Zhou, Yanwei
    Yang, Bo
    Wang, Tao
    Xia, Zhe
    Hou, Hongxia
    COMPUTER JOURNAL, 2020, 63 (04): : 508 - 524
  • [47] Identity-Based and Leakage-Resilient Broadcast Encryption Scheme for Cloud Storage Service
    Yu, Qihong
    Li, Jiguo
    Ji, Sai
    APPLIED SCIENCES-BASEL, 2022, 12 (22):
  • [48] Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
    Freeman, David Mandell
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 44 - 61
  • [49] Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting
    Cai, Cailing
    Qin, Xianrui
    Yuen, Tsz Hon
    Yiu, Siu Ming
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 42 - 53
  • [50] TEDT2-Highly Secure Leakage-Resilient TBC-Based Authenticated Encryption
    List, Eik
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2021, 2021, 12912 : 275 - 295