Continuous leakage-resilient identity-based encryption with leakage amplification

被引:0
|
作者
Yanwei Zhou
Bo Yang
Yi Mu
机构
[1] Shaanxi Normal University,School of Computer Science
[2] State Key Laboratory of Cryptology,School of Mathematics and Computer Science
[3] Fujian Normal University,State Key Laboratory of Information Security, Institute of Information Engineering
[4] Chinese Academy of Sciences,undefined
来源
Designs, Codes and Cryptography | 2019年 / 87卷
关键词
Identity-based encryption; Continuous leakage-resilience leakage amplification; Chosen ciphertext attacks; 68P25; 68Q30; 68W40; 68Q10;
D O I
暂无
中图分类号
学科分类号
摘要
In modern computer systems, leakage of private information may cause catastrophic consequences, especially those are related to the secret keys in cryptographic mechanisms. Therefore, it has been widely accepted both in academia and industry that cryptographic schemes should withstand various leakage attacks, including the continuous leakage attacks. Although a lot of researches have been conducted towards this issue and some progresses have been made, there are still many unsolved problems in this area. For example, in the majority of the existing identity-based encryption (IBE) schemes with (continuous) leakage resilience, the upper bound of leakage is required to be fixed. But in many real-world applications, such a requirement is inadequate to protect the schemes against the leakage attacks. Moreover, many previous efforts aiming to build IBE schemes that are secure against the chosen-ciphertext attacks (CCA) need to rely on the q-type assumptions. But these solutions are not desirable, because the q-type assumptions are non-static assumptions. In this paper, in order to address the above mentioned problems, we demonstrate how to construct a continuous leakage-resilient CCA-secure IBE scheme with leakage amplification, in which the leakage parameter has an arbitrary length. The benefit is that the length of permitted leakage in our scheme can be adjusted flexibly according to the leakage requirements. Moreover, the security of our proposed scheme can be proved with static assumptions in the standard model. Compared with the related works in the literature, our scheme enjoys a unique feature that it allows continuous leakage of multiple keys simultaneously, e.g. continuous leakage of the master secret key as well as the user’s private key.
引用
收藏
页码:2061 / 2090
页数:29
相关论文
共 50 条
  • [41] Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes
    Qi-Qi Lai
    Bo Yang
    Yong Yu
    Zhe Xia
    Yan-Wei Zhou
    Yuan Chen
    Journal of Computer Science and Technology, 2018, 33 : 1243 - 1260
  • [42] Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes
    Lai, Qi-Qi
    Yang, Bo
    Yu, Yong
    Xia, Zhe
    Zhou, Yan-Wei
    Chen, Yuan
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2018, 33 (06) : 1243 - 1260
  • [43] Leakage-Resilient Functional Encryption via Pair Encodings
    Yu, Zuoxia
    Au, Man Ho
    Xu, Qiuliang
    Yang, Rupeng
    Han, Jinguang
    INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 443 - 460
  • [44] Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security
    Zhou, Yanwei
    Yang, Bo
    COMPUTER JOURNAL, 2017, 60 (08): : 1161 - 1172
  • [45] An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE SYSTEMS JOURNAL, 2019, 13 (04): : 3968 - 3979
  • [46] Verifiable memory leakage-resilient dynamic searchable encryption
    Guan, Wenhao
    Wang, Yunling
    Wang, Jianfeng
    Fu, Xiaotong
    JOURNAL OF HIGH SPEED NETWORKS, 2018, 24 (03) : 201 - 217
  • [47] Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments
    Tseng, Yuh-Min
    Wu, Jui-Di
    Hung, Ruo-Wei
    Chien, Hung-Yu
    2018 9TH INTERNATIONAL CONFERENCE ON AWARENESS SCIENCE AND TECHNOLOGY (ICAST), 2018, : 251 - 256
  • [48] Continuous leakage-resilient IBE in cloud computing
    Xiang, Xinyin
    Zhao, Xingwen
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (10)
  • [49] Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding
    Zhang, Yijian
    Ling, Yunhao
    Chen, Jie
    Wang, Luping
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2023, PT II, 2024, 14562 : 113 - 132
  • [50] Anonymous Identity-Based Encryption with Bounded Leakage Resilience
    Liu, Pengtao
    Hu, Chengyu
    Guo, Shanqing
    Wang, Yilei
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 287 - 292