Practical continuous leakage-resilient CCA secure identity-based encryption

被引:0
|
作者
Yanwei Zhou
Bo Yang
机构
[1] Shaanxi Normal University,School of Computer Science
[2] State Key Laboratory of Cryptology,undefined
来源
关键词
identity-based encryption; CCA security; continuous leakage-resilience; standard model;
D O I
暂无
中图分类号
学科分类号
摘要
Leakage of private information including private keys of user has become a threat to the security of computing systems. It has become a common security requirement that a cryptographic scheme should withstand various leakage attacks. In the real life, an adversary can break the security of cryptography primitive by performing continuous leakage attacks. Although, some research on the leakage-resilient cryptography had been made, there are still some remaining issued in previous attempts. The identity-based encryption (IBE) constructions were designed in the bounded-leakage model, and might not be able to meet their claimed security under the continuous-leakage attacks. In the real applications, the leakage is unbounded. That is, a practical cryptography scheme should keep its original security in the continuous leakage setting. The previous continuous leakage-resilient IBE schemes either only achieve chosen-plaintext attacks security or the chosen-ciphertext attacks (CCA) security is proved in the selective identity model. Aiming to solve these problems, in this paper, we show how to construct the continuous leakage-resilient IBE scheme, and the scheme’s adaptive CCA security is proved in the standard model based on the hardness of decisional bilinear Diffie-Hellman exponent assumption. For any adversary, all elements in the ciphertext are random, and an adversary cannot obtain any leakage on the private key of user from the corresponding given ciphertext. Moreover, the leakage parameter of our proposal is independent of the plaintext space and has a constant size.
引用
收藏
相关论文
共 50 条
  • [21] Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting
    Cai, Cailing
    Qin, Xianrui
    Yuen, Tsz Hon
    Yiu, Siu Ming
    [J]. ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 42 - 53
  • [22] Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security
    Zhou, Yanwei
    Yang, Bo
    [J]. COMPUTER JOURNAL, 2017, 60 (08): : 1161 - 1172
  • [23] CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not q-type) Assumptions
    Tomita, Toi
    Ogata, Wakaha
    Kurosawa, Kaoru
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2019, 2019, 11689 : 3 - 22
  • [24] Secure and practical identity-based encryption
    Naccache, D.
    [J]. IET INFORMATION SECURITY, 2007, 1 (02) : 59 - 64
  • [25] Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage
    Li, Jiguo
    Guo, Yuyan
    Yu, Qihong
    Lu, Yang
    Zhang, Yichen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (10) : 1016 - 1024
  • [26] Continuous leakage-resilient certificate-based encryption
    Li, Jiguo
    Guo, Yuyan
    Yu, Qihong
    Lu, Yang
    Zhang, Yichen
    Zhang, Futai
    [J]. INFORMATION SCIENCES, 2016, 355 : 1 - 14
  • [27] Leakage-resilient identity-based cryptography from minimal assumptions
    Yanwei Zhou
    Bo Yang
    Zirui Qiao
    Zhe Xia
    Mingwu Zhang
    Yi Mu
    [J]. Designs, Codes and Cryptography, 2023, 91 : 3757 - 3801
  • [28] Leakage-resilient identity-based cryptography from minimal assumptions
    Zhou, Yanwei
    Yang, Bo
    Qiao, Zirui
    Xia, Zhe
    Zhang, Mingwu
    Mu, Yi
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (11) : 3757 - 3801
  • [29] Leakage-resilient Attribute-Based Encryption with CCA2 security
    Zhang, Leyou
    Shang, Yujie
    [J]. International Journal of Network Security, 2019, 21 (05) : 819 - 827
  • [30] Identity-Based Encryption Resilient to Continual Auxiliary Leakage
    Yuen, Tsz Hon
    Chow, Sherman S. M.
    Zhang, Ye
    Yiu, Siu Ming
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 117 - 134