New leakage-resilient CCA-secure public key encryption

被引:8
|
作者
Kurosawa, Kaoru [1 ]
Nojima, Ryo [2 ]
Phong, Le Trieu [2 ]
机构
[1] Ibaraki Univ, Dept Comp & Informat Sci, Mito, Ibaraki, Japan
[2] Natl Inst Informat & Commun Technol NICT, Tokyo, Japan
关键词
Public key encryption; CCA security; leakage-resilience; hash proof system;
D O I
10.1515/jmc-2013-5007
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper shows a generic method of constructing CCA-secure public key encryption schemes with leakage-resilience on the secret key. It is based on a new kind of universal(2) hash proof system which accepts an auxiliary parameter. Specifically, two schemes are presented, basing on the DCR assumption and DLIN assumption respectively.
引用
收藏
页码:297 / 312
页数:16
相关论文
共 50 条
  • [1] A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme
    Li, Jiguo
    Teng, Meilin
    Zhang, Yichen
    Yu, Qihong
    [J]. COMPUTER JOURNAL, 2016, 59 (07): : 1066 - 1075
  • [2] Continuous leakage-resilient certificateless public key encryption with CCA security
    Zhou, Yanwei
    Yang, Bo
    [J]. KNOWLEDGE-BASED SYSTEMS, 2017, 136 : 27 - 36
  • [3] Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption
    Hu, Chengyu
    Yu, Zuoxia
    Yang, Rupeng
    Xu, Qiuliang
    Zhou, Yongbin
    Yuan, Qixia
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) : 216 - 229
  • [4] Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security
    Zhou, Yanwei
    Yang, Bo
    [J]. COMPUTER JOURNAL, 2017, 60 (08): : 1161 - 1172
  • [5] CCA-Secure Leakage-Resilient Identity-Based Encryption without q-Type Assumptions
    Tomita, Toi
    Ogata, Wakaha
    Kurosawa, Kaoru
    Kuwayama, Ryo
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (10) : 1157 - 1166
  • [6] Structure-preserving public-key encryption with leakage-resilient CCA security
    Lyu, Lin
    Liu, Shengli
    Gu, Dawu
    [J]. THEORETICAL COMPUTER SCIENCE, 2019, 795 : 57 - 80
  • [7] A leakage-resilient certificateless public key encryption scheme with CCA2 security
    Yan-wei ZHOU
    Bo YANG
    Hao CHENG
    Qing-long WANG
    [J]. Frontiers of Information Technology & Electronic Engineering, 2018, 19 (04) : 481 - 493
  • [8] Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing
    Zhou, Yanwei
    Yang, Bo
    [J]. INFORMATION PROCESSING LETTERS, 2018, 130 : 16 - 24
  • [9] Practical continuous leakage-resilient CCA secure identity-based encryption
    Zhou, Yanwei
    Yang, Bo
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2020, 14 (04)
  • [10] Practical continuous leakage-resilient CCA secure identity-based encryption
    Yanwei Zhou
    Bo Yang
    [J]. Frontiers of Computer Science, 2020, 14