Leakage-Resilient Hybrid Signcryption in Heterogeneous Public-key Systems

被引:0
作者
Ho, Ting-Chieh [1 ]
Tseng, Yuh-Min [1 ]
Huang, Sen-Shan [1 ]
机构
[1] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
关键词
heterogeneous public-key systems; side-channel attack; leakage-resilience; signcryption; IDENTITY-BASED ENCRYPTION; EFFICIENT SIGNCRYPTION; PROTOCOL; COMMUNICATION; CRYPTOGRAPHY; SCHEME;
D O I
10.15388/24-INFOR546
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Signcryption integrates both signature and encryption schemes into single scheme to ensure both content unforgeability (authentication) and message confidentiality while reducing computational complexity. Typically, both signers (senders) and decrypters (receivers) in a signcryption scheme belong to the same public -key systems. When signers and decrypters in a signcryption scheme belong to heterogeneous public -key systems, this scheme is called a hybrid signcryption scheme which provides more elastic usage than typical signcryption schemes. In recent years, a new kind of attack, named side -channel attack, allows adversaries to learn a portion of the secret keys used in cryptographic algorithms. To resist such an attack, leakage -resilient cryptography has been widely discussed and studied while a large number of leakage -resilient schemes have been proposed. Also, numerous hybrid signcryption schemes under heterogeneous public -key systems were proposed, but none of them possesses leakage -resilient property. In this paper, we propose the first hybrid signcryption scheme with leakage resilience, called leakage -resilient hybrid signcryption scheme, in heterogeneous public -key systems (LR-HSC-HPKS). Security proofs are demonstrated to show that the proposed scheme provides both authentication and confidentiality against two types of adversaries in heterogeneous public -key systems.
引用
收藏
页码:131 / 154
页数:24
相关论文
共 43 条
[1]  
Akavik A, 2009, LECT NOTES COMPUT SC, V5444, P474
[2]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[3]   An Efficient Hybrid Signcryption Scheme With Conditional Privacy-Preservation for Heterogeneous Vehicular Communication in VANETs [J].
Ali, Ikram ;
Lawrence, Tandoh ;
Omala, Anyembe Andrew ;
Li, Fagen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (10) :11266-11280
[4]  
Alwen J, 2009, LECT NOTES COMPUT SC, V5677, P36, DOI 10.1007/978-3-642-03356-8_3
[5]   Formal proofs for the security of signcryption [J].
Baek, Joonsang ;
Steinfeld, Ron ;
Zheng, Yuliang .
JOURNAL OF CRYPTOLOGY, 2007, 20 (02) :203-235
[6]  
Barbosa M., 2008, P 2008 ACM S INF COM, P369
[7]  
Biham E, 2008, LECT NOTES COMPUT SC, V5157, P221, DOI 10.1007/978-3-540-85174-5_13
[8]   Hierarchical identity based encryption with constant size ciphertext [J].
Boneh, D ;
Boyen, X ;
Goh, EJ .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :440-456
[9]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[10]   Remote timing attacks are practical [J].
Brumley, D ;
Boneh, D .
COMPUTER NETWORKS, 2005, 48 (05) :701-716