Leakage-Resilient Key Encapsulation Mechanism with Anonymity and Multi-Receiver

被引:0
作者
Zhou Y.-W. [1 ]
Han Y. [1 ]
Xu R. [1 ]
Wang J. [2 ]
机构
[1] School of Computer Science, Shaanxi Normal University, Shaanxi, Xi’an
[2] Department of Information Construction and Management, Shaanxi Normal University, Shaanxi, Xi’an
来源
Tien Tzu Hsueh Pao/Acta Electronica Sinica | 2023年 / 51卷 / 12期
基金
中国国家自然科学基金;
关键词
certificate-based cryptography; key encapsulation mechanism; leakage resilience; multi-receiver;
D O I
10.12263/DZXB.20221124
中图分类号
学科分类号
摘要
Certificate-based cryptography combines the best aspects of identity-based encryption (implicit certifica⁃ tion management) and public key encryption (no key escrow). To provide the ability of broadcast communication and leak⁃ age resilience for the certificate-based key encapsulation mechanism, a new cryptographic primitive, called leakage-resilient key encapsulation mechanism with anonymity and multi-receiver, is proposed in this paper; the formal definition and the leakage-resilient security model of our proposal are also described. The concrete construction of the above cryptographic primitive is created, and the corresponding leakage-resilient chosen-plaintext attacks security is proved based on the hard⁃ ness of the decisional Diffie-Hellman assumption. The corresponding analysis shows that our scheme has better perfor⁃ mance in anonymity, leakage resilience, and multi-receiver and so on; also, better computational efficiency can be achieved when generating encapsulation keys for multiple users. © 2023 Chinese Institute of Electronics. All rights reserved.
引用
收藏
页码:3431 / 3436
页数:5
相关论文
共 16 条
  • [1] CHOW S S M, LIU J K, ZHOU J Y., Identity-based online/ offline key encapsulation and encryption, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 52-60, (2011)
  • [2] LYU L, LIU S L, GU D W., Structure-preserving public-key encryption with leakage-resilient CCA security, Theoretical Computer Science, 795, pp. 57-80, (2019)
  • [3] LI J G, YU Q H, ZHANG Y C., Identity-based broadcast encryption with continuous leakage resilience, Informa⁃ tion Sciences, 429, pp. 177-193, (2018)
  • [4] LI J G, YU Q H, ZHANG Y C., Key-policy attribute-based encryption against continual auxiliary input leakage, In⁃ formation Sciences, 470, pp. 175-188, (2019)
  • [5] ZHOU Y W, YANG B., Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilin⁃ ear pairing, Information Processing Letters, 130, pp. 16-24, (2018)
  • [6] ZHOU Y W, YANG B., Continuous leakage-resilient certif⁃ icateless public key encryption with CCA security, Knowledge-Based Systems, 136, pp. 27-36, (2017)
  • [7] LU Y, LI J G., A pairing-free certificate-based proxy re-en⁃ cryption scheme for secure data sharing in public clouds, Future Generation Computer Systems, 62, pp. 140-147, (2016)
  • [8] LU Y, LI J G., A provably secure certificate-based encryp⁃ tion scheme against malicious CA attacks in the standard model, Information Sciences, 372, pp. 745-757, (2016)
  • [9] GUO Y Y, LI J G, LU Y, Et al., Provably secure certificate-based encryption with leakage resilience, Theoretical Computer Science, 711, pp. 1-10, (2018)
  • [10] ZHOU Y W, YANG B, WANG T, Et al., Continuous leak⁃ age-resilient certificate-based encryption scheme without bilinear pairings, The Computer Journal, 63, 4, pp. 508-524, (2020)