Public-key encryption scheme with optimal continuous leakage resilience

被引:2
作者
Zhou, Yanwei [1 ,2 ,5 ,6 ]
Xu, Ran [1 ,5 ]
Zhang, Wenzheng [3 ]
Xia, Zhe [4 ]
Yang, Bo [1 ]
Gu, Chunxiang [5 ]
Huang, Meijuan [7 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing, Peoples R China
[3] Sci & Technol Commun Secur Lab, Chengdu, Peoples R China
[4] Wuhan Univ Technol, Sch Comp Sci & Technol, Zhengzhou, Peoples R China
[5] Henan Key Lab Network Cryptog Technol, Zhengzhou, Peoples R China
[6] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
[7] Baoji Univ Arts & Sci, Sch Math & Informat Sci, Baoji, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Public-key encryption; Continuous leakage resilience; Chosen-ciphertext attacks; SIGNCRYPTION SCHEME; SECURE;
D O I
10.1016/j.ipl.2022.106318
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In real-world applications, adversaries can launch leakage attacks, such as side-channel attacks, to obtain some information of the secret states (e.g. secret key, random value, etc.) in cryptographic protocols, compromising their security. Moreover, adversaries can obtain more leakage information by performing leakage attacks continuously, and the leakage attacks can be performed at any time by the adversary. Therefore, when designing public-key encryption (PKE) schemes, one should consider the continuous leakage setting. And it is desirable that the designed schemes can resist the leakage attacks. In this paper, to achieve better continuous leakage resilience, a novel construction of continuous leakage-resilient PKE scheme is proposed. The chosen-ciphertext attacks security of our proposed scheme can be proved based on the hardness of the decisional Diffie-Hellman assumption. Our construction tolerates a large key leakage rate, which is one of the best among existing PKE schemes. Moreover, the level of leakage resilience can be adjusted based on the specific requirements in real-world applications. The analyses demonstrate that our proposal also enjoys low computational overheads, outperforming the existing leakage-resilient PKE schemes.(c) 2022 Published by Elsevier B.V.
引用
收藏
页数:11
相关论文
共 24 条
  • [1] Chen RM, 2017, DESIGN CODE CRYPTOGR, V85, P145, DOI 10.1007/s10623-016-0295-3
  • [2] Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
  • [3] Cryptography Against Continuous Memory Attacks
    Dodis, Yevgeniy
    Haralambiev, Kristiyan
    Lopez-Alt, Adriana
    Wichs, Daniel
    [J]. 2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, : 511 - 520
  • [4] Decentralized Attribute-Based Server-Aid Signature in the Internet of Things
    Li, Jiguo
    Chen, Yu
    Han, Jinguang
    Liu, Chengdong
    Zhang, Yichen
    Wang, Huaqun
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (06): : 4573 - 4583
  • [5] A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme
    Li, Jiguo
    Teng, Meilin
    Zhang, Yichen
    Yu, Qihong
    [J]. COMPUTER JOURNAL, 2016, 59 (07) : 1066 - 1075
  • [6] Efficient leakage-resilient public key encryption from DDH assumption
    Li, Sujuan
    Zhang, Futai
    Sun, Yinxia
    Shen, Limin
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 797 - 806
  • [7] Achieving Privacy-Preserving DSSE for Intelligent IoT Healthcare System
    Liu, Yaru
    Yu, Jia
    Fan, Jianxi
    Vijayakumar, Pandi
    Chang, Victor
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (03) : 2010 - 2020
  • [8] Naor M, 2009, LECT NOTES COMPUT SC, V5677, P18, DOI 10.1007/978-3-642-03356-8_2
  • [9] Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things
    Qiao, Zirui
    Zhou, Yanwei
    Yang, Bo
    Zhang, Mingwu
    Wang, Tao
    Xia, Zhe
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 4719 - 4730
  • [10] Qiao ZR, 2022, IEEE SYST J, V16, P1842, DOI [10.1109/JSYST.2020.3046450, 10.1145/3473141.3473219]