Leakage-Resilient Anonymous Multireceiver Certificateless Encryption Resistant to Side-Channel Attacks

被引:4
|
作者
Xie, Jia-Yi [1 ]
Tseng, Yuh-Min [1 ]
Huang, Sen-Shan [1 ]
机构
[1] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
来源
IEEE SYSTEMS JOURNAL | 2023年 / 17卷 / 02期
关键词
Anonymity; certificateless encryption; leakage resilience; multireceiver; side-channel attacks; IDENTITY-BASED ENCRYPTION; BROADCAST ENCRYPTION; KEY ENCAPSULATION; PROVABLY SECURE; SIGNATURE; PROTOCOL; SCHEME; CRYPTOGRAPHY;
D O I
10.1109/JSYST.2022.3204902
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anonymous multireceiver encryption (AMRE) allows a data provider to transmit a ciphertext to a designated group of receivers. Any receiver of the designated group can get the plaintext by decrypting this ciphertext while the receiver's identity is concealed to other receivers. In the past, several anonymous m ultireceiver certificateless encryption (AMR-CLE) schemes based on the certificateless public-key cryptography (CL-PKC) were proposed to remove both the certificate management problem of AMRE schemes based on the conventional public-key cryptography and the key escrow problem of AMR-IBE schemes based on the Ill-based public-key cryptography. Recently, side-channel attacks endanger the existing cryptographic schemes, AMRE, AMR-IBE, AMR-CLE, etc. To resist to such attacks, leakage-resilient cryptography is a novel way. However, until now, there exists no multireceiver encryption or AMRE scheme resistant to side-channel attacks. In this article, we present the first leakage-resilient anonymous multireceiver certificateless encryption (LR-AMR-CLE) scheme. In our scheme, attackers are granted to repeatedly extract tractional content of each secret key participated in our scheme and retains the original security of AMR-CLE, schemes.
引用
收藏
页码:2674 / 2685
页数:12
相关论文
共 50 条
  • [21] Leakage-Resilient Certificateless Signcryption Scheme Under a Continual Leakage Model
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE ACCESS, 2023, 11 : 54448 - 54461
  • [22] Side-channel attacks on textbook RSA and ElGamal encryption
    Kühn, U
    PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, 2003, 2567 : 324 - 336
  • [23] Leaking secrets in homomorphic encryption with side-channel attacks
    Aydin, Furkan
    Aysu, Aydin
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2024, 14 (02) : 241 - 251
  • [24] Side-channel attacks on symmetric encryption schemes: The case for authenticated encryption
    Black, J
    Urtubia, H
    USENIX ASSOCIATION PROCEEDINGS OF THE 11TH USENIX SECURITY SYMPOSIUM, 2002, : 327 - 338
  • [25] Memory leakage-resilient searchable symmetric encryption
    Dai, Shuguang
    Li, Huige
    Zhang, Fangguo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 76 - 84
  • [26] Constructing Committing and Leakage-Resilient Authenticated Encryption
    Struck, Patrick
    Weishaeupl, Maximiliane
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 497 - 528
  • [27] Leakage-resilient certificate-based encryption
    Yu, Qihong
    Li, Jiguo
    Zhang, Yichen
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3346 - 3355
  • [28] Provably secure leakage-resilient certificateless hybrid signcryption scheme
    Zhou Y.-W.
    Yang B.
    Wang Q.-L.
    Yang, Bo (byang@snnu.edu.cn), 2016, Chinese Academy of Sciences (27): : 2898 - 2911
  • [29] Exposing Side-Channel Leakage of SEAL Homomorphic Encryption Library
    Aydin, Furkan
    Aysu, Aydin
    PROCEEDINGS OF THE 2022 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY, ASHES 2022, 2022, : 95 - 100
  • [30] Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption
    Unterluggauer, Thomas
    Mangard, Stefan
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2016, 2016, 9689 : 3 - 18