Leakage-Resilient Anonymous Multireceiver Certificateless Encryption Resistant to Side-Channel Attacks

被引:4
|
作者
Xie, Jia-Yi [1 ]
Tseng, Yuh-Min [1 ]
Huang, Sen-Shan [1 ]
机构
[1] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
来源
IEEE SYSTEMS JOURNAL | 2023年 / 17卷 / 02期
关键词
Anonymity; certificateless encryption; leakage resilience; multireceiver; side-channel attacks; IDENTITY-BASED ENCRYPTION; BROADCAST ENCRYPTION; KEY ENCAPSULATION; PROVABLY SECURE; SIGNATURE; PROTOCOL; SCHEME; CRYPTOGRAPHY;
D O I
10.1109/JSYST.2022.3204902
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anonymous multireceiver encryption (AMRE) allows a data provider to transmit a ciphertext to a designated group of receivers. Any receiver of the designated group can get the plaintext by decrypting this ciphertext while the receiver's identity is concealed to other receivers. In the past, several anonymous m ultireceiver certificateless encryption (AMR-CLE) schemes based on the certificateless public-key cryptography (CL-PKC) were proposed to remove both the certificate management problem of AMRE schemes based on the conventional public-key cryptography and the key escrow problem of AMR-IBE schemes based on the Ill-based public-key cryptography. Recently, side-channel attacks endanger the existing cryptographic schemes, AMRE, AMR-IBE, AMR-CLE, etc. To resist to such attacks, leakage-resilient cryptography is a novel way. However, until now, there exists no multireceiver encryption or AMRE scheme resistant to side-channel attacks. In this article, we present the first leakage-resilient anonymous multireceiver certificateless encryption (LR-AMR-CLE) scheme. In our scheme, attackers are granted to repeatedly extract tractional content of each secret key participated in our scheme and retains the original security of AMR-CLE, schemes.
引用
收藏
页码:2674 / 2685
页数:12
相关论文
共 50 条
  • [31] Memory leakage-resilient searchable symmetric encryption
    Dai, Shuguang
    Li, Huige
    Zhang, Fangguo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 76 - 84
  • [32] Constructing Committing and Leakage-Resilient Authenticated Encryption
    Struck, Patrick
    Weishaeupl, Maximiliane
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 497 - 528
  • [33] Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing
    Zhou, Yanwei
    Yang, Bo
    INFORMATION PROCESSING LETTERS, 2018, 130 : 16 - 24
  • [34] Anonymous CP-ABE Against Side-Channel Attacks in Cloud Computing
    Zhang, Jing-Xia
    Zhang, Le-You
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 789 - 805
  • [35] Exposing Side-Channel Leakage of SEAL Homomorphic Encryption Library
    Aydin, Furkan
    Aysu, Aydin
    PROCEEDINGS OF THE 2022 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY, ASHES 2022, 2022, : 95 - 100
  • [36] Leakage-Resilient Functional Encryption via Pair Encodings
    Yu, Zuoxia
    Au, Man Ho
    Xu, Qiuliang
    Yang, Rupeng
    Han, Jinguang
    INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 443 - 460
  • [37] Side-Channel Attacks With Multi-Thread Mixed Leakage
    Gao, Yiwen
    Zhou, Yongbin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 770 - 785
  • [38] Leakage-resilient identity-based encryption scheme
    Li, Sujuan
    Zhang, Futai
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 187 - 196
  • [39] Continuous leakage-resilient identity-based encryption with leakage amplification
    Yanwei Zhou
    Bo Yang
    Yi Mu
    Designs, Codes and Cryptography, 2019, 87 : 2061 - 2090
  • [40] Continuous Leakage-Resilient Identity-Based Encryption with Tight Security
    Zhou, Yanwei
    Yang, Bo
    Hou, Hongxia
    Zhang, Lina
    Wang, Tao
    Hu, Mingxiao
    COMPUTER JOURNAL, 2019, 62 (08): : 1092 - 1105