Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks

被引:5
作者
Hu, Chengyu [1 ]
Liu, Pengtao [2 ]
Zhou, Yongbin [3 ]
Guo, Shanqing [1 ]
Wang, Yilei [4 ]
Xu, Qiuliang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Peoples R China
[2] Shandong Univ Polit Sci & Law, Sch Informat, Jinan 250014, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Ludong Univ, Sch Informat & Elect Engn, Yantai, Peoples R China
基金
中国国家自然科学基金;
关键词
Leakage resilience; Related-key security; Extractable hash proofs; Public-key encryption; Intelligent agent security; RESILIENT; SECURITY;
D O I
10.1007/s00500-015-1782-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Public-key encryption can be used to protect the sensitive data in cloud system with intelligent mobile agents facilitating better services. However, many public-key encryption schemes do not resist the side-channel attacks which can be applied to the encryption instances implemented on a chip or cloud to obtain partial information leakage about the secret states, as the traditional security model of public-key encryption does not capture this kind of attacks. Also, the adversary can inject fault to tamper with the secret key and observe the output of the public-key encryption scheme under this modified key which is called "related-key attacks". Inspired by these, the models of key-leakage attacks and related-key attacks are formalized, respectively. In this paper, we present a method to construct public-key encryption schemes against both weak key-leakage attacks and linear related-key attacks from extractable hash proof systems (EHPS or XHPS). Specifically, we first transform ABOEHPS to weak leakage-resilient ABOEHPS and add Key Homomorphism and Fingerprinting properties to it. Then, based on this new ABOEHPS, we construct weak leakage-resilient adaptive trapdoor relation with these two properties and public-key encryption schemes against both weak key-leakage attacks and linear related-key attacks can be constructed from it. Moreover, we propose a public-key encryption scheme against both adaptive key-leakage attacks and linear related-key attacks.
引用
收藏
页码:4919 / 4932
页数:14
相关论文
共 41 条
[11]   Cloud-based adaptive compression and secure management services for 3D healthcare data [J].
Castiglione, Arcangelo ;
Pizzolante, Raffaele ;
De Santis, Alfredo ;
Carpentieri, Bruno ;
Castiglione, Aniello ;
Palmieri, Francesco .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 43-44 :120-134
[12]   Supporting software intelligence in ubiquitous environment exploits mobile agent [J].
Chang, Yue-Shan ;
Fan, Chih-Tien ;
Juang, Tong-Ying .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2012, 3 (02) :141-151
[13]  
Cramer R, 2002, LECT NOTES COMPUT SC, V2332, P45
[14]  
Damgård I, 2013, LECT NOTES COMPUT SC, V8270, P140, DOI 10.1007/978-3-642-42045-0_8
[15]   Efficient Public-Key Cryptography in the Presence of Key Leakage [J].
Dodis, Yevgeniy ;
Haralambiev, Kristiyan ;
Lopez-Alt, Adriana ;
Wichs, Daniel .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 :613-631
[16]  
Dodis Y, 2009, ACM S THEORY COMPUT, P621
[17]   Leakage-Resilient Cryptography [J].
Dziembowski, Stefan ;
Pietrzak, Krzysztof .
PROCEEDINGS OF THE 49TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2008, :293-+
[18]   Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory [J].
Esposito, Christian ;
Ficco, Massimo ;
Palmieri, Francesco ;
Castiglione, Aniello .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) :2348-2362
[19]  
Galindo David, 2012, Computer Security - ESORICS 2012. Proceedings 17th European Symposium on Research in Computer Security, P627, DOI 10.1007/978-3-642-33167-1_36
[20]  
Gandolfi K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P251