Public key encryption resilient to leakage and tampering attacks

被引:2
|
作者
Sun, Shi-Feng [1 ,2 ]
Gu, Dawu [1 ]
Parampalli, Udaya [2 ]
Yu, Yu [1 ]
Qin, Baodong [3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Univ Melbourne, Dept Comp & Informat Syst, Melbourne, Vic 3010, Australia
[3] Southwest Univ Sci & Technol, Sch Comp Sci & Technol, Mianyang 250100, Peoples R China
关键词
Public key encryption; Hash proof system; Chosen-ciphertext security; Key-leakage attack; Tampering attack; CRYPTOGRAPHY; SECURITY;
D O I
10.1016/j.jcss.2017.03.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we investigate how to protect public key encryption from both key-leakage attacks and tampering attacks. First, we formalize the notions of chosen ciphertext (CCA) security against key-leakage and tampering attacks. To this goal, we then introduce the concept of key-homomorphic hash proof systems and present a generic construction of public key encryption based on this new primitive. Our construction, compared with previous works, realizes leakage-resilience and tampering-resilience simultaneously but completely independently, so it can tolerate a larger amount of bounded-memory leakage and be instantiated with more flexibility. Moreover, it allows for an unbounded number of affine-tampering queries, even after the challenge phase. With slight adaptations, our construction also achieves CCA security against subexponentially hard auxiliary-input leakage attacks and a polynomial of affine-tampering attacks. Thus, to the best of our knowledge, we get the first public key encryption scheme secure against both auxiliary input leakage attacks and tampering attacks. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:142 / 156
页数:15
相关论文
共 50 条
  • [21] Identity-based encryption resilient to continuous key leakage
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    Wang, Tao
    Wang, Xin
    IET INFORMATION SECURITY, 2019, 13 (05) : 426 - 434
  • [22] Efficient chosen ciphertext secure identity-based encryption against key leakage attacks
    Sun, Shi-Feng
    Gu, Dawu
    Liu, Shengli
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1417 - 1434
  • [23] On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes
    Hajiabadi, Mohammad
    Kapron, Bruce M.
    Srinivasan, Venkatesh
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 129 - 158
  • [24] CCA2 secure public-key encryption scheme tolerating continual leakage attacks
    Zhou, YanWei
    Yang, Bo
    Zhang, Wenzheng
    Mu, Yi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4505 - 4519
  • [25] Public-key encryption scheme with optimal continuous leakage resilience
    Zhou, Yanwei
    Xu, Ran
    Zhang, Wenzheng
    Xia, Zhe
    Yang, Bo
    Gu, Chunxiang
    Huang, Meijuan
    INFORMATION PROCESSING LETTERS, 2023, 180
  • [26] Security of Public Key Encryption Against Resetting Attacks
    Kraemer, Juliane
    Struck, Patrick
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 508 - 528
  • [27] Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back)
    Brakerski, Zvika
    Goldwasser, Shafi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 1 - 20
  • [28] Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs
    Manh Ha Nguyen
    Yasunaga, Kenji
    Tanaka, Keisuke
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (06) : 1100 - 1111
  • [29] Leakage-Resilient Key-Dependent Message Secure Encryption Schemes
    Gupta, Dhairya
    Rajasree, Mahesh Sreekumar
    Swaminathan, Harihar
    PROGRESS IN CRYPTOLOGY-INDOCRYPT 2024, PT I, 2025, 15495 : 234 - 257
  • [30] Public-key encryption indistinguishable under plaintext-checkable attacks
    Abdalla, Michel
    Benhamouda, Fabrice
    Pointcheval, David
    IET INFORMATION SECURITY, 2016, 10 (06) : 288 - 303