Public key encryption resilient to leakage and tampering attacks

被引:2
|
作者
Sun, Shi-Feng [1 ,2 ]
Gu, Dawu [1 ]
Parampalli, Udaya [2 ]
Yu, Yu [1 ]
Qin, Baodong [3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Univ Melbourne, Dept Comp & Informat Syst, Melbourne, Vic 3010, Australia
[3] Southwest Univ Sci & Technol, Sch Comp Sci & Technol, Mianyang 250100, Peoples R China
关键词
Public key encryption; Hash proof system; Chosen-ciphertext security; Key-leakage attack; Tampering attack; CRYPTOGRAPHY; SECURITY;
D O I
10.1016/j.jcss.2017.03.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we investigate how to protect public key encryption from both key-leakage attacks and tampering attacks. First, we formalize the notions of chosen ciphertext (CCA) security against key-leakage and tampering attacks. To this goal, we then introduce the concept of key-homomorphic hash proof systems and present a generic construction of public key encryption based on this new primitive. Our construction, compared with previous works, realizes leakage-resilience and tampering-resilience simultaneously but completely independently, so it can tolerate a larger amount of bounded-memory leakage and be instantiated with more flexibility. Moreover, it allows for an unbounded number of affine-tampering queries, even after the challenge phase. With slight adaptations, our construction also achieves CCA security against subexponentially hard auxiliary-input leakage attacks and a polynomial of affine-tampering attacks. Thus, to the best of our knowledge, we get the first public key encryption scheme secure against both auxiliary input leakage attacks and tampering attacks. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:142 / 156
页数:15
相关论文
共 50 条
  • [41] Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks
    Sun, Shi-Feng
    Gu, Dawu
    Huang, Zhengan
    COMPUTER JOURNAL, 2015, 58 (10): : 2520 - 2536
  • [42] Leakage-Resilient Hybrid Signcryption in Heterogeneous Public-key Systems
    Ho, Ting-Chieh
    Tseng, Yuh-Min
    Huang, Sen-Shan
    INFORMATICA, 2024, 35 (01) : 131 - 154
  • [43] New approach to practical leakage-resilient public-key cryptography
    Chakraborty, Suvradip
    Alawatugoda, Janaka
    Rangan, Chandrasekaran Pandu
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2020, 14 (01) : 172 - 201
  • [44] Combining Public Key Encryption with Keyword Search and Public Key Encryption
    Zhang, Rui
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05) : 888 - 896
  • [45] Continuous Leakage-Amplified Public-Key Encryption With CCA Security
    Zhang, Wenzheng
    Qiao, Zirui
    Yang, Bo
    Zhou, Yanwei
    Zhang, Mingwu
    COMPUTER JOURNAL, 2022, 65 (07): : 1760 - 1775
  • [46] Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate
    Zhang, Mingwu
    Yang, Bo
    Takagi, Tsuyoshi
    COMPUTER JOURNAL, 2013, 56 (04): : 464 - 477
  • [47] Stronger public key encryption system withstanding RAM scraper like attacks
    Sivanandam, Sree Vivek
    Selvaraj, Sharmila Deva Selvi
    Srinivasan, Akshayaram
    Chandrasekaran, Pandu Rangan
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1650 - 1662
  • [48] A Fast Public Key Searchable Encryption Scheme Against Inside Keyword Attacks
    Liu, Can
    Chen, Ningjiang
    Huang, Ruwei
    Xie, Yongsheng
    COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING, CHINESECSCW 2019, 2019, 1042 : 50 - 64
  • [49] A Posteriori Openable Public Key Encryption
    Bultel, Xavier
    Lafourcade, Pascal
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016, 2016, 471 : 17 - 31
  • [50] Constructing Committing and Leakage-Resilient Authenticated Encryption
    Struck, Patrick
    Weishaeupl, Maximiliane
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 497 - 528