Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority

被引:8
|
作者
Tseng, Yuh-Min [1 ]
Huang, Sen-Shan [1 ]
Tsai, Tung-Tso [2 ]
Chuang, Yun-Hsin [1 ]
Hung, Ying-Hao [1 ]
机构
[1] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
[2] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
关键词
leakage-resilience; certificateless encryption; revocation; key encapsulation; IDENTITY-BASED ENCRYPTION; KEY CRYPTOSYSTEMS RESILIENT; SIGNATURE SCHEME; PROVABLY-SECURE; CRYPTOGRAPHY;
D O I
10.15388/22-INFOR474
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To resolve both certificate management and key escrow problems, a certificateless public key system (CLPKS) has been proposed. However, a CLPKS setting must provide a revocation mechanism to revoke compromised users. Thus, a revocable certificateless public-key system (RCLPKS) was presented to address the revocation issue and, in such a system, the key generation centre (KGC) is responsible to run this revocation functionality. Furthermore, a RCLPKS setting with an outsourced revocation authority (ORA), named RCLPKS-ORA setting, was proposed to employ the ORA to alleviate the KGC's computational burden. Very recently it was noticed that adversaries may adopt side-channel attacks to threaten these existing conventional public-key systems (including CLPKS, RCLPKS and RCLPKS-ORA). Fortunately, leakage-resilient cryptography offers a solution to resist such attacks. In this article, the first leakage-resilient revocable certificateless encryption scheme with an ORA, termed LR-RCLE-ORA scheme, is proposed. The proposed scheme is formally shown to be semantically secure against three types of adversaries in the RCLPKS and RCLPKS-ORA settings while resisting side-channel attacks. In the proposed scheme, adversaries are allowed to continually extract partial ingredients of secret keys participated in various computational algorithms of the proposed scheme while retaining its security.
引用
收藏
页码:151 / 179
页数:29
相关论文
共 50 条
  • [1] Leakage Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server
    Tseng, Yuh-Min
    Wu, Jui-Di
    Huang, Sen-Shan
    Tsai, Tung-Tso
    INFORMATION TECHNOLOGY AND CONTROL, 2020, 49 (04): : 464 - 481
  • [2] Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Tsai, Tung-Tso
    INFORMATICA, 2020, 31 (03) : 597 - 620
  • [3] Efficient revocable certificateless public key encryption with a delegated revocation authority
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3713 - 3725
  • [4] Revocable Certificateless Public Key Encryption With Outsourced Semi-Trusted Cloud Revocation Agent
    Ma, Mingxin
    Shi, Guozhen
    Shi, Xinyi
    Su, Mang
    Li, Fenghua
    IEEE ACCESS, 2020, 8 (08): : 148157 - 148168
  • [5] Continuous leakage-resilient certificateless public key encryption with CCA security
    Zhou, Yanwei
    Yang, Bo
    KNOWLEDGE-BASED SYSTEMS, 2017, 136 : 27 - 36
  • [6] Leakage-resilient Certificateless Signcryption Scheme
    Yang, Qiliang
    Thou, Yanwei
    Yu, Yong
    2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
  • [7] Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
    Kraemer, Juliane
    Struck, Patrick
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 315 - 337
  • [8] Leakage-Resilient Certificateless Key Encapsulation Scheme
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Chou, Wei-Chieh
    INFORMATICA, 2018, 29 (01) : 125 - 155
  • [9] Leakage-Resilient Anonymous Multireceiver Certificateless Encryption Resistant to Side-Channel Attacks
    Xie, Jia-Yi
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2674 - 2685
  • [10] A leakage-resilient certificateless public key encryption scheme with CCA2 security
    Yan-wei ZHOU
    Bo YANG
    Hao CHENG
    Qing-long WANG
    FrontiersofInformationTechnology&ElectronicEngineering, 2018, 19 (04) : 481 - 493