Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority

被引:8
作者
Tseng, Yuh-Min [1 ]
Huang, Sen-Shan [1 ]
Tsai, Tung-Tso [2 ]
Chuang, Yun-Hsin [1 ]
Hung, Ying-Hao [1 ]
机构
[1] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
[2] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
关键词
leakage-resilience; certificateless encryption; revocation; key encapsulation; IDENTITY-BASED ENCRYPTION; KEY CRYPTOSYSTEMS RESILIENT; SIGNATURE SCHEME; PROVABLY-SECURE; CRYPTOGRAPHY;
D O I
10.15388/22-INFOR474
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To resolve both certificate management and key escrow problems, a certificateless public key system (CLPKS) has been proposed. However, a CLPKS setting must provide a revocation mechanism to revoke compromised users. Thus, a revocable certificateless public-key system (RCLPKS) was presented to address the revocation issue and, in such a system, the key generation centre (KGC) is responsible to run this revocation functionality. Furthermore, a RCLPKS setting with an outsourced revocation authority (ORA), named RCLPKS-ORA setting, was proposed to employ the ORA to alleviate the KGC's computational burden. Very recently it was noticed that adversaries may adopt side-channel attacks to threaten these existing conventional public-key systems (including CLPKS, RCLPKS and RCLPKS-ORA). Fortunately, leakage-resilient cryptography offers a solution to resist such attacks. In this article, the first leakage-resilient revocable certificateless encryption scheme with an ORA, termed LR-RCLE-ORA scheme, is proposed. The proposed scheme is formally shown to be semantically secure against three types of adversaries in the RCLPKS and RCLPKS-ORA settings while resisting side-channel attacks. In the proposed scheme, adversaries are allowed to continually extract partial ingredients of secret keys participated in various computational algorithms of the proposed scheme while retaining its security.
引用
收藏
页码:151 / 179
页数:29
相关论文
共 50 条
  • [21] Leakage-resilient identity-based encryption scheme
    Li, Sujuan
    Zhang, Futai
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 187 - 196
  • [22] Continuous leakage-resilient certificate-based encryption
    Li, Jiguo
    Guo, Yuyan
    Yu, Qihong
    Lu, Yang
    Zhang, Yichen
    Zhang, Futai
    [J]. INFORMATION SCIENCES, 2016, 355 : 1 - 14
  • [23] Continuous leakage-resilient identity-based encryption with leakage amplification
    Yanwei Zhou
    Bo Yang
    Yi Mu
    [J]. Designs, Codes and Cryptography, 2019, 87 : 2061 - 2090
  • [24] A New Construction of Leakage-Resilient Identity-Based Encryption Scheme
    Qiao, Zirui
    Xu, Ran
    Lu, Yonghui
    Zhou, Yanwei
    Yang, Bo
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024, 2025, 15053 : 133 - 150
  • [25] Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity
    Zhang, Yinghui
    Yang, Menglei
    Zheng, Dong
    Zhang, Tiantian
    Guo, Rui
    Ren, Fang
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 665 - 681
  • [26] A Leakage-Resilient ID-Based Authenticated Key Exchange Protocol With a Revocation Mechanism
    Tsai, Tung-Tso
    Chuang, Yun-Hsin
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Hung, Ying-Hao
    [J]. IEEE ACCESS, 2021, 9 : 128633 - 128647
  • [27] Efficient leakage-resilient public key encryption from DDH assumption
    Li, Sujuan
    Zhang, Futai
    Sun, Yinxia
    Shen, Limin
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 797 - 806
  • [28] A revocable certificateless encryption scheme with high performance
    Yinxia S.
    Zhuoran Z.
    Limin S.
    [J]. International Journal of High Performance Computing and Networking, 2018, 11 (01): : 83 - 91
  • [29] A Novel Pairing Free Revocable Certificateless Encryption With Ciphertext Evolution for Healthcare System
    Singh, Moirangthem Rabindra
    Barik, Rabindra K.
    Qurashi, Shahazad Niwazi
    Thokchom, Surmila
    Roy, Diptendu Sinha
    [J]. IEEE ACCESS, 2025, 13 : 27940 - 27951
  • [30] Leakage-resilient coin tossing
    Elette Boyle
    Shafi Goldwasser
    Yael Tauman Kalai
    [J]. Distributed Computing, 2014, 27 : 147 - 164