Stronger public key encryption system withstanding RAM scraper like attacks

被引:0
|
作者
Sivanandam, Sree Vivek [1 ]
Selvaraj, Sharmila Deva Selvi [2 ]
Srinivasan, Akshayaram [3 ]
Chandrasekaran, Pandu Rangan [4 ]
机构
[1] Samsung R&D Inst, Bangalore, Karnataka, India
[2] Microsoft Res, Bangalore, Karnataka, India
[3] Univ Calif Berkeley, Berkeley, CA 94720 USA
[4] Indian Inst Technol Madras, Madras, Tamil Nadu, India
关键词
Public Key Encryption; IND-CCA2; Glass Box Decryption; Standard Model; RAM Scraper; SECURE;
D O I
10.1002/sec.1454
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The indistinguishability of ciphertext under the chosen ciphertext attack (IND-CCA2) is often considered to offer the strongest security notion for a public key encryption system. Nowadays, because of the availability of powerful malwares, an adversary is able to obtain more information than what he could obtain in the CCA2 security model. In order to realistically model the threats posed by such malwares, we need to empower the adversary to obtain additional information. This paper initiates a research to counter malwares such as RAM scrapers and extend the CCA2 model with oracles providing additional information to capture the effect of RAM scrapers precisely. We call this more stronger security notion as glass box decryption. After discussing the new kind of attack/threat and the related oracle, we show that almost all CCA2 secure systems are vulnerable to this kind of attack. We then propose a new system that offers security against glass box decryption and provide the formal security proof for the new system in the standard model. Copyright (c) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:1650 / 1662
页数:13
相关论文
共 35 条
  • [31] An Asymmetric Image Encryption Algorithm Based on a Fractional-Order Chaotic System and the RSA Public-Key Cryptosystem
    Ye, Guodong
    Jiao, Kaixin
    Wu, Huishan
    Pan, Chen
    Huang, Xiaoling
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2020, 30 (15):
  • [32] Leakage-Resilient Anonymous Heterogeneous Multi-Receiver Hybrid Encryption in Heterogeneous Public-Key System Settings
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    Huang, Sen-Shan
    Ho, Ting-Chieh
    IEEE ACCESS, 2024, 12 : 28155 - 28168
  • [33] Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes
    Qi-Qi Lai
    Bo Yang
    Yong Yu
    Zhe Xia
    Yan-Wei Zhou
    Yuan Chen
    Journal of Computer Science and Technology, 2018, 33 : 1243 - 1260
  • [34] Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes
    Lai, Qi-Qi
    Yang, Bo
    Yu, Yong
    Xia, Zhe
    Zhou, Yan-Wei
    Chen, Yuan
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2018, 33 (06) : 1243 - 1260
  • [35] Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
    Qin, Baodong
    Liu, Shengli
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT II, 2013, 8270 : 381 - 400