Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions

被引:16
|
作者
Fujisaki, Eiichiro [1 ]
Xagawa, Keita [1 ]
机构
[1] NTT Secure Platform Labs, 3-9-11 Midori Cho, Musashino, Tokyo 1808585, Japan
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I | 2016年 / 10031卷
关键词
Public-key encryption; Digital signature; Continuous tampering attacks; Bounded or continuous memory leakage; CRYPTOGRAPHY; ENCRYPTION; PARADIGM;
D O I
10.1007/978-3-662-53887-6_33
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present the first chosen-ciphertext secure public-key encryption schemes resilient to continuous tampering of arbitrary (efficiently computable) functions. Since it is impossible to realize such a scheme without a self-destruction or key-updating mechanism, our proposals allow for either of them. As in the previous works resilient to this type of tampering attacks, our schemes also tolerate bounded or continuous memory leakage attacks at the same time. Unlike the previous results, our schemes have efficient instantiations, without relying on zero-knowledge proofs. We also prove that there is no secure digital signature scheme resilient to arbitrary tampering functions against a stronger variant of continuous tampering attacks, even if it has a self-destruction mechanism.
引用
收藏
页码:908 / 938
页数:31
相关论文
共 50 条
  • [1] PUBLIC-KEY CRYPTOSYSTEMS RESILIENT TO KEY LEAKAGE
    Naor, Moni
    Segev, Gil
    SIAM JOURNAL ON COMPUTING, 2012, 41 (04) : 772 - 814
  • [2] Public-Key Cryptosystems Resilient to Key Leakage
    Naor, Moni
    Segev, Gil
    ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 18 - 35
  • [3] Public key encryption resilient to leakage and tampering attacks
    Sun, Shi-Feng
    Gu, Dawu
    Parampalli, Udaya
    Yu, Yu
    Qin, Baodong
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 89 : 142 - 156
  • [4] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
    Chengyu Hu
    Rupeng Yang
    Pengtao Liu
    Tong Li
    Fanyu Kong
    The Journal of Supercomputing, 2019, 75 : 3099 - 3122
  • [5] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Li, Tong
    Kong, Fanyu
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (06): : 3099 - 3122
  • [6] Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security
    Zhou, Yanwei
    Yang, Bo
    COMPUTER JOURNAL, 2017, 60 (08): : 1161 - 1172
  • [7] A survey of public-key cryptosystems
    Koblitz, N
    Menezes, AJ
    SIAM REVIEW, 2004, 46 (04) : 599 - 634
  • [8] Public-key encryption scheme with optimal continuous leakage resilience
    Zhou, Yanwei
    Xu, Ran
    Zhang, Wenzheng
    Xia, Zhe
    Yang, Bo
    Gu, Chunxiang
    Huang, Meijuan
    INFORMATION PROCESSING LETTERS, 2023, 180
  • [9] Novel Public-Key Encryption with Continuous Leakage Amplification
    Qiao, Zirui
    Yang, Qiliang
    Zhou, Yanwei
    Xia, Zhe
    Zhang, Mingwu
    COMPUTER JOURNAL, 2021, 64 (08): : 1163 - 1177
  • [10] Structure-preserving public-key encryption with leakage-resilient CCA security
    Lyu, Lin
    Liu, Shengli
    Gu, Dawu
    THEORETICAL COMPUTER SCIENCE, 2019, 795 : 57 - 80