CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not q-type) Assumptions

被引:4
作者
Tomita, Toi [1 ,2 ]
Ogata, Wakaha [1 ]
Kurosawa, Kaoru [3 ]
机构
[1] Tokyo Inst Technol, Tokyo, Japan
[2] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
[3] Ibaraki Univ, Ibaraki, Japan
来源
ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2019 | 2019年 / 11689卷
关键词
Identity-based key-encapsulation; Leakage-resilience; CCA-security; ENCRYPTION; CRYPTOGRAPHY;
D O I
10.1007/978-3-030-26834-3_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a new leakage-resilient identity-based encryption (IBE) scheme that is secure against chosen-ciphertext attacks (CCA) in the bounded memory leakage model. It is the first CCA-secure leakage-resilient IBE scheme which does not depend on q-type assumptions. More precisely, it is secure under the DLIN assumption for symmetric bilinear groups and under the XDLIN assumption for asymmetric bilinear groups, respectively.
引用
收藏
页码:3 / 22
页数:20
相关论文
共 32 条
[1]  
Abe M, 2012, LECT NOTES COMPUT SC, V7658, P4, DOI 10.1007/978-3-642-34961-4_3
[2]  
Akavik A, 2009, LECT NOTES COMPUT SC, V5444, P474
[3]  
Alwen J, 2010, LECT NOTES COMPUT SC, V6110, P113
[4]  
Alwen J, 2009, LECT NOTES COMPUT SC, V5677, P36, DOI 10.1007/978-3-642-03356-8_3
[5]   Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage [J].
Brakerski, Zvika ;
Kalai, Yael Tauman ;
Katz, Jonathan ;
Vaikuntanathan, Vinod .
2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, :501-510
[6]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[7]  
Cheon JH, 2006, LECT NOTES COMPUT SC, V4004, P1
[8]   Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions [J].
Chow, Sherman S. M. ;
Dodis, Yevgeniy ;
Rouselakis, Yannis ;
Waters, Brent .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :152-161
[9]   Fuzzy extractors: How to generate strong keys from biometrics and other noisy data [J].
Dodis, Yevgeniy ;
Ostrovsky, Rafail ;
Reyzin, Leonid ;
Smith, Adam .
SIAM JOURNAL ON COMPUTING, 2008, 38 (01) :97-139
[10]   Cryptography Against Continuous Memory Attacks [J].
Dodis, Yevgeniy ;
Haralambiev, Kristiyan ;
Lopez-Alt, Adriana ;
Wichs, Daniel .
2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, :511-520