Hierarchical attribute-based encryption with continuous auxiliary inputs leakage

被引:20
作者
Guo, Yuyan [1 ,2 ]
Li, Jiguo [1 ]
Zhang, Yichen [1 ]
Shen, Jian [3 ]
机构
[1] Hohai Univ, Coll Comp & Informat, Nanjing 211000, Jiangsu, Peoples R China
[2] Huaibei Normal Univ, Sch Comp Sci & Technol, Huaibei 235000, Anhui, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
hierarchical attribute-based encryption; continuous auxiliary inputs; leakage-resilient; side-channel attacks; PUBLIC-KEY ENCRYPTION; IDENTITY-BASED ENCRYPTION; RESILIENT; PRIVACY; SCHEME;
D O I
10.1002/sec.1659
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The continuous auxiliary inputs leakage is more strong side-channel attacks. In this article, we first propose a continuous auxiliary inputs leakage model for the hierarchical attribute-based encryption scheme. Under the security model, an adversary has ability to gain partial updated master keys and updated secret keys continually by certain leakage attacks. Moreover, a resilient-leakage hierarchical attribute-based encryption scheme is constructed. The security proof for this scheme is provided under the standard model. Furthermore, we give the performance comparison between our scheme and relevant scheme. (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:4852 / 4862
页数:11
相关论文
共 46 条
[1]  
Agrawal S, 2013, LECT NOTES COMPUT SC, V8270, P401, DOI 10.1007/978-3-642-42045-0_21
[2]  
Akavia Adi, 2012, ACM S PRINC DIS COMP, P155
[3]  
Ananth P, 2014, LECT NOTES COMPUT SC, V8617, P164, DOI 10.1007/978-3-662-44381-1_10
[4]  
[Anonymous], 2016, IEEE T SERVICES COMP
[5]   Preserving privacy and efficiency in data communication and aggregation for AMI network [J].
Bae, Mungyu ;
Kim, Kangho ;
Kim, Hwangnam .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 59 :333-344
[6]  
Beimel A., 1996, SECURE SCHEMES SECRE
[7]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[8]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[9]  
Boyle E, 2012, STOC'12: PROCEEDINGS OF THE 2012 ACM SYMPOSIUM ON THEORY OF COMPUTING, P1235
[10]   Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting [J].
Brakerski, Zvika ;
Segev, Gil .
JOURNAL OF CRYPTOLOGY, 2014, 27 (02) :210-247