Leakage-resilient attribute based encryption in prime-order groups via predicate encodings

被引:0
|
作者
Jie Zhang
Jie Chen
Junqing Gong
Aijun Ge
Chuangui Ma
机构
[1] State Key Laboratory of Mathematical Engineering and Advanced Computing,Department of Computer Science and Engineering
[2] East China Normal University,undefined
[3] ENS de Lyon,undefined
[4] Laboratoire LIP (U. Lyon,undefined
[5] CNRS,undefined
[6] ENSL,undefined
[7] INRIA,undefined
[8] UCBL),undefined
[9] Shanghai Jiao Tong University,undefined
[10] Army Aviation Institute,undefined
来源
关键词
Attribute-based encryption; Leakage resilient; Prime-order groups; Predicate encodings; 68P25; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, leakage-resilient cryptography has become a hot research topic. It seeks to build more robust models of adversarial access to cryptographic algorithms. The main goal is to design a scheme that remains secure even when arbitrary, yet bounded, information about secret key is leaked. In this paper, we present a modular framework for designing leakage-resilient attribute-based encryption (ABE) schemes based on extended predicate encoding. We first extend the predicate encoding to the leakage-resilient predicate encoding; and then, design several leakage-resilient predicate encodings, and finally give a generic construction of leakage-resilient ABE based on the newly proposed encodings. Moreover, we can instantiate our framework in prime order bilinear groups to obtain concrete constructions, and prove their full security under the standard k-Lin assumption in the continual memory leakage model.
引用
收藏
页码:1339 / 1366
页数:27
相关论文
共 50 条
  • [11] Provable secure leakage-resilient predicate encryption scheme without random oracle
    Zhang, Xiujie
    Xu, Chunxiang
    Li, Wanpeng
    Journal of Computational Information Systems, 2013, 9 (12): : 4681 - 4689
  • [12] Leakage-resilient certificate-based encryption
    Yu, Qihong
    Li, Jiguo
    Zhang, Yichen
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3346 - 3355
  • [13] Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System
    Zhang, Leyou
    Zhang, Jingxia
    Mu, Yi
    COMPUTER JOURNAL, 2017, 60 (04): : 541 - 554
  • [14] Functional encryption for computational hiding in prime order groups via pair encodings
    Jongkil Kim
    Willy Susilo
    Fuchun Guo
    Man Ho Au
    Designs, Codes and Cryptography, 2018, 86 : 97 - 120
  • [15] Functional encryption for computational hiding in prime order groups via pair encodings
    Kim, Jongkil
    Susilo, Willy
    Guo, Fuchun
    Au, Man Ho
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (01) : 97 - 120
  • [16] Leakage-resilient identity-based encryption scheme
    Li, Sujuan
    Zhang, Futai
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 187 - 196
  • [17] Continuous leakage-resilient certificate-based encryption
    Li, Jiguo
    Guo, Yuyan
    Yu, Qihong
    Lu, Yang
    Zhang, Yichen
    Zhang, Futai
    INFORMATION SCIENCES, 2016, 355 : 1 - 14
  • [18] Continual auxiliary leakage-resilient attribute-based broadcast encryption with constant size ciphertexts
    Yujie S.
    Leyou Z.
    Xiaoxu G.
    Journal of China Universities of Posts and Telecommunications, 2020, 27 (04): : 69 - 82
  • [19] Leakage-Resilient Symmetric Encryption via Re-keying
    Abdalla, Michel
    Belaid, Sonia
    Fouque, Pierre-Alain
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2013, 2013, 8086 : 471 - 488
  • [20] Continual auxiliary leakage-resilient attribute-based broadcast encryption with constant size ciphertexts
    Shang Yujie
    Zhang Leyou
    Gao Xiaoxu
    The Journal of China Universities of Posts and Telecommunications, 2020, 27 (04) : 69 - 82