Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks

被引:0
|
作者
Chengyu Hu
Pengtao Liu
Yongbin Zhou
Shanqing Guo
Yilei Wang
Qiuliang Xu
机构
[1] Shandong University,School of Computer Science and Technology
[2] Shandong University of Political Science and Law,School of Information
[3] Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering
[4] Ludong University,School of Information and Electrical Engineering
来源
Soft Computing | 2016年 / 20卷
关键词
Leakage resilience; Related-key security; Extractable hash proofs; Public-key encryption; Intelligent agent security;
D O I
暂无
中图分类号
学科分类号
摘要
Public-key encryption can be used to protect the sensitive data in cloud system with intelligent mobile agents facilitating better services. However, many public-key encryption schemes do not resist the side-channel attacks which can be applied to the encryption instances implemented on a chip or cloud to obtain partial information leakage about the secret states, as the traditional security model of public-key encryption does not capture this kind of attacks. Also, the adversary can inject fault to tamper with the secret key and observe the output of the public-key encryption scheme under this modified key which is called “related-key attacks”. Inspired by these, the models of key-leakage attacks and related-key attacks are formalized, respectively. In this paper, we present a method to construct public-key encryption schemes against both weak key-leakage attacks and linear related-key attacks from extractable hash proof systems (EHPS or XHPS). Specifically, we first transform ABOEHPS to weak leakage-resilient ABOEHPS and add Key Homomorphism and Fingerprinting properties to it. Then, based on this new ABOEHPS, we construct weak leakage-resilient adaptive trapdoor relation with these two properties and public-key encryption schemes against both weak key-leakage attacks and linear related-key attacks can be constructed from it. Moreover, we propose a public-key encryption scheme against both adaptive key-leakage attacks and linear related-key attacks.
引用
收藏
页码:4919 / 4932
页数:13
相关论文
共 12 条
  • [1] Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
    Hu, Chengyu
    Liu, Pengtao
    Zhou, Yongbin
    Guo, Shanqing
    Wang, Yilei
    Xu, Qiuliang
    SOFT COMPUTING, 2016, 20 (12) : 4919 - 4932
  • [2] Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 268 - 275
  • [3] Public-key encryption with keyword search secure against continual memory attacks
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Yu, Zuoxia
    Zhou, Yongbin
    Xu, Qiuliang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1613 - 1629
  • [4] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
    Chengyu Hu
    Rupeng Yang
    Pengtao Liu
    Tong Li
    Fanyu Kong
    The Journal of Supercomputing, 2019, 75 : 3099 - 3122
  • [5] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Li, Tong
    Kong, Fanyu
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (06) : 3099 - 3122
  • [6] Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks
    Chengyu Hu
    Zhen Li
    Pengtao Liu
    Rupeng Yang
    Shanqing Guo
    Hailong Zhang
    Mobile Networks and Applications, 2021, 26 : 2490 - 2500
  • [7] Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks
    Hu, Chengyu
    Li, Zhen
    Liu, Pengtao
    Yang, Rupeng
    Guo, Shanqing
    Zhang, Hailong
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (06) : 2490 - 2500
  • [8] Public-Key Encryption Secure Against Related Randomness Attacks for Improved End-to-End Security of Cloud/Edge Computing
    Liu, Pengtao
    IEEE ACCESS, 2020, 8 : 16750 - 16759
  • [9] HANMRE - An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches
    Song Dat Phuc Tran
    Seok, Byoungjin
    Lee, Changhoon
    APPLIED SOFT COMPUTING, 2020, 97 (97)
  • [10] Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks
    Mahnaz Noroozi
    Ziba Eslami
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 879 - 890