Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks

被引:0
作者
Chengyu Hu
Pengtao Liu
Yongbin Zhou
Shanqing Guo
Yilei Wang
Qiuliang Xu
机构
[1] Shandong University,School of Computer Science and Technology
[2] Shandong University of Political Science and Law,School of Information
[3] Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering
[4] Ludong University,School of Information and Electrical Engineering
来源
Soft Computing | 2016年 / 20卷
关键词
Leakage resilience; Related-key security; Extractable hash proofs; Public-key encryption; Intelligent agent security;
D O I
暂无
中图分类号
学科分类号
摘要
Public-key encryption can be used to protect the sensitive data in cloud system with intelligent mobile agents facilitating better services. However, many public-key encryption schemes do not resist the side-channel attacks which can be applied to the encryption instances implemented on a chip or cloud to obtain partial information leakage about the secret states, as the traditional security model of public-key encryption does not capture this kind of attacks. Also, the adversary can inject fault to tamper with the secret key and observe the output of the public-key encryption scheme under this modified key which is called “related-key attacks”. Inspired by these, the models of key-leakage attacks and related-key attacks are formalized, respectively. In this paper, we present a method to construct public-key encryption schemes against both weak key-leakage attacks and linear related-key attacks from extractable hash proof systems (EHPS or XHPS). Specifically, we first transform ABOEHPS to weak leakage-resilient ABOEHPS and add Key Homomorphism and Fingerprinting properties to it. Then, based on this new ABOEHPS, we construct weak leakage-resilient adaptive trapdoor relation with these two properties and public-key encryption schemes against both weak key-leakage attacks and linear related-key attacks can be constructed from it. Moreover, we propose a public-key encryption scheme against both adaptive key-leakage attacks and linear related-key attacks.
引用
收藏
页码:4919 / 4932
页数:13
相关论文
共 47 条
[1]  
Akavia A(2009)Simultaneous hardcore bits and cryptography against memory attacks TCC 2009 474-495
[2]  
Goldwasser S(2015)Cloud-based adaptive compression and secure management services for 3d healthcare data Future Gen Comput Syst 1 120-134
[3]  
Vaikuntanathan V(2012)Supporting software intelligence in ubiquitous environment exploits mobile agent J Amb Intell Humaniz Comput 3 141-151
[4]  
Castiglione A(2009)On cryptography with auxiliary input STOC 2009 621-630
[5]  
Pizzolante R(2009)Distributed agent platform with intrusion detection capabilities INCOS 2009 81-86
[6]  
De Santis A(2004)Secure conjunctive keyword search over encrypted data ACNS 2004 31-45
[7]  
Carpentieri B(2008)Lest we remember: Cold-boot attacks on encryption keys USENIX Sec Symp 2008 45-60
[8]  
Castiglione A(2011)After-the-fact leakage in public-key encryption TCC 2011 474-495
[9]  
Palmieri F(2014)Securely outsourcing attribute-based encryption with checkability IEEE Trans Parall Distribut Sys 25 2201-2210
[10]  
Chang Y(2012)Public-key cryptosystems resilient to key leakage SIAM J Comput 41 772-814