A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience

被引:0
作者
Chengyu Hu
Rupeng Yang
Pengtao Liu
Tong Li
Fanyu Kong
机构
[1] Shandong University,Software College
[2] Anhui University,Co
[3] Shandong University,Innovation Center for Information Supply & Assurance Technology
[4] Shandong University of Political Science and Law,School of Computer Science and Technology
[5] Guangzhou University,School of Information
[6] Shandong University,School of Computer Science
来源
The Journal of Supercomputing | 2019年 / 75卷
关键词
Public-key encryption; Side-channel attacks; Tampering resilience; Leakage resilience; Continuous attacks;
D O I
暂无
中图分类号
学科分类号
摘要
Public-key encryption is an important security mechanism used in cloud environment. To ensure the confidentiality of data encrypted using public-key encryption, countermeasures against cryptographic key leakage by side-channel attacks should be applied to the encryption scheme implemented both in locality and in cloud server. Traditional public-key encryption does not capture side-channel attacks. Moreover, the adversary can inject fault to tamper with the secret key and observe the output of the public-key encryption scheme under this modified key which is called “tampering attack”. In this paper, we present two continuous leakage and tampering resilient CCA secure public-key encryption schemes. For implementations of our schemes during the key update, bounded number of tampering queries for arbitrary key relations and bounded leakage is allowed. By updating the secret key, our schemes are secure against continuous leakage and tampering attacks.
引用
收藏
页码:3099 / 3122
页数:23
相关论文
共 50 条
  • [21] Leakage-Resilient Hybrid Signcryption in Heterogeneous Public-key Systems
    Ho, Ting-Chieh
    Tseng, Yuh-Min
    Huang, Sen-Shan
    INFORMATICA, 2024, 35 (01) : 131 - 154
  • [22] New leakage-resilient CCA-secure public key encryption
    Kurosawa, Kaoru
    Nojima, Ryo
    Phong, Le Trieu
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2013, 7 (04) : 297 - 312
  • [23] Public-Key Encryption with Lazy Parties
    Yasunaga, Kenji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (02) : 590 - 600
  • [24] TFHE Public-Key Encryption Revisited
    Joye, Marc
    TOPICS IN CRYPTOLOGY, CT-RSA 2024, 2024, 14643 : 277 - 291
  • [25] Incremental Deterministic Public-Key Encryption
    Mironov, Ilya
    Pandey, Omkant
    Reingold, Omer
    Segev, Gil
    JOURNAL OF CRYPTOLOGY, 2018, 31 (01) : 134 - 161
  • [26] Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 268 - 275
  • [27] Incremental Deterministic Public-Key Encryption
    Ilya Mironov
    Omkant Pandey
    Omer Reingold
    Gil Segev
    Journal of Cryptology, 2018, 31 : 134 - 161
  • [28] Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
    Chengyu Hu
    Pengtao Liu
    Yongbin Zhou
    Shanqing Guo
    Yilei Wang
    Qiuliang Xu
    Soft Computing, 2016, 20 : 4919 - 4932
  • [29] Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
    Hu, Chengyu
    Liu, Pengtao
    Zhou, Yongbin
    Guo, Shanqing
    Wang, Yilei
    Xu, Qiuliang
    SOFT COMPUTING, 2016, 20 (12) : 4919 - 4932
  • [30] Building Key-Private Public-Key Encryption Schemes
    Paterson, Kenneth G.
    Srinivasan, Sriramkrishnan
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 276 - 292