A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience

被引:0
作者
Chengyu Hu
Rupeng Yang
Pengtao Liu
Tong Li
Fanyu Kong
机构
[1] Shandong University,Software College
[2] Anhui University,Co
[3] Shandong University,Innovation Center for Information Supply & Assurance Technology
[4] Shandong University of Political Science and Law,School of Computer Science and Technology
[5] Guangzhou University,School of Information
[6] Shandong University,School of Computer Science
来源
The Journal of Supercomputing | 2019年 / 75卷
关键词
Public-key encryption; Side-channel attacks; Tampering resilience; Leakage resilience; Continuous attacks;
D O I
暂无
中图分类号
学科分类号
摘要
Public-key encryption is an important security mechanism used in cloud environment. To ensure the confidentiality of data encrypted using public-key encryption, countermeasures against cryptographic key leakage by side-channel attacks should be applied to the encryption scheme implemented both in locality and in cloud server. Traditional public-key encryption does not capture side-channel attacks. Moreover, the adversary can inject fault to tamper with the secret key and observe the output of the public-key encryption scheme under this modified key which is called “tampering attack”. In this paper, we present two continuous leakage and tampering resilient CCA secure public-key encryption schemes. For implementations of our schemes during the key update, bounded number of tampering queries for arbitrary key relations and bounded leakage is allowed. By updating the secret key, our schemes are secure against continuous leakage and tampering attacks.
引用
收藏
页码:3099 / 3122
页数:23
相关论文
共 50 条
[41]   Public-Key Encryption Resilient to Linear Related-Key Attacks [J].
Cui, Hui ;
Mu, Yi ;
Au, Man Ho .
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 :182-196
[42]   Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes [J].
Lai, Qi-Qi ;
Yang, Bo ;
Yu, Yong ;
Xia, Zhe ;
Zhou, Yan-Wei ;
Chen, Yuan .
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2018, 33 (06) :1243-1260
[43]   Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes [J].
Qi-Qi Lai ;
Bo Yang ;
Yong Yu ;
Zhe Xia ;
Yan-Wei Zhou ;
Yuan Chen .
Journal of Computer Science and Technology, 2018, 33 :1243-1260
[44]   Public-key encryption with keyword search secure against continual memory attacks [J].
Hu, Chengyu ;
Yang, Rupeng ;
Liu, Pengtao ;
Yu, Zuoxia ;
Zhou, Yongbin ;
Xu, Qiuliang .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) :1613-1629
[45]   Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter [J].
Qin, Baodong ;
Liu, Shengli .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT II, 2013, 8270 :381-400
[46]   Cryptanalysis of the public-key encryption based on braid groups [J].
Lee, E ;
Park, JH .
ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 :477-490
[47]   A fast semiring-based public-key encryption [J].
Nassr, Dieaa I. ;
Bahig, Hatem M. ;
Hazber, Mohamed A. G. ;
Alseadoon, Ibrahim M. ;
Bahig, Hazem M. .
AIMS MATHEMATICS, 2025, 10 (04) :8569-8586
[48]   A forward-secure public-key encryption scheme [J].
Canetti, Ran ;
Halevi, Shai ;
Katz, Jonathan .
JOURNAL OF CRYPTOLOGY, 2007, 20 (03) :265-294
[49]   Predicate encryption against master-key tampering attacks [J].
Yuejun Liu ;
Rui Zhang ;
Yongbin Zhou .
Cybersecurity, 2
[50]   Methods for Restricting Message Space in Public-Key Encryption [J].
Sakai, Yusuke ;
Emura, Keita ;
Hanaoka, Goichiro ;
Kawai, Yutaka ;
Omote, Kazumasa .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (06) :1156-1168