Continuous Leakage-resilient Broadcast Key-encapsulation Mechanism with CCA Security

被引:0
|
作者
Qiao Z.-R. [1 ]
Yang Q.-L. [1 ]
Zhou Y.-W. [1 ,2 ,3 ]
Yang B. [1 ]
Xia Z. [4 ]
Zhang M.-W. [2 ,3 ]
机构
[1] School of Computer Science, Shaanxi Normal University, Xi’an
[2] Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin
[3] State Key Laboratory of Cryptology, Beijing
[4] School of Computer Science and Technology, Wuhan University of Technology, Wuhan
来源
Ruan Jian Xue Bao/Journal of Software | 2023年 / 34卷 / 02期
关键词
broadcast communication; certificate-based key-encapsulation mechanism; chosen-ciphertext attacks; continuous leakage resilience;
D O I
10.13328/j.cnki.jos.006398
中图分类号
学科分类号
摘要
Certificate-based cryptography which is attracted great interest can solve the certificate management issue of the traditional public-key cryptography system, at the same time, which can also avoid the key escrow in the identity-based cryptography, thus, it has attracted attention of cryptography researchers. The traditional security models assume that any adversary cannot obtain the leakage information on the internal secret states, such as secret keys, however, some leakage can be leaked through various leakage attacks in the actual environment. In addition, many cryptographic schemes with broadcast communication function were created, because broadcast communication has higher efficiency of message transmission. To further provide leakage resilience and broadcast communication for certificate-based broadcast key encapsulation mechanism (CB-BKEM), a concrete construction of CB-BKEM is proposed, and the leakage-resilient chosen-ciphertext attacks security is proved based on decisional Diffie-Hellman assumption. To further improve the practicability of CB-BKEM, continuous leakage-resilient CB-BKEM is researched, and the continuous leakage resilience of CB-BKEM can be obtained by performing key update. The performance analysis shows that the proposed construction has higher computational efficiency while maintaining the provable security, the leakage resilience and the broadcast communication. © 2023 Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:818 / 832
页数:14
相关论文
共 28 条
  • [1] Zhou YW, Yang B, Zhang WZ, Mu Y., CCA2 secure public-key encryption scheme tolerating continual leakage attacks, Security and Communication Networks, 9, 17, pp. 4505-4519, (2016)
  • [2] Zhou YW, Yang B., Continuous leakage-resilient public-key encryption scheme with CCA security, The Computer Journal, 60, 8, pp. 1161-1172, (2017)
  • [3] Li JG, Teng ML, Zhang YC, Yu QH., A leakage-resilient CCA-secure identity-based encryption scheme, The Computer Journal, 59, 7, pp. 1066-1075, (2016)
  • [4] Li JG, Teng ML, Zhang YC., Identity-based broadcast encryption with continuous leakage resilience, Information Sciences, 429, 3, pp. 177-193, (2018)
  • [5] Li JG, Guo YY, Yu QH, Lu Y, Zhang YC., Provably secure identity-based encryption resilient to post-challenge continuous auxiliary inputs leakage, Security and Communication Networks, 9, 10, pp. 1016-1024, (2016)
  • [6] Li JG, Yu QH, Zhang YC., Hierarchical attribute-based encryption with continuous leakage resilience, Information Sciences, 484, pp. 113-134, (2019)
  • [7] Li JG, Yu QH, Zhang YC., Key-policy attribute-based encryption against continual auxiliary input leakage, Information Sciences, 470, pp. 175-188, (2019)
  • [8] Zhou YW, Yang B., Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing, Information Processing Letters, 130, pp. 16-24, (2018)
  • [9] Zhou YW, Yang B., Continuous leakage-resilient certificateless public key encryption with CCA security, Knowledge-based Systems, 136, pp. 27-36, (2017)
  • [10] Wu JD, Tseng YM, Huang SS., An identity-based authenticated key exchange protocol resilient to continuous key leakage, IEEE Systems Journal, 13, 4, pp. 3968-3979, (2019)