Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks

被引:4
|
作者
Hu, Chengyu [1 ]
Liu, Pengtao [2 ]
Zhou, Yongbin [3 ]
Guo, Shanqing [1 ]
Wang, Yilei [4 ]
Xu, Qiuliang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Peoples R China
[2] Shandong Univ Polit Sci & Law, Sch Informat, Jinan 250014, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Ludong Univ, Sch Informat & Elect Engn, Yantai, Peoples R China
基金
中国国家自然科学基金;
关键词
Leakage resilience; Related-key security; Extractable hash proofs; Public-key encryption; Intelligent agent security; RESILIENT; SECURITY;
D O I
10.1007/s00500-015-1782-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Public-key encryption can be used to protect the sensitive data in cloud system with intelligent mobile agents facilitating better services. However, many public-key encryption schemes do not resist the side-channel attacks which can be applied to the encryption instances implemented on a chip or cloud to obtain partial information leakage about the secret states, as the traditional security model of public-key encryption does not capture this kind of attacks. Also, the adversary can inject fault to tamper with the secret key and observe the output of the public-key encryption scheme under this modified key which is called "related-key attacks". Inspired by these, the models of key-leakage attacks and related-key attacks are formalized, respectively. In this paper, we present a method to construct public-key encryption schemes against both weak key-leakage attacks and linear related-key attacks from extractable hash proof systems (EHPS or XHPS). Specifically, we first transform ABOEHPS to weak leakage-resilient ABOEHPS and add Key Homomorphism and Fingerprinting properties to it. Then, based on this new ABOEHPS, we construct weak leakage-resilient adaptive trapdoor relation with these two properties and public-key encryption schemes against both weak key-leakage attacks and linear related-key attacks can be constructed from it. Moreover, we propose a public-key encryption scheme against both adaptive key-leakage attacks and linear related-key attacks.
引用
收藏
页码:4919 / 4932
页数:14
相关论文
共 50 条
  • [1] Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
    Chengyu Hu
    Pengtao Liu
    Yongbin Zhou
    Shanqing Guo
    Yilei Wang
    Qiuliang Xu
    Soft Computing, 2016, 20 : 4919 - 4932
  • [2] Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems
    Avanzi, Roberto
    Hoerder, Simon
    Page, Dan
    Tunstall, Michael
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (01) : 75 - 75
  • [3] Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems
    Avanzi, Roberto
    Hoerder, Simon
    Page, Dan
    Tunstall, Michael
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (04) : 271 - 281
  • [4] Erratum to: Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems
    Roberto Avanzi
    Simon Hoerder
    Dan Page
    Michael Tunstall
    Journal of Cryptographic Engineering, 2012, 2 (1) : 75 - 75
  • [5] Scan attacks on side-channel and fault attack resistant public-key implementations
    Da Rolt, Jean
    Das, Amitabh
    Ghosh, Santosh
    Di Natale, Giorgio
    Flottes, Marie-Lise
    Rouzeyre, Bruno
    Verbauwhede, Ingrid
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (04) : 207 - 219
  • [6] Scan attacks on side-channel and fault attack resistant public-key implementations
    Jean Da Rolt
    Amitabh Das
    Santosh Ghosh
    Giorgio Di Natale
    Marie-Lise Flottes
    Bruno Rouzeyre
    Ingrid Verbauwhede
    Journal of Cryptographic Engineering, 2012, 2 (4) : 207 - 219
  • [7] An Intelligent Framework for Cluster-Based Side-Channel Analysis on Public-Key Cryptosystems
    Wei, Congming
    He, Shulin
    Wang, An
    Sun, Shaofei
    Ding, Yaoling
    Zhang, Jingqi
    Zhu, Liehuang
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (02): : 1962 - 1973
  • [8] Leakage-Resilient Public Key Encryption with Equality Test Resistant to Side-channel Attacks
    Tsai, Tung-tso
    Lin, Han-yu
    Chen, Yu-chi
    Chen, Yuan-chin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2025, 41 (01) : 155 - 176
  • [9] Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage
    Wu, Axin
    Li, Fagen
    Xin, Xiangjun
    Zhang, Yinghui
    Zhu, Jianhao
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 149
  • [10] Side-channel Resistant System-level Design Flow for Public-key Cryptography
    Sakiyama, Kazuo
    De Mulder, Elke
    Preneel, Bart
    Verbauwhede, Ingrid
    GLSVLSI'07: PROCEEDINGS OF THE 2007 ACM GREAT LAKES SYMPOSIUM ON VLSI, 2007, : 144 - 147