Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks

被引:4
|
作者
Hu, Chengyu [1 ]
Liu, Pengtao [2 ]
Zhou, Yongbin [3 ]
Guo, Shanqing [1 ]
Wang, Yilei [4 ]
Xu, Qiuliang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Peoples R China
[2] Shandong Univ Polit Sci & Law, Sch Informat, Jinan 250014, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Ludong Univ, Sch Informat & Elect Engn, Yantai, Peoples R China
基金
中国国家自然科学基金;
关键词
Leakage resilience; Related-key security; Extractable hash proofs; Public-key encryption; Intelligent agent security; RESILIENT; SECURITY;
D O I
10.1007/s00500-015-1782-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Public-key encryption can be used to protect the sensitive data in cloud system with intelligent mobile agents facilitating better services. However, many public-key encryption schemes do not resist the side-channel attacks which can be applied to the encryption instances implemented on a chip or cloud to obtain partial information leakage about the secret states, as the traditional security model of public-key encryption does not capture this kind of attacks. Also, the adversary can inject fault to tamper with the secret key and observe the output of the public-key encryption scheme under this modified key which is called "related-key attacks". Inspired by these, the models of key-leakage attacks and related-key attacks are formalized, respectively. In this paper, we present a method to construct public-key encryption schemes against both weak key-leakage attacks and linear related-key attacks from extractable hash proof systems (EHPS or XHPS). Specifically, we first transform ABOEHPS to weak leakage-resilient ABOEHPS and add Key Homomorphism and Fingerprinting properties to it. Then, based on this new ABOEHPS, we construct weak leakage-resilient adaptive trapdoor relation with these two properties and public-key encryption schemes against both weak key-leakage attacks and linear related-key attacks can be constructed from it. Moreover, we propose a public-key encryption scheme against both adaptive key-leakage attacks and linear related-key attacks.
引用
收藏
页码:4919 / 4932
页数:14
相关论文
共 50 条
  • [21] Public-key encryption with keyword search secure against continual memory attacks
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Yu, Zuoxia
    Zhou, Yongbin
    Xu, Qiuliang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1613 - 1629
  • [22] Improving recent side-channel attacks against the DES key schedule
    Wiemers, Andreas
    Mittmann, Johannes
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2023, 13 (01) : 1 - 17
  • [23] Protecting On-Chip Data Access Against Timing-Based Side-Channel Attacks on Multicores
    Ali, Usman
    Sahni, Abdul Rasheed
    Khan, Omer
    2022 IEEE INTERNATIONAL SYMPOSIUM ON SECURE AND PRIVATE EXECUTION ENVIRONMENT DESIGN (SEED 2022), 2022, : 190 - 201
  • [24] Measuring Security of Symmetric Encryption Schemes Against On-the-Fly Side-Channel Key-Recovery Attacks
    Santoso, Bagus
    Oohama, Yasutada
    Su, Chunhua
    NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 3 - 17
  • [25] Improving recent side-channel attacks against the DES key schedule
    Andreas Wiemers
    Johannes Mittmann
    Journal of Cryptographic Engineering, 2023, 13 : 1 - 17
  • [26] Investigating profiled side-channel attacks against the DES key schedule
    Heyszl J.
    Miller K.
    Unterstein F.
    Schink M.
    Wagner A.
    Gieser H.
    Freud S.
    Damm T.
    Klein D.
    Kügler D.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (03): : 22 - 72
  • [27] Anonymous CP-ABE Against Side-Channel Attacks in Cloud Computing
    Zhang, Jing-Xia
    Zhang, Le-You
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 789 - 805
  • [28] Hardware Architecture Implemented on FPGA for Protecting Cryptographic Keys against Side-Channel Attacks
    Lumbiarres-Lopez, Ruben
    Lopez-Garcia, Mariano
    Canto-Navarro, Enrique
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) : 898 - 905
  • [29] Trade-offs in Protecting KECCAK Against Combined Side-Channel and Fault Attacks
    Purnal, Antoon
    Arribas, Victor
    De Meyer, Lauren
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 285 - 302
  • [30] Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
    Unterluggauer, Thomas
    Werner, Mario
    Mangard, Stefan
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 690 - 702