Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks

被引:4
|
作者
Hu, Chengyu [1 ]
Liu, Pengtao [2 ]
Zhou, Yongbin [3 ]
Guo, Shanqing [1 ]
Wang, Yilei [4 ]
Xu, Qiuliang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Peoples R China
[2] Shandong Univ Polit Sci & Law, Sch Informat, Jinan 250014, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Ludong Univ, Sch Informat & Elect Engn, Yantai, Peoples R China
基金
中国国家自然科学基金;
关键词
Leakage resilience; Related-key security; Extractable hash proofs; Public-key encryption; Intelligent agent security; RESILIENT; SECURITY;
D O I
10.1007/s00500-015-1782-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Public-key encryption can be used to protect the sensitive data in cloud system with intelligent mobile agents facilitating better services. However, many public-key encryption schemes do not resist the side-channel attacks which can be applied to the encryption instances implemented on a chip or cloud to obtain partial information leakage about the secret states, as the traditional security model of public-key encryption does not capture this kind of attacks. Also, the adversary can inject fault to tamper with the secret key and observe the output of the public-key encryption scheme under this modified key which is called "related-key attacks". Inspired by these, the models of key-leakage attacks and related-key attacks are formalized, respectively. In this paper, we present a method to construct public-key encryption schemes against both weak key-leakage attacks and linear related-key attacks from extractable hash proof systems (EHPS or XHPS). Specifically, we first transform ABOEHPS to weak leakage-resilient ABOEHPS and add Key Homomorphism and Fingerprinting properties to it. Then, based on this new ABOEHPS, we construct weak leakage-resilient adaptive trapdoor relation with these two properties and public-key encryption schemes against both weak key-leakage attacks and linear related-key attacks can be constructed from it. Moreover, we propose a public-key encryption scheme against both adaptive key-leakage attacks and linear related-key attacks.
引用
收藏
页码:4919 / 4932
页数:14
相关论文
共 50 条
  • [31] Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks
    Chengyu Hu
    Zhen Li
    Pengtao Liu
    Rupeng Yang
    Shanqing Guo
    Hailong Zhang
    Mobile Networks and Applications, 2021, 26 : 2490 - 2500
  • [32] Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks
    Hu, Chengyu
    Li, Zhen
    Liu, Pengtao
    Yang, Rupeng
    Guo, Shanqing
    Zhang, Hailong
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (06): : 2490 - 2500
  • [33] On the Security of Practical Mail User Agents against Cache Side-Channel Attacks
    Kim, Hodong
    Yoon, Hyundo
    Shin, Youngjoo
    Hur, Junbeom
    APPLIED SCIENCES-BASEL, 2020, 10 (11):
  • [34] Public-Key Encryption Secure Against Related Randomness Attacks for Improved End-to-End Security of Cloud/Edge Computing
    Liu, Pengtao
    IEEE ACCESS, 2020, 8 : 16750 - 16759
  • [35] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Li, Tong
    Kong, Fanyu
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (06): : 3099 - 3122
  • [36] Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks
    Azouaoui M.
    Kuzovkova Y.
    Schneider T.
    van Vredendaal C.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 372 - 396
  • [37] Designated-Senders Public-Key Searchable Encryption Secure against Keyword Guessing Attacks
    Saito, Takanori
    Nakanishi, Toru
    2017 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2017, : 496 - 502
  • [38] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
    Chengyu Hu
    Rupeng Yang
    Pengtao Liu
    Tong Li
    Fanyu Kong
    The Journal of Supercomputing, 2019, 75 : 3099 - 3122
  • [39] An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
    Huang, Qiong
    Li, Hongbo
    INFORMATION SCIENCES, 2017, 403 : 1 - 14
  • [40] On security of XTR public key cryptosystems against side channel attacks
    Han, DG
    Lim, J
    Sakurai, K
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 454 - 465