Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks

被引:4
|
作者
Hu, Chengyu [1 ]
Liu, Pengtao [2 ]
Zhou, Yongbin [3 ]
Guo, Shanqing [1 ]
Wang, Yilei [4 ]
Xu, Qiuliang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Peoples R China
[2] Shandong Univ Polit Sci & Law, Sch Informat, Jinan 250014, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Ludong Univ, Sch Informat & Elect Engn, Yantai, Peoples R China
基金
中国国家自然科学基金;
关键词
Leakage resilience; Related-key security; Extractable hash proofs; Public-key encryption; Intelligent agent security; RESILIENT; SECURITY;
D O I
10.1007/s00500-015-1782-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Public-key encryption can be used to protect the sensitive data in cloud system with intelligent mobile agents facilitating better services. However, many public-key encryption schemes do not resist the side-channel attacks which can be applied to the encryption instances implemented on a chip or cloud to obtain partial information leakage about the secret states, as the traditional security model of public-key encryption does not capture this kind of attacks. Also, the adversary can inject fault to tamper with the secret key and observe the output of the public-key encryption scheme under this modified key which is called "related-key attacks". Inspired by these, the models of key-leakage attacks and related-key attacks are formalized, respectively. In this paper, we present a method to construct public-key encryption schemes against both weak key-leakage attacks and linear related-key attacks from extractable hash proof systems (EHPS or XHPS). Specifically, we first transform ABOEHPS to weak leakage-resilient ABOEHPS and add Key Homomorphism and Fingerprinting properties to it. Then, based on this new ABOEHPS, we construct weak leakage-resilient adaptive trapdoor relation with these two properties and public-key encryption schemes against both weak key-leakage attacks and linear related-key attacks can be constructed from it. Moreover, we propose a public-key encryption scheme against both adaptive key-leakage attacks and linear related-key attacks.
引用
收藏
页码:4919 / 4932
页数:14
相关论文
共 50 条
  • [41] Searchable Public-Key Encryption with Data Sharing in Dynamic Groups for Mobile Cloud Storage
    Xia, Qi
    Ni, Jianbing
    Kanpogninge, Ansuura John Bosco Aristotle
    Gee, James C.
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2015, 21 (03) : 440 - 453
  • [42] On the Importance of Checking Multivariate Public Key Cryptography for Side-Channel Attacks: The Case of enTTS Scheme
    Yi, Haibo
    Li, Weijian
    COMPUTER JOURNAL, 2017, 60 (08): : 1197 - 1209
  • [43] HANMRE - An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches
    Song Dat Phuc Tran
    Seok, Byoungjin
    Lee, Changhoon
    APPLIED SOFT COMPUTING, 2020, 97 (97)
  • [44] iPEKS: Fast and Secure Cloud Data Retrieval from the Public-key Encryption with Keyword Search
    Tseng, Fu-Kuo
    Chen, Rong-Jaye
    Lin, Bao-Shuh Paul
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 452 - 458
  • [45] A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing
    Chen, Biwen
    Wu, Libing
    Li, Li
    Choo, Kim-Kwang Raymond
    He, Debiao
    IEEE ACCESS, 2020, 8 : 28009 - 28020
  • [46] Secure Quantum-based Adder Design for Protecting Machine Learning Systems Against Side-Channel Attacks
    Ul Ain, Noor
    Ahmadpour, Seyed-Sajad
    Navimipour, Nima Jafari
    Diakina, E.
    Kassa, Sankit R.
    APPLIED SOFT COMPUTING, 2025, 169
  • [47] Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks
    Mahnaz Noroozi
    Ziba Eslami
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 879 - 890
  • [48] Security Simulation against Side-Channel Attacks on Advanced Encryption Standard Circuits Based on Equivalent Circuit Model
    Iokibe, Kengo
    Maeshima, Kazuhiro
    Watanabe, Tetsushi
    Toyota, Yoshitaka
    2015 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC), 2015, : 224 - 229
  • [49] Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks
    Noroozi, Mahnaz
    Eslami, Ziba
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (02) : 879 - 890
  • [50] Static and Dynamic Obfuscations of Scan Data Against Scan-Based Side-Channel Attacks
    Cui, Aijiao
    Luo, Yanhui
    Chang, Chip-Hong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (02) : 363 - 376