Public-Key Encryption In The Standard Model Against Strong Leakage Adversary

被引:1
|
作者
Alawatugoda, Janaka [1 ]
机构
[1] Univ Peradeniya, Fac Engn, Dept Comp Engn, Peradeniya 20400, Sri Lanka
来源
COMPUTER JOURNAL | 2020年 / 63卷 / 12期
关键词
public-key encryption schemes; leakage-resilient cryptography; continuous leakage; CCLA2-security; after-the-fact leakage; standard model;
D O I
10.1093/comjnl/bxaa055
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Over the years, security against adaptively chosen-ciphertext attacks (CCA2) is considered as the strongest security definition for public-key encryption schemes. With the uprise of side-channel attacks, new security definitions are proposed, addressing leakage of secret keys together with the standard CCA2 definition. Among the new security definitions, security against continuous and after-the-fact leakage-resilient CCA2 can be considered as the strongest security definition, which is called as security against (continuous) adaptively chosen-ciphertext leakage attacks (continuous CCLA2). In this paper, we present a construction of a public-key encryption scheme, namely LR-PKE, which satisfies the aforementioned security definition. The security of our public-key encryption scheme is proven in the standard model, under decision BDH assumption. Thus, we emphasize that our public-key encryption scheme LR-PKE is (continuous) CCLA2-secure in the standard model. For our construction of LR-PKE, we have used a strong one-time signature scheme and a leakage-resilient refreshing protocol as underlying building blocks. The leakage bound is 0.15n log p - 1 bits per leakage query, for a security parameter k and a statistical security parameter n, such that log p >= k and n is a function of k. It is possible to see that LR-PKE is efficient enough to be used for real-world usage.
引用
收藏
页码:1904 / 1914
页数:11
相关论文
共 50 条
  • [1] Public-key encryption in the standard model against strong leakage adversary
    Alawatugoda, Janaka
    Computer Journal, 2020, 63 (12): : 1904 - 1914
  • [2] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Li, Tong
    Kong, Fanyu
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (06): : 3099 - 3122
  • [3] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
    Chengyu Hu
    Rupeng Yang
    Pengtao Liu
    Tong Li
    Fanyu Kong
    The Journal of Supercomputing, 2019, 75 : 3099 - 3122
  • [4] Novel Public-Key Encryption with Continuous Leakage Amplification
    Qiao, Zirui
    Yang, Qiliang
    Zhou, Yanwei
    Xia, Zhe
    Zhang, Mingwu
    COMPUTER JOURNAL, 2021, 64 (08): : 1163 - 1177
  • [5] Post-challenge leakage in public-key encryption
    Zhang, Zongyang
    Chow, Sherman S. M.
    Cao, Zhenfu
    THEORETICAL COMPUTER SCIENCE, 2015, 572 : 25 - 49
  • [6] After-the-Fact Leakage in Public-Key Encryption
    Halevi, Shai
    Lin, Huijia
    THEORY OF CRYPTOGRAPHY, 2011, 6597 : 107 - +
  • [7] Deterministic Public-Key Encryption Under Continual Leakage
    Koppula, Venkata
    Pandey, Omkant
    Rouselakis, Yannis
    Waters, Brent
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 304 - 323
  • [8] Lattice-based certificateless public-key encryption in the standard model
    Reza Sepahi
    Ron Steinfeld
    Josef Pieprzyk
    International Journal of Information Security, 2014, 13 : 315 - 333
  • [9] Lattice-based certificateless public-key encryption in the standard model
    Sepahi, Reza
    Steinfeld, Ron
    Pieprzyk, Josef
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (04) : 315 - 333
  • [10] Strong Knowledge Extractors for Public-Key Encryption Schemes
    Barbosa, Manuel
    Farshim, Pooya
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 164 - +