Public-Key Encryption In The Standard Model Against Strong Leakage Adversary

被引:1
|
作者
Alawatugoda, Janaka [1 ]
机构
[1] Univ Peradeniya, Fac Engn, Dept Comp Engn, Peradeniya 20400, Sri Lanka
来源
COMPUTER JOURNAL | 2020年 / 63卷 / 12期
关键词
public-key encryption schemes; leakage-resilient cryptography; continuous leakage; CCLA2-security; after-the-fact leakage; standard model;
D O I
10.1093/comjnl/bxaa055
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Over the years, security against adaptively chosen-ciphertext attacks (CCA2) is considered as the strongest security definition for public-key encryption schemes. With the uprise of side-channel attacks, new security definitions are proposed, addressing leakage of secret keys together with the standard CCA2 definition. Among the new security definitions, security against continuous and after-the-fact leakage-resilient CCA2 can be considered as the strongest security definition, which is called as security against (continuous) adaptively chosen-ciphertext leakage attacks (continuous CCLA2). In this paper, we present a construction of a public-key encryption scheme, namely LR-PKE, which satisfies the aforementioned security definition. The security of our public-key encryption scheme is proven in the standard model, under decision BDH assumption. Thus, we emphasize that our public-key encryption scheme LR-PKE is (continuous) CCLA2-secure in the standard model. For our construction of LR-PKE, we have used a strong one-time signature scheme and a leakage-resilient refreshing protocol as underlying building blocks. The leakage bound is 0.15n log p - 1 bits per leakage query, for a security parameter k and a statistical security parameter n, such that log p >= k and n is a function of k. It is possible to see that LR-PKE is efficient enough to be used for real-world usage.
引用
收藏
页码:1904 / 1914
页数:11
相关论文
共 50 条
  • [21] Public-key encryption with chaos
    Kocarev, L
    Sterjev, M
    Fekete, A
    Vattay, G
    CHAOS, 2004, 14 (04) : 1078 - 1082
  • [22] LUC - PUBLIC-KEY ENCRYPTION
    SMITH, P
    DR DOBBS JOURNAL, 1993, 18 (01): : 44 - &
  • [23] Multipurpose Public-Key Encryption
    Zhang, Rui
    He, Kai
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 69 - 84
  • [24] Public-Key Encryption in the Bounded-Retrieval Model
    Alwen, Joel
    Dodis, Yevgeniy
    Naor, Moni
    Segev, Gil
    Walfish, Shabsi
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 113 - +
  • [25] On the implementation of the Advanced Encryption Standard on a public-key crypto-coprocessor
    Garcia, AV
    Seifert, JP
    USENIX ASSOCIATION AND IFIP WG 8.8 (SMART CARDS) PROCEEDINGS OF CARDIS '02 FIFTH SMART CARD RESEARCH AND ADVANCED APPLICATION CONFERENCE, 2002, : 135 - 145
  • [26] Lattice-based completely non-malleable public-key encryption in the standard model
    Sepahi, Reza
    Steinfeld, Ron
    Pieprzyk, Josef
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 71 (02) : 293 - 313
  • [27] Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security
    Zhou, Yanwei
    Yang, Bo
    COMPUTER JOURNAL, 2017, 60 (08): : 1161 - 1172
  • [28] Lattice-based completely non-malleable public-key encryption in the standard model
    Reza Sepahi
    Ron Steinfeld
    Josef Pieprzyk
    Designs, Codes and Cryptography, 2014, 71 : 293 - 313
  • [29] Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
    Haralambiev, Kristiyan
    Jager, Tibor
    Kiltz, Eike
    Shoup, Victor
    PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 1 - +
  • [30] Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond
    Persiano, Giuseppe
    Phan, Duong Hieu
    Yung, Moti
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 422 - 455