Public-Key Encryption In The Standard Model Against Strong Leakage Adversary

被引:1
|
作者
Alawatugoda, Janaka [1 ]
机构
[1] Univ Peradeniya, Fac Engn, Dept Comp Engn, Peradeniya 20400, Sri Lanka
来源
COMPUTER JOURNAL | 2020年 / 63卷 / 12期
关键词
public-key encryption schemes; leakage-resilient cryptography; continuous leakage; CCLA2-security; after-the-fact leakage; standard model;
D O I
10.1093/comjnl/bxaa055
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Over the years, security against adaptively chosen-ciphertext attacks (CCA2) is considered as the strongest security definition for public-key encryption schemes. With the uprise of side-channel attacks, new security definitions are proposed, addressing leakage of secret keys together with the standard CCA2 definition. Among the new security definitions, security against continuous and after-the-fact leakage-resilient CCA2 can be considered as the strongest security definition, which is called as security against (continuous) adaptively chosen-ciphertext leakage attacks (continuous CCLA2). In this paper, we present a construction of a public-key encryption scheme, namely LR-PKE, which satisfies the aforementioned security definition. The security of our public-key encryption scheme is proven in the standard model, under decision BDH assumption. Thus, we emphasize that our public-key encryption scheme LR-PKE is (continuous) CCLA2-secure in the standard model. For our construction of LR-PKE, we have used a strong one-time signature scheme and a leakage-resilient refreshing protocol as underlying building blocks. The leakage bound is 0.15n log p - 1 bits per leakage query, for a security parameter k and a statistical security parameter n, such that log p >= k and n is a function of k. It is possible to see that LR-PKE is efficient enough to be used for real-world usage.
引用
收藏
页码:1904 / 1914
页数:11
相关论文
共 50 条
  • [41] Integer Reconstruction Public-Key Encryption
    Ferradi, Houda
    Naccache, David
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 412 - 433
  • [42] Incremental Deterministic Public-Key Encryption
    Ilya Mironov
    Omkant Pandey
    Omer Reingold
    Gil Segev
    Journal of Cryptology, 2018, 31 : 134 - 161
  • [43] Parallel authentication and public-key encryption
    Pieprzyk, J
    Pointcheval, D
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 387 - 401
  • [44] Universally anonymizable public-key encryption
    Hayashi, R
    Tanaka, K
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 293 - 312
  • [45] Incremental Deterministic Public-Key Encryption
    Mironov, Ilya
    Pandey, Omkant
    Reingold, Omer
    Segev, Gil
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 628 - 644
  • [46] Public-Key Encryption with Delegated Search
    Ibraimi, Luan
    Nikova, Svetla
    Hartel, Pieter
    Jonker, Willem
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2011), 2011, 6715 : 532 - 549
  • [47] A new public-key encryption scheme
    Tian, Hai-Bo
    Sun, Xi
    Wang, Yu-Min
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 95 - 102
  • [48] Quantum Random Oracle Model for Quantum Public-Key Encryption
    Shang, Tao
    Chen, Ranyiliu
    Lei, Qi
    IEEE ACCESS, 2019, 7 (130024-130031) : 130024 - 130031
  • [49] Hedged Public-Key Encryption: How to Protect against Bad Randomness
    Bellare, Mihir
    Brakerski, Zvika
    Naor, Moni
    Ristenpart, Thomas
    Segev, Gil
    Shacham, Hovav
    Yilek, Scott
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 232 - +
  • [50] Updatable Public Key Encryption in the Standard Model
    Dodis, Yevgeniy
    Karthikeyan, Harish
    Wichs, Daniel
    THEORY OF CRYPTOGRAPHY, TCC 2021, PT III, 2021, 13044 : 254 - 285