Efficient chosen ciphertext secure identity-based encryption against key leakage attacks

被引:17
|
作者
Sun, Shi-Feng [1 ]
Gu, Dawu [1 ]
Liu, Shengli [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
关键词
identity-based encryption; leakage resilience; full security; key leakage attack; chosen ciphertext security; RESILIENT; CRYPTOGRAPHY;
D O I
10.1002/sec.1429
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the proliferation of side-channel attacks, many efforts have been made to construct cryptographic systems that remain provably secure even if part of the secret information is leaked to the adversary. Recently, there have been many identity-based encryption (IBE) schemes proposed in this context, almost all of which, however, can only achieve chosen plaintext attack (CPA) security. As far as we know, Alwen et al.'s IBE is the unique practical scheme secure against adaptive chosen ciphertext attacks (CCA2) in the standard model. Unfortunately, this scheme suffers from an undesirable shortcoming that the leakage parameter and the message length m are subject to + m logp - (log), where and p denote the security parameter and the prime order of the underlying group, respectively. Beyond that, the leakage ratio in this scheme is very low, which can just reach 1/6. In this work, we put forward two new IBE schemes, both of which are -leakage-resilient CCA2 secure in the standard model. Specifically, the first construction is proposed based on Gentry's IBE, which is quite practical and almost as efficient as the original scheme. Moreover, its leakage parameter, logp - (log), is independent of the size of the message space. To the best of our knowledge, it is the first practical leakage-resilient fully CCA2 secure IBE scheme in the standard model, tolerating up to (logp - (log))-bit leakage of the private key and its leakage parameter being independent of the message length. As to the second construction, it is proposed based on the scheme of Alwen et al., which has the same leakage parameter as Alwen et al., but has a better efficiency performance and a higher leakage ratio. As far as we know, it is the first practical and fully CCA2 secure leakage-resilient IBE scheme with leakage ratio up to 1/4. Copyright (c) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:1417 / 1434
页数:18
相关论文
共 50 条
  • [21] Chosen Ciphertext Security for Blind Identity-Based Encryption with Certified Identities
    Chiku, Sohto
    Hara, Keisuke
    Shikata, Junji
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2023, 2023, 14341 : 299 - 314
  • [22] Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
    He, Kai
    Weng, Jian
    Liu, Jia-Nan
    Liu, Joseph K.
    Liu, Wei
    Deng, Robert H.
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 247 - 255
  • [23] Chosen-ciphertext secure threshold identity-based key encapsulation without random oracles
    Galindo, David
    Kiltz, Eike
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2006, 4116 : 173 - 185
  • [24] Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
    Kiltz, Eike
    Galindo, David
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 336 - 347
  • [25] Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
    Kiltz, Eike
    Galindo, David
    THEORETICAL COMPUTER SCIENCE, 2009, 410 (47-49) : 5093 - 5111
  • [26] Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman
    Galindo, David
    PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010, 2010, 6487 : 367 - 376
  • [27] Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience
    Qin, Baodong
    Liu, Shengli
    Chen, Kefei
    IET INFORMATION SECURITY, 2015, 9 (01) : 32 - 42
  • [28] Chosen ciphertext secure fuzzy identity based encryption without ROM
    Fang L.-M.
    Wang J.-D.
    Ren Y.-J.
    Xia J.-Y.
    Bian S.-Z.
    Journal of Shanghai Jiaotong University (Science), 2008, 13 E (06) : 646 - 650
  • [29] Chosen Ciphertext Secure Fuzzy Identity Based Encryption without ROM
    方黎明
    王建东
    任勇军
    夏金月
    卞仕柱
    JournalofShanghaiJiaotongUniversity(Science), 2008, 13 (06) : 646 - 650