Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks

被引:0
|
作者
Chengyu Hu
Pengtao Liu
Yongbin Zhou
Shanqing Guo
Yilei Wang
Qiuliang Xu
机构
[1] Shandong University,School of Computer Science and Technology
[2] Shandong University of Political Science and Law,School of Information
[3] Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering
[4] Ludong University,School of Information and Electrical Engineering
来源
Soft Computing | 2016年 / 20卷
关键词
Leakage resilience; Related-key security; Extractable hash proofs; Public-key encryption; Intelligent agent security;
D O I
暂无
中图分类号
学科分类号
摘要
Public-key encryption can be used to protect the sensitive data in cloud system with intelligent mobile agents facilitating better services. However, many public-key encryption schemes do not resist the side-channel attacks which can be applied to the encryption instances implemented on a chip or cloud to obtain partial information leakage about the secret states, as the traditional security model of public-key encryption does not capture this kind of attacks. Also, the adversary can inject fault to tamper with the secret key and observe the output of the public-key encryption scheme under this modified key which is called “related-key attacks”. Inspired by these, the models of key-leakage attacks and related-key attacks are formalized, respectively. In this paper, we present a method to construct public-key encryption schemes against both weak key-leakage attacks and linear related-key attacks from extractable hash proof systems (EHPS or XHPS). Specifically, we first transform ABOEHPS to weak leakage-resilient ABOEHPS and add Key Homomorphism and Fingerprinting properties to it. Then, based on this new ABOEHPS, we construct weak leakage-resilient adaptive trapdoor relation with these two properties and public-key encryption schemes against both weak key-leakage attacks and linear related-key attacks can be constructed from it. Moreover, we propose a public-key encryption scheme against both adaptive key-leakage attacks and linear related-key attacks.
引用
收藏
页码:4919 / 4932
页数:13
相关论文
共 50 条
  • [1] Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
    Hu, Chengyu
    Liu, Pengtao
    Zhou, Yongbin
    Guo, Shanqing
    Wang, Yilei
    Xu, Qiuliang
    SOFT COMPUTING, 2016, 20 (12) : 4919 - 4932
  • [2] Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems
    Avanzi, Roberto
    Hoerder, Simon
    Page, Dan
    Tunstall, Michael
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (01) : 75 - 75
  • [3] Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems
    Avanzi, Roberto
    Hoerder, Simon
    Page, Dan
    Tunstall, Michael
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (04) : 271 - 281
  • [4] Erratum to: Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems
    Roberto Avanzi
    Simon Hoerder
    Dan Page
    Michael Tunstall
    Journal of Cryptographic Engineering, 2012, 2 (1) : 75 - 75
  • [5] Scan attacks on side-channel and fault attack resistant public-key implementations
    Da Rolt, Jean
    Das, Amitabh
    Ghosh, Santosh
    Di Natale, Giorgio
    Flottes, Marie-Lise
    Rouzeyre, Bruno
    Verbauwhede, Ingrid
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (04) : 207 - 219
  • [6] Scan attacks on side-channel and fault attack resistant public-key implementations
    Jean Da Rolt
    Amitabh Das
    Santosh Ghosh
    Giorgio Di Natale
    Marie-Lise Flottes
    Bruno Rouzeyre
    Ingrid Verbauwhede
    Journal of Cryptographic Engineering, 2012, 2 (4) : 207 - 219
  • [7] An Intelligent Framework for Cluster-Based Side-Channel Analysis on Public-Key Cryptosystems
    Wei, Congming
    He, Shulin
    Wang, An
    Sun, Shaofei
    Ding, Yaoling
    Zhang, Jingqi
    Zhu, Liehuang
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (02): : 1962 - 1973
  • [8] Leakage-Resilient Public Key Encryption with Equality Test Resistant to Side-channel Attacks
    Tsai, Tung-tso
    Lin, Han-yu
    Chen, Yu-chi
    Chen, Yuan-chin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2025, 41 (01) : 155 - 176
  • [9] Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage
    Wu, Axin
    Li, Fagen
    Xin, Xiangjun
    Zhang, Yinghui
    Zhu, Jianhao
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 149
  • [10] Side-channel Resistant System-level Design Flow for Public-key Cryptography
    Sakiyama, Kazuo
    De Mulder, Elke
    Preneel, Bart
    Verbauwhede, Ingrid
    GLSVLSI'07: PROCEEDINGS OF THE 2007 ACM GREAT LAKES SYMPOSIUM ON VLSI, 2007, : 144 - 147