Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks

被引:0
|
作者
Chengyu Hu
Pengtao Liu
Yongbin Zhou
Shanqing Guo
Yilei Wang
Qiuliang Xu
机构
[1] Shandong University,School of Computer Science and Technology
[2] Shandong University of Political Science and Law,School of Information
[3] Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering
[4] Ludong University,School of Information and Electrical Engineering
来源
Soft Computing | 2016年 / 20卷
关键词
Leakage resilience; Related-key security; Extractable hash proofs; Public-key encryption; Intelligent agent security;
D O I
暂无
中图分类号
学科分类号
摘要
Public-key encryption can be used to protect the sensitive data in cloud system with intelligent mobile agents facilitating better services. However, many public-key encryption schemes do not resist the side-channel attacks which can be applied to the encryption instances implemented on a chip or cloud to obtain partial information leakage about the secret states, as the traditional security model of public-key encryption does not capture this kind of attacks. Also, the adversary can inject fault to tamper with the secret key and observe the output of the public-key encryption scheme under this modified key which is called “related-key attacks”. Inspired by these, the models of key-leakage attacks and related-key attacks are formalized, respectively. In this paper, we present a method to construct public-key encryption schemes against both weak key-leakage attacks and linear related-key attacks from extractable hash proof systems (EHPS or XHPS). Specifically, we first transform ABOEHPS to weak leakage-resilient ABOEHPS and add Key Homomorphism and Fingerprinting properties to it. Then, based on this new ABOEHPS, we construct weak leakage-resilient adaptive trapdoor relation with these two properties and public-key encryption schemes against both weak key-leakage attacks and linear related-key attacks can be constructed from it. Moreover, we propose a public-key encryption scheme against both adaptive key-leakage attacks and linear related-key attacks.
引用
收藏
页码:4919 / 4932
页数:13
相关论文
共 50 条
  • [41] Searchable Public-Key Encryption with Data Sharing in Dynamic Groups for Mobile Cloud Storage
    Xia, Qi
    Ni, Jianbing
    Kanpogninge, Ansuura John Bosco Aristotle
    Gee, James C.
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2015, 21 (03) : 440 - 453
  • [42] On the Importance of Checking Multivariate Public Key Cryptography for Side-Channel Attacks: The Case of enTTS Scheme
    Yi, Haibo
    Li, Weijian
    COMPUTER JOURNAL, 2017, 60 (08): : 1197 - 1209
  • [43] HANMRE - An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches
    Song Dat Phuc Tran
    Seok, Byoungjin
    Lee, Changhoon
    APPLIED SOFT COMPUTING, 2020, 97 (97)
  • [44] iPEKS: Fast and Secure Cloud Data Retrieval from the Public-key Encryption with Keyword Search
    Tseng, Fu-Kuo
    Chen, Rong-Jaye
    Lin, Bao-Shuh Paul
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 452 - 458
  • [45] A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing
    Chen, Biwen
    Wu, Libing
    Li, Li
    Choo, Kim-Kwang Raymond
    He, Debiao
    IEEE ACCESS, 2020, 8 : 28009 - 28020
  • [46] Secure Quantum-based Adder Design for Protecting Machine Learning Systems Against Side-Channel Attacks
    Ul Ain, Noor
    Ahmadpour, Seyed-Sajad
    Navimipour, Nima Jafari
    Diakina, E.
    Kassa, Sankit R.
    APPLIED SOFT COMPUTING, 2025, 169
  • [47] Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks
    Mahnaz Noroozi
    Ziba Eslami
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 879 - 890
  • [48] Security Simulation against Side-Channel Attacks on Advanced Encryption Standard Circuits Based on Equivalent Circuit Model
    Iokibe, Kengo
    Maeshima, Kazuhiro
    Watanabe, Tetsushi
    Toyota, Yoshitaka
    2015 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC), 2015, : 224 - 229
  • [49] Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks
    Noroozi, Mahnaz
    Eslami, Ziba
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (02) : 879 - 890
  • [50] Static and Dynamic Obfuscations of Scan Data Against Scan-Based Side-Channel Attacks
    Cui, Aijiao
    Luo, Yanhui
    Chang, Chip-Hong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (02) : 363 - 376