A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience

被引:0
|
作者
Chengyu Hu
Rupeng Yang
Pengtao Liu
Tong Li
Fanyu Kong
机构
[1] Shandong University,Software College
[2] Anhui University,Co
[3] Shandong University,Innovation Center for Information Supply & Assurance Technology
[4] Shandong University of Political Science and Law,School of Computer Science and Technology
[5] Guangzhou University,School of Information
[6] Shandong University,School of Computer Science
来源
关键词
Public-key encryption; Side-channel attacks; Tampering resilience; Leakage resilience; Continuous attacks;
D O I
暂无
中图分类号
学科分类号
摘要
Public-key encryption is an important security mechanism used in cloud environment. To ensure the confidentiality of data encrypted using public-key encryption, countermeasures against cryptographic key leakage by side-channel attacks should be applied to the encryption scheme implemented both in locality and in cloud server. Traditional public-key encryption does not capture side-channel attacks. Moreover, the adversary can inject fault to tamper with the secret key and observe the output of the public-key encryption scheme under this modified key which is called “tampering attack”. In this paper, we present two continuous leakage and tampering resilient CCA secure public-key encryption schemes. For implementations of our schemes during the key update, bounded number of tampering queries for arbitrary key relations and bounded leakage is allowed. By updating the secret key, our schemes are secure against continuous leakage and tampering attacks.
引用
收藏
页码:3099 / 3122
页数:23
相关论文
共 50 条
  • [1] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Li, Tong
    Kong, Fanyu
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (06): : 3099 - 3122
  • [2] Public-key encryption scheme with optimal continuous leakage resilience
    Zhou, Yanwei
    Xu, Ran
    Zhang, Wenzheng
    Xia, Zhe
    Yang, Bo
    Gu, Chunxiang
    Huang, Meijuan
    INFORMATION PROCESSING LETTERS, 2023, 180
  • [3] Novel Public-Key Encryption with Continuous Leakage Amplification
    Qiao, Zirui
    Yang, Qiliang
    Zhou, Yanwei
    Xia, Zhe
    Zhang, Mingwu
    COMPUTER JOURNAL, 2021, 64 (08): : 1163 - 1177
  • [4] Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
    Fujisaki, Eiichiro
    Xagawa, Keita
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 908 - 938
  • [5] Public key encryption resilient to leakage and tampering attacks
    Sun, Shi-Feng
    Gu, Dawu
    Parampalli, Udaya
    Yu, Yu
    Qin, Baodong
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 89 : 142 - 156
  • [6] Continuous Leakage-Amplified Public-Key Encryption With CCA Security
    Zhang, Wenzheng
    Qiao, Zirui
    Yang, Bo
    Zhou, Yanwei
    Zhang, Mingwu
    COMPUTER JOURNAL, 2022, 65 (07): : 1760 - 1775
  • [7] Public-Key Encryption In The Standard Model Against Strong Leakage Adversary
    Alawatugoda, Janaka
    COMPUTER JOURNAL, 2020, 63 (12): : 1904 - 1914
  • [8] Public-key encryption in the standard model against strong leakage adversary
    Alawatugoda, Janaka
    Computer Journal, 2020, 63 (12): : 1904 - 1914
  • [9] Post-challenge leakage in public-key encryption
    Zhang, Zongyang
    Chow, Sherman S. M.
    Cao, Zhenfu
    THEORETICAL COMPUTER SCIENCE, 2015, 572 : 25 - 49
  • [10] After-the-Fact Leakage in Public-Key Encryption
    Halevi, Shai
    Lin, Huijia
    THEORY OF CRYPTOGRAPHY, 2011, 6597 : 107 - +