A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience

被引:0
|
作者
Chengyu Hu
Rupeng Yang
Pengtao Liu
Tong Li
Fanyu Kong
机构
[1] Shandong University,Software College
[2] Anhui University,Co
[3] Shandong University,Innovation Center for Information Supply & Assurance Technology
[4] Shandong University of Political Science and Law,School of Computer Science and Technology
[5] Guangzhou University,School of Information
[6] Shandong University,School of Computer Science
来源
关键词
Public-key encryption; Side-channel attacks; Tampering resilience; Leakage resilience; Continuous attacks;
D O I
暂无
中图分类号
学科分类号
摘要
Public-key encryption is an important security mechanism used in cloud environment. To ensure the confidentiality of data encrypted using public-key encryption, countermeasures against cryptographic key leakage by side-channel attacks should be applied to the encryption scheme implemented both in locality and in cloud server. Traditional public-key encryption does not capture side-channel attacks. Moreover, the adversary can inject fault to tamper with the secret key and observe the output of the public-key encryption scheme under this modified key which is called “tampering attack”. In this paper, we present two continuous leakage and tampering resilient CCA secure public-key encryption schemes. For implementations of our schemes during the key update, bounded number of tampering queries for arbitrary key relations and bounded leakage is allowed. By updating the secret key, our schemes are secure against continuous leakage and tampering attacks.
引用
收藏
页码:3099 / 3122
页数:23
相关论文
共 50 条
  • [21] Efficient Public-Key Cryptography in the Presence of Key Leakage
    Dodis, Yevgeniy
    Haralambiev, Kristiyan
    Lopez-Alt, Adriana
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 613 - 631
  • [22] Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience
    Qin, Baodong
    Liu, Shengli
    Chen, Kefei
    IET INFORMATION SECURITY, 2015, 9 (01) : 32 - 42
  • [23] Preventing Cryptographic Key Leakage in Cloud Virtual Machines
    Pattuk, Erman
    Kantarcioglu, Murat
    Lin, Zhiqiang
    Ulusoy, Huseyin
    PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, 2014, : 703 - 718
  • [24] Structure-preserving public-key encryption with leakage-resilient CCA security
    Lyu, Lin
    Liu, Shengli
    Gu, Dawu
    THEORETICAL COMPUTER SCIENCE, 2019, 795 : 57 - 80
  • [25] On the Implications from Updatable Encryption to Public-Key Cryptographic Primitives
    Tanishita, Yuichi
    Hayashi, Ryuya
    Ishii, Ryu
    Matsuda, Takahiro
    Matsuura, Kanta
    INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024, 2024, 14895 : 303 - 323
  • [26] PUBLIC-KEY ENCRYPTION
    STUBBS, E
    EDN MAGAZINE-ELECTRICAL DESIGN NEWS, 1984, 29 (04): : 29 - 29
  • [27] Continuous leakage-resilient certificateless public key encryption with CCA security
    Zhou, Yanwei
    Yang, Bo
    KNOWLEDGE-BASED SYSTEMS, 2017, 136 : 27 - 36
  • [28] On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes
    Hajiabadi, Mohammad
    Kapron, Bruce M.
    Srinivasan, Venkatesh
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 129 - 158
  • [29] CCA2 secure public-key encryption scheme tolerating continual leakage attacks
    Zhou, YanWei
    Yang, Bo
    Zhang, Wenzheng
    Mu, Yi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4505 - 4519
  • [30] Watermarking public-key cryptographic functionalities and implementations: The case of encryption and signatures
    Baldimtsi, Foteini
    Kiayias, Aggelos
    Samari, Katerina
    IET INFORMATION SECURITY, 2021, 15 (03) : 205 - 222