A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience

被引:0
|
作者
Chengyu Hu
Rupeng Yang
Pengtao Liu
Tong Li
Fanyu Kong
机构
[1] Shandong University,Software College
[2] Anhui University,Co
[3] Shandong University,Innovation Center for Information Supply & Assurance Technology
[4] Shandong University of Political Science and Law,School of Computer Science and Technology
[5] Guangzhou University,School of Information
[6] Shandong University,School of Computer Science
来源
关键词
Public-key encryption; Side-channel attacks; Tampering resilience; Leakage resilience; Continuous attacks;
D O I
暂无
中图分类号
学科分类号
摘要
Public-key encryption is an important security mechanism used in cloud environment. To ensure the confidentiality of data encrypted using public-key encryption, countermeasures against cryptographic key leakage by side-channel attacks should be applied to the encryption scheme implemented both in locality and in cloud server. Traditional public-key encryption does not capture side-channel attacks. Moreover, the adversary can inject fault to tamper with the secret key and observe the output of the public-key encryption scheme under this modified key which is called “tampering attack”. In this paper, we present two continuous leakage and tampering resilient CCA secure public-key encryption schemes. For implementations of our schemes during the key update, bounded number of tampering queries for arbitrary key relations and bounded leakage is allowed. By updating the secret key, our schemes are secure against continuous leakage and tampering attacks.
引用
收藏
页码:3099 / 3122
页数:23
相关论文
共 50 条
  • [41] Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
    Qin, Baodong
    Liu, Shengli
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 19 - 36
  • [42] Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond
    Persiano, Giuseppe
    Phan, Duong Hieu
    Yung, Moti
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 422 - 455
  • [43] New approach to practical leakage-resilient public-key cryptography
    Chakraborty, Suvradip
    Alawatugoda, Janaka
    Rangan, Chandrasekaran Pandu
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2020, 14 (01) : 172 - 201
  • [44] Leakage-Resilient Hybrid Signcryption in Heterogeneous Public-key Systems
    Ho, Ting-Chieh
    Tseng, Yuh-Min
    Huang, Sen-Shan
    INFORMATICA, 2024, 35 (01) : 131 - 154
  • [45] Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs
    Hu, Chengyu
    Liu, Pengtao
    Guo, Shanqing
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2016, 7 (05) : 681 - 692
  • [46] Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs
    Chengyu Hu
    Pengtao Liu
    Shanqing Guo
    Journal of Ambient Intelligence and Humanized Computing, 2016, 7 : 681 - 692
  • [47] Public-Key Encryption with Quantum Keys
    Barooti, Khashayar
    Grilo, Alex B.
    Hugucnin-Dumittan, Lois
    Malavolta, Giulio
    Sattath, Or
    Vu, Quoc-Huy
    Walter, Michael
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT IV, 2023, 14372 : 198 - 227
  • [48] A New Public-Key Encryption Scheme
    Hai-Bo Tian
    Xi Sun
    Yu-Min Wang
    Journal of Computer Science and Technology, 2007, 22 : 95 - 102
  • [49] Electromagnetic Analysis against Public-Key Cryptographic Software on Embedded OS
    Uno, Hajime
    Endo, Sho
    Homma, Naofumi
    Hayashi, Yu-ichi
    Aoki, Takafumi
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (07) : 1242 - 1249
  • [50] TFHE Public-Key Encryption Revisited
    Joye, Marc
    TOPICS IN CRYPTOLOGY, CT-RSA 2024, 2024, 14643 : 277 - 291