Predicate encryption against master-key tampering attacks

被引:0
|
作者
Yuejun Liu
Rui Zhang
Yongbin Zhou
机构
[1] State Key Laboratory of Information Security,
[2] Institute of Information Engineering,undefined
[3] Chinese Academy of Sciences,undefined
[4] School of Cyber Security,undefined
[5] University of Chinese Academy of Sciences,undefined
来源
Cybersecurity | / 2卷
关键词
Tampering resilience; Predicate encryption; Pair encoding; Dual system encryption;
D O I
暂无
中图分类号
学科分类号
摘要
Many real world attacks often target the implementation of a cryptographic scheme, rather than the algorithm itself, and a system designer has to consider new models that can capture these attacks. For example, if the key can be tampered by physical attacks on the device, the security of the scheme becomes totally unclear. In this work, we investigate predicate encryption (PE), a powerful encryption primitive, in the setting of tampering attacks. First, we show that many existing frameworks to construct PE are vulnerable to tampering attacks. Then we present a new security notion to capture such attacks. Finally, we take Attrapadung’s framework in Eurocrypt’14 as an example to show how to “compile" these frameworks to tampering resilient ones. Moreover, our method is compatible with the original pair encoding schemes without introducing any redundancy.
引用
收藏
相关论文
共 50 条
  • [21] Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs
    Chengyu Hu
    Pengtao Liu
    Shanqing Guo
    Journal of Ambient Intelligence and Humanized Computing, 2016, 7 : 681 - 692
  • [22] Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 268 - 275
  • [23] On the Security of OCDM-based Encryption against Key-Search Attacks
    Di Crescenzo, Giovanni
    Menendez, Ron
    Etemad, Shahab
    2009 DIGEST OF THE LEOS SUMMER TOPICAL MEETINGS, 2009, : 17 - 18
  • [24] Secure searchable public key encryption scheme against keyword guessing attacks
    Rhee, Hyun Sook
    Susilo, Willy
    Kim, Hyun-Jeong
    IEICE ELECTRONICS EXPRESS, 2009, 6 (05): : 237 - 243
  • [25] A Fast Public Key Searchable Encryption Scheme Against Inside Keyword Attacks
    Liu, Can
    Chen, Ningjiang
    Huang, Ruwei
    Xie, Yongsheng
    COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING, CHINESECSCW 2019, 2019, 1042 : 50 - 64
  • [26] Master-Key Regulators of Sex Determination in Fish and Other Vertebrates-A Review
    Curzon, Arie Yehuda
    Shirak, Andrey
    Ron, Micha
    Seroussi, Eyal
    INTERNATIONAL JOURNAL OF MOLECULAR SCIENCES, 2023, 24 (03)
  • [27] Aberrant Expression of Shared Master-Key Genes Contributes to the Immunopathogenesis in Patients with Juvenile Spondyloarthritis
    Lamot, Lovro
    Borovecki, Fran
    Bukovac, Lana Tambic
    Vidovic, Mandica
    Perica, Marija
    Gotovac, Kristina
    Harjacek, Miroslav
    PLOS ONE, 2014, 9 (12):
  • [28] A New Scheme for Protecting Master-Key of Data Centre Web Server in Online Banking
    Cao Lai-Cheng
    Liang Lei
    WEB INFORMATION SYSTEMS AND MINING, 2010, 6318 : 179 - 186
  • [29] Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks
    Sun, Shi-Feng
    Gu, Dawu
    Huang, Zhengan
    COMPUTER JOURNAL, 2015, 58 (10): : 2520 - 2536
  • [30] Public-key encryption with keyword search secure against continual memory attacks
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Yu, Zuoxia
    Zhou, Yongbin
    Xu, Qiuliang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1613 - 1629