Predicate encryption against master-key tampering attacks

被引:0
|
作者
Yuejun Liu
Rui Zhang
Yongbin Zhou
机构
[1] State Key Laboratory of Information Security,
[2] Institute of Information Engineering,undefined
[3] Chinese Academy of Sciences,undefined
[4] School of Cyber Security,undefined
[5] University of Chinese Academy of Sciences,undefined
来源
关键词
Tampering resilience; Predicate encryption; Pair encoding; Dual system encryption;
D O I
暂无
中图分类号
学科分类号
摘要
Many real world attacks often target the implementation of a cryptographic scheme, rather than the algorithm itself, and a system designer has to consider new models that can capture these attacks. For example, if the key can be tampered by physical attacks on the device, the security of the scheme becomes totally unclear. In this work, we investigate predicate encryption (PE), a powerful encryption primitive, in the setting of tampering attacks. First, we show that many existing frameworks to construct PE are vulnerable to tampering attacks. Then we present a new security notion to capture such attacks. Finally, we take Attrapadung’s framework in Eurocrypt’14 as an example to show how to “compile" these frameworks to tampering resilient ones. Moreover, our method is compatible with the original pair encoding schemes without introducing any redundancy.
引用
收藏
相关论文
共 50 条
  • [41] New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model
    Yang, Wenjie
    Weng, Jian
    Zhang, Futai
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 236 - 247
  • [42] Mitigation of channel tampering attacks in continuous-variable quantum key distribution
    Kish, S. P.
    Thapa, C.
    Sayat, M.
    Suzuki, H.
    Pieprzyk, J.
    Camtepe, S.
    PHYSICAL REVIEW RESEARCH, 2024, 6 (02):
  • [43] PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search
    Zhu, Benwen
    Zhu, Bo
    Ren, Kui
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [44] Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
    Lixue SUN
    Chunxiang XU
    Mingwu ZHANG
    Kefei CHEN
    Hongwei LI
    Science China(Information Sciences), 2018, 61 (03) : 228 - 230
  • [45] An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
    Huang, Qiong
    Li, Hongbo
    INFORMATION SCIENCES, 2017, 403 : 1 - 14
  • [46] Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
    Sun, Lixue
    Xu, Chunxiang
    Zhang, Mingwu
    Chen, Kefei
    Li, Hongwei
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [47] Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
    Lixue Sun
    Chunxiang Xu
    Mingwu Zhang
    Kefei Chen
    Hongwei Li
    Science China Information Sciences, 2018, 61
  • [48] Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare
    Ma, Mimi
    He, Debiao
    Fan, Shuqin
    Feng, Dengguo
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50 (50)
  • [49] Designated-Senders Public-Key Searchable Encryption Secure against Keyword Guessing Attacks
    Saito, Takanori
    Nakanishi, Toru
    2017 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2017, : 496 - 502
  • [50] Securing Non-Terrestrial FSO Link with Public Key Encryption against Flying Object Attacks
    Hicks, Daniel
    Benkhelifa, Fatma
    Ahmad, Zahir
    Statheros, Thomas
    Saied, Osama
    Kaiwartya, Omprakash
    Alsallami, Farah Mahdi
    PHOTONICS, 2023, 10 (08)