logo

SCIENTIA SINICA Informationis, Volume 51 , Issue 6 : 1013(2021) https://doi.org/10.1360/SSI-2020-0001

A new construction of leakage-resilient CCA secure IBE scheme

More info
  • ReceivedJan 2, 2020
  • AcceptedApr 5, 2020
  • PublishedMay 12, 2021

Abstract


Funded by

国家重点研发计划(2017YFB0802000)

国家自然科学基金(61802242,61772326,61802241)

“十三五"国家密码发展基金(MMJJ20180217)

中央高校基本科研业务费资助项目(GK202003079)

广西可信软件重点实验室研究课题(KX202002)


References

[1] Naor M, Segev G. Public-key cryptosystems resilient to key leakage. In: Proceedings of the 29th Annual International Cryptology Conference, Santa Barbara, 2009. 18--35. Google Scholar

[2] Qin B D, Liu S L. Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter. In: Proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, 2013. 381--400. Google Scholar

[3] Qin B D, Liu S L. Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing. In: Proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, 2014. 19--36. Google Scholar

[4] Canetti R, Halevi S, Katz J. Chosen-ciphertext security from identity-based encryption. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, 2004. 207--222. Google Scholar

[5] Boneh D, Katz J. Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. In: Proceedings of Cryptographers' Track at the RSA Conference, San Francisco, 2005. 87--103. Google Scholar

[6] Dodis Y, Haralambiev K, López-Alt A, et al. Cryptography against continuous memory attacks. In: Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, Las Vegas, 2010. 511--520. Google Scholar

[7] Alwen J, Dodis Y, Naor M, et al. Public-key encryption in the bounded-retrieval model. In: Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco, 2010. 113--134. Google Scholar

[8] Zhou Y, Yang B, Mu Y. The generic construction of continuous leakage-resilient identity-based cryptosystems. Theor Comput Sci, 2019, 772: 1-45 CrossRef Google Scholar

[9] Zhou Y, Yang B, Xia Z. Anonymous and Updatable Identity-Based Hash Proof System. IEEE Syst J, 2019, 13: 2818-2829 CrossRef ADS Google Scholar

[10] Zhou Y, Yang B, Wang T. Novel updatable identity-based hash proof system and its applications. Theor Comput Sci, 2020, 804: 1-28 CrossRef Google Scholar

[11] Zhou Y, Yang B, Xia Z. Identity-based encryption with leakage-amplified chosen-ciphertext attacks security. Theor Comput Sci, 2020, 809: 277-295 CrossRef Google Scholar

[12] Nishimaki R, Yamakawa T. Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio. In: Proceedings of the 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, 2019. 466--495. Google Scholar

[13] Yuen T H, Chow S S M, Zhang Y, et al. Identity-based encryption resilient to continual auxiliary leakage. In: Proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, 2012. 117--134. Google Scholar

[14] Zhou Y, Yang B, Mu Y. Continuous leakage-resilient identity-based encryption with leakage amplification. Des Codes Cryptogr, 2019, 87: 2061-2090 CrossRef Google Scholar

[15] Dodis Y, Haralambiev K, López-Alt A, et al. Efficient public-key cryptography in the presence of key leakage. In: Proceedings of the 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, 2010. 613--631. Google Scholar

[16] Alwen J, Dodis Y, Naor M, et al. Public-key encryption in the bounded-retrieval model. In: Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco, 2010. 113--134. Google Scholar

[17] Zhou Y, Yang B. Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security. Comput J, 2017, 52 CrossRef Google Scholar

[18] Liu S L, Weng J, Zhao Y L. Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks. In: Proceedings of Cryptographers' Track at the RSA Conference, San Francisco, 2013. 84--100. Google Scholar

[19] Hazay C, López-Alt A, Wee H, et al. Leakage-resilient cryptography from minimal assumptions. In: Proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, 2013. 160--176. Google Scholar

  • Table 1   Comparison with the generic construction of previous (continuous) leakage-resilient CCA secure IBE scheme
    Previous method Our method
    Bounded leakage resilience IB-HPS+Ext+OT-LF (NIZK) T-IB-HPS+Ext+MAC
    Continuous leakage resilience U-IB-HPS+Ext+OT-LF (NIZK) U-T-IB-HPS+Ext+MAC
qqqq

Contact and support