Full Text:   <2277>

Summary:  <1638>

CLC number: TP309

On-line Access: 2018-06-07

Received: 2016-12-21

Revision Accepted: 2017-04-10

Crosschecked: 2018-04-08

Cited: 0

Clicked: 5582

Citations:  Bibtex RefMan EndNote GB/T7714

 ORCID:

Yan-wei Zhou

http://orcid.org/0000-0002-7254-3579

-   Go to

Article info.
Open peer comments

Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.4 P.481-493

http://doi.org/10.1631/FITEE.1601849


A leakage-resilient certificateless public key encryption scheme with CCA2 security


Author(s):  Yan-wei Zhou, Bo Yang, Hao Cheng, Qing-long Wang

Affiliation(s):  School of Computer Science, Shaanxi Normal University, Xi’an 710119, China; more

Corresponding email(s):   zyw@snnu.edu.cn, byang@snnu.edu.cn, nicke_cheng@yahoo.com.cn, qlwang@chd.edu.cn

Key Words:  Certificateless public-key encryption, Leakage-resilience, Provable security, CCA2 security, Decisional Diffie-Hellman


Yan-wei Zhou, Bo Yang, Hao Cheng, Qing-long Wang. A leakage-resilient certificateless public key encryption scheme with CCA2 security[J]. Frontiers of Information Technology & Electronic Engineering, 2018, 19(4): 481-493.

@article{title="A leakage-resilient certificateless public key encryption scheme with CCA2 security",
author="Yan-wei Zhou, Bo Yang, Hao Cheng, Qing-long Wang",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="19",
number="4",
pages="481-493",
year="2018",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.1601849"
}

%0 Journal Article
%T A leakage-resilient certificateless public key encryption scheme with CCA2 security
%A Yan-wei Zhou
%A Bo Yang
%A Hao Cheng
%A Qing-long Wang
%J Frontiers of Information Technology & Electronic Engineering
%V 19
%N 4
%P 481-493
%@ 2095-9184
%D 2018
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.1601849

TY - JOUR
T1 - A leakage-resilient certificateless public key encryption scheme with CCA2 security
A1 - Yan-wei Zhou
A1 - Bo Yang
A1 - Hao Cheng
A1 - Qing-long Wang
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 19
IS - 4
SP - 481
EP - 493
%@ 2095-9184
Y1 - 2018
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.1601849


Abstract: 
In recent years, much attention has been focused on designing provably secure cryptographic primitives in the presence of key leakage. Many constructions of leakage-resilient cryptographic primitives have been proposed. However, for any polynomial time adversary, most existing leakage-resilient cryptographic primitives cannot ensure that their outputs are random, and any polynomial time adversary can obtain a certain amount of leakage on the secret key from the corresponding output of a cryptographic primitive. In this study, to achieve better performance, a new construction of a chosen ciphertext attack 2 (CCA2) secure, leakage-resilient, and certificateless public-key encryption scheme is proposed, whose security is proved based on the hardness of the classic decisional Diffie-Hellman assumption. According to our analysis, our method can tolerate leakage attacks on the private key. This method also achieves better performance because polynomial time adversaries cannot achieve leakage on the private key from the corresponding ciphertext, and a key leakage ratio of 1/2 can be achieved. Because of these good features, our method may be significant in practical applications.

抗泄露的CCA2安全的无证书公钥加密机制

摘要:近年来,存在密钥泄露环境下密码学机制的安全性成为该领域研究热点,一些能够抵抗泄露攻击的密码学原语相继被提出。由于现有相关构造中,抗泄露密码学原语无法保证其输出对于任意多项式时间敌手完全随机,因此敌手能够从相应抗泄露密码学原语的输出中获知密钥部分信息。为获得更佳性能,提出一个抗泄露的CCA2安全的无证书公钥加密机制,基于经典的判定性Diffie-Hellman假设证明了该方案的安全性。分析显示,对于任意敌手,该方案输出均完全随机,使得敌手无法从给出的密文中获知密钥相关信息;此外,该方案具有较高泄露率。由于这些良好特性,该方案在实际应用中具有广泛应用前景。

关键词:无证书公钥加密;泄露容忍;可证安全性;CCA2安全性;判定性Diffie-Hellman假设

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

[1]Akavia A, Goldwasser S, Vaikuntanathan V, 2009. Simultaneous hardcore bits and cryptography against memory attacks. 6th Theory of Cryptography Conf, p.474-495.

[2]Al-Riyami SS, Paterson KG, 2003. Certificateless public key cryptography. 9th Int Conf on the Theory and Application of Cryptology and Information Security, p.452-473.

[3]Alwen J, Dodis Y, Wichs D, 2009. Leakage-resilient public-key cryptography in the bounded-retrieval model. 29th Annual Int Conf on Advances in Cryptology, p.36-54.

[4]Chen R, Mu Y, Yang G, et al., 2016a. Strong authenticated key exchange with auxiliary inputs. Des Cod Crypt, 85(1):145-173.

[5]Chen R, Mu Y, Yang G, et al., 2016b. Strongly leakage-resilient authenticated key exchange. Cryptographers’ Track at the RSA Conf, p.19-36.

[6]Cramer R, Shoup V, 2003. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J Comput, 33(1):167-226.

[7]Dodis Y, Ostrovsky R, Reyzin L, et al., 2008. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J Comput, 38(1):97-139.

[8]Li J, Teng M, Zhang Y, et al., 2016. A leakage-resilient CCA-secure identity-based encryption scheme. Comput J, 59(7):1066-1075.

[9]Li S, Zhang F, Sun Y, et al., 2013. Efficient leakage-resilient public key encryption from DDH assumption. Clust Comput, 16(4):797-806.

[10]Liu S, Weng J, Zhao Y, 2013. Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks. Cryptographers’ Track at the RSA Conf, p.84-100.

[11]Naor M, Segev G, 2012. Public-key cryptosystems resilient to key leakage. SIAM J Comput, 41(4):772-814.

[12]Qin B, Liu S, Chen K, 2015. Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience. IET Inform Secur, 9(1):32-42.

[13]Shamir A, 1984. Identity-based cryptosystems and signature schemes. Workshop on the Theory and Application of Cryptographic Techniques, p.47-53.

[14]Xiong H, Yuen T, ZHANG C, et al., 2013. Leakage-resilient certificateless public key encryption. Proc 1st ACM Workshop on Asia Public-Key Cryptography, p.13-22.

[15]Yu Q, Li J, Zhanga Y, et al., 2016. Certificate-based encryption resilient to key leakage. J Syst Softw, 116:101-102.

[16]Zhou Y, Yang B, Zhang W, 2016. Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing. Disc Appl Math, 204:185-202.

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE