Title | ||
---|---|---|
Weak Leakage Resilient Extractable Hash Proof System And Construction For Weak Leakage Resilient Cca-Secure Public-Key Encryption |
Abstract | ||
---|---|---|
Public-key encryption can be used in cloud systems to protect data in data sharing, identity authentication, etc. However, traditional public-key encryption does not capture the side-channel attacks. Inspired by this, the model of key-leakage attacks is formalised. However, constructing schemes in this model seems somewhat difficult and most key-leakage attacks in reality may be weak. In this paper, we consider the model of weak key-leakage attacks and focus on how to construct a weak leakage-resilient CCA-secure key encapsulation scheme. To this end, we present the new definitions of weak leakage-resilient extractable hash proofs and weak leakage-resilient partial ABO-extractable hash proofs and propose generic transformations to construct them from extractable hash proof. Then we show how to derive a weak leakage-resilient CCA-secure key encapsulation scheme based on them. We also give a concrete instantiation in a group of prime order and design an experiment to show the leakage-resilience in reality. |
Year | Venue | Keywords |
---|---|---|
2015 | INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS | side-channel attacks, weak leakage-resilient, extractable hash proof system, key encapsulation |
Field | DocType | Volume |
Computer security,Computer science,Cryptography,Cryptographic hash function,Key encapsulation,Encryption,Hash function,Hash chain,Public-key cryptography,Collision attack | Journal | 7 |
Issue | ISSN | Citations |
3-4 | 1741-1068 | 0 |
PageRank | References | Authors |
0.34 | 24 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Chengyu Hu | 1 | 132 | 28.60 |
Zuoxia Yu | 2 | 13 | 5.56 |
Rupeng Yang | 3 | 21 | 7.66 |
Qiuliang Xu | 4 | 157 | 42.71 |
YongBin Zhou | 5 | 136 | 27.58 |
Qixia Yuan | 6 | 31 | 7.44 |