Title
Novel Generic Construction Of Leakage-Resilient Pke Scheme With Cca Security
Abstract
Leakage of private state information (e.g. the secret keys) through various leakage attacks (e.g. side channel attacks, cold-boot attacks, etc) has become a serious threat to the security of computer systems in practice. Nowadays, it has become a common requirement that cryptographic schemes should withstand the leakage attacks. Although some research progresses have been made towards designing leakage-resilient cryptographic schemes, there are still some unsolved issues. For example, the computational costs of the existing generic construction of leakage-resilient public-key encryption (PKE) schemes is generally very high. One of the main reasons is that the underlying building blocks, e.g. non-interactive zero-knowledge argument, one-time lossy filter or one-time signature, are computationally expensive. Moreover, the above constructions of PKE with leakage resilience normally require the upper bound of leakage to be fixed. However, in many real-world applications, this requirement cannot provide sufficient protection against various leakage attacks. In order to mitigate the above problems, this paper presents a generic method of designing leakage amplified PKE schemes with leakage resilience and chosen-ciphertext attacks (CCA) security. Firstly, we define a new cryptography primitive, called identity-based hash proof system with two encapsulated key (T-IB-HPS). Then, two generic constructions of leakage-resilient PKE schemes are proposed using T-IB-HPS and message authentication code (MAC). The CCA security of our proposed constructions can be reduced to the security of the underlying T-IB-HPS and MAC. In the proposed generic method, the leakage parameter has an arbitrary length that can be flexibly adjusted according to the specific leakage requirements. In order to demonstrate the practicability of our generic method, two instantiations of T-IB-HPS are introduced. The first instantiation is proved based on the truncated augmented bilinear Diffie-Hellman exponent assumption, and the second instantiation is proved based on the related security assumptions over the composite order bilinear group.
Year
DOI
Venue
2021
10.1007/s10623-020-00831-x
DESIGNS CODES AND CRYPTOGRAPHY
Keywords
DocType
Volume
Public-key encryption (94A60, 94A17), Leakage resilience (94A60, 68P25), Leakage amplification (94A17), CCA security (91A40), 68P25, 91A17, 94A60, 68Q10
Journal
89
Issue
ISSN
Citations 
7
0925-1022
0
PageRank 
References 
Authors
0.34
0
5
Name
Order
Citations
PageRank
Yanwei Zhou12211.90
Bo Yang2903100.69
Zhe Xia3198.17
Mingwu Zhang413.74
Yi Mu52884239.05