Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2020, Vol. 14 Issue (4) : 144804    https://doi.org/10.1007/s11704-019-8140-2
RESEARCH ARTICLE
Practical continuous leakage-resilient CCA secure identity-based encryption
Yanwei ZHOU1,2, Bo YANG1,2()
1. School of Computer Science, Shaanxi Normal University, Xi’an 710119, China
2. State Key Laboratory of Cryptology, Beijing 100878, China
 Download: PDF(299 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

Leakage of private information including private keys of user has become a threat to the security of computing systems. It has become a common security requirement that a cryptographic scheme should withstand various leakage attacks. In the real life, an adversary can break the security of cryptography primitive by performing continuous leakage attacks. Although, some research on the leakage-resilient cryptography had been made, there are still some remaining issued in previous attempts. The identity-based encryption (IBE) constructions were designed in the bounded-leakage model, and might not be able to meet their claimed security under the continuous-leakage attacks. In the real applications, the leakage is unbounded. That is, a practical cryptography scheme should keep its original security in the continuous leakage setting. The previous continuous leakageresilient IBE schemes either only achieve chosen-plaintext attacks security or the chosen-ciphertext attacks (CCA) security is proved in the selective identity model. Aiming to solve these problems, in this paper, we show how to construct the continuous leakage-resilient IBE scheme, and the scheme’s adaptive CCA security is proved in the standard model based on the hardness of decisional bilinear Diffie-Hellman exponent assumption. For any adversary, all elements in the ciphertext are random, and an adversary cannot obtain any leakage on the private key of user from the corresponding given ciphertext. Moreover, the leakage parameter of our proposal is independent of the plaintext space and has a constant size.

Keywords identity-based encryption      CCA security      continuous leakage-resilience      standard model     
Corresponding Author(s): Bo YANG   
Just Accepted Date: 07 May 2019   Issue Date: 11 March 2020
 Cite this article:   
Yanwei ZHOU,Bo YANG. Practical continuous leakage-resilient CCA secure identity-based encryption[J]. Front. Comput. Sci., 2020, 14(4): 144804.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-019-8140-2
https://academic.hep.com.cn/fcs/EN/Y2020/V14/I4/144804
1 X S Zhang, Y A Tan, C Liang, Y Z Li , J Li. A covert channel over volte via adjusting silence periods. IEEE Access, 2018, 6(1): 9292–9302
https://doi.org/10.1109/ACCESS.2018.2802783
2 Z G, Huang S L Liu, X P Mao, K F Chen, J Li. Insight of the protection for data security under selective opening attacks. Information Sciences, 2017, 412: 223–241
https://doi.org/10.1016/j.ins.2017.05.031
3 R H Jhaveri, N M Patel, Y B Zhong, A K Sangaiah. Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT. IEEEAccess, 2018, 6: 20085–20103
https://doi.org/10.1109/ACCESS.2018.2822945
4 S L Liu, J Weng, Y L Zhao. Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks. In: Proceedings of the Cryptographers’ Track at the RSA Conference. 2013, 84–100
https://doi.org/10.1007/978-3-642-36095-4_6
5 S F Sun, D W Gu, S L Liu. Efficient leakage-resilient identity-based encryption with CCA security. In: Proceedings of the 6th International Conference on Pairing-Based Cryptography. 2013, 149–167
https://doi.org/10.1007/978-3-319-04873-4_9
6 S F Sun, D W Gu, Z G Huang. Fully secure wicked identity-based encryption against key leakage attacks. The Computer Journal, 2015, 58(10): 2520–2536
https://doi.org/10.1093/comjnl/bxu110
7 S F Sun, D W, Gu S L Liu. Efficient chosen ciphertext secure identitybased encryption against key leakage attacks. Security and Communication Networks, 2016, 9(11): 1417–1434
https://doi.org/10.1002/sec.1429
8 J G Li, Y Y Guo, Q H Yu, Y Lu, Y C Zhang. Provably secure identitybased encryption resilient to post-challenge continuous auxiliary input leakage. Security and Communication Networks, 2016, 9(10): 1016–1024
https://doi.org/10.1002/sec.1396
9 Q H Yu, J G Li, Y C Zhang. Leakage-resilient certificate-based encryption. Security and Communication Networks, 2015, 8(18): 3346–3355
https://doi.org/10.1002/sec.1258
10 Q H Yu, J G Li, Y C Zhang, W Wu, X Y Huang, Y Xiang. Certificatebased encryption resilient to key leakage. Journal of Systems and Software, 2016, 116: 101–112
https://doi.org/10.1016/j.jss.2015.05.066
11 MW Zhang, C Z Wang, K Morozov. LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces. The Journal of Supercomputing, 2014, 70(3): 1405–1432
https://doi.org/10.1007/s11227-014-1234-6
12 B D Qin, S L Liu. Leakage-resilient chosen-ciphertext secure publickey encryption from hash proof system and one-time lossy filter. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. 2013, 381–400
https://doi.org/10.1007/978-3-642-42045-0_20
13 B D Qin, S L Liu. Leakage-flexible cca-secure publickey encryption: Simple construction and free of pairing. In: Proceedings of International Conference on Practice and Theory in Public-Key Cryptography. 2014, 19–36
https://doi.org/10.1007/978-3-642-54631-0_2
14 B D Qin, S L Liu, K F. ChenEfficient chosen-ciphertext secure publickey encryption scheme with high leakage-resilience. IET Information Security, 2015, 9(1): 32–42
https://doi.org/10.1049/iet-ifs.2013.0173
15 B Wang. Leakage-resilient message authentication code scheme based on hidden identity weak hash proof system. IET Information Security, 2016, 10(4): 173–179
https://doi.org/10.1049/iet-ifs.2014.0579
16 YW Zhou, B Yang, WZ. ZhangProvably secure and efficient leakageresilient certificateless signcryption scheme without bilinear pairing. Discrete Applied Mathematics, 2016, 204: 185–202
https://doi.org/10.1016/j.dam.2015.10.018
17 Y W Zhou, B Yang, H Cheng, Q L Wang. A leakage resilient certificateless public key encryption scheme with CCA2 security. Frontiers of Information Technology and Electronic Engineering, 2018, 19(4): 481–493
https://doi.org/10.1631/FITEE.1601849
18 Y W Zhou, B Yang. Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing. Information Processing Letters, 2018, 130: 16–24
https://doi.org/10.1016/j.ipl.2017.09.012
19 E Fujisaki, K Xagawa. Public-key cryptosystems resilient to continuous tampering and leakage of arbitrary functions. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. 2016, 908–938
https://doi.org/10.1007/978-3-662-53887-6_33
20 Y W, Zhou B Yang, W Z, Zhang Y. MuCCA2 secure public-key encryption scheme tolerating continual leakage attacks. Security and Communication Networks, 2016, 9(17): 4505–4519
https://doi.org/10.1002/sec.1643
21 YW Zhou, B. YangContinuous leakage-resilient publickey encryption scheme with CCA security. The Computer Journal, 2017, 60(8): 1161–1172
https://doi.org/10.1093/comjnl/bxw110
22 M Toorani. On continuous after-the-fact leakage-resilient key exchange. In: Proceedings of the 2nd Workshop on Cryptography and Security in Computing Systems. 2015, 31–34
https://doi.org/10.1145/2694805.2694811
23 T Malkin, I Teranishi, Y Vahlis, M Yung. Signatures resilient to continual leakage on memory and computation. In: Proceedings of Theory of Cryptography Conference. 2011, 89–106
https://doi.org/10.1007/978-3-642-19571-6_7
24 J G Li, Y Y Guo, Q H, Yu Y, Lu Y C Zhang, F T Zhang. Continuous leakage-resilient certificate-based encryption. Information Sciences, 2016, 355: 1–14
https://doi.org/10.1016/j.ins.2016.03.032
25 C Wang, J Shen, Q Liu, Y J, Ren T. LiA novel security scheme based on instant encrypted transmission for internet of things. Security and Communication Networks, 2018, (Article ID 3680851): 1–7
https://doi.org/10.1155/2018/3680851
26 J, Xu LW Wei, Y Zhang, A D Wang, F C Zhou, C Z Gao. Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures. Journal of Network and Computer Applications, 2018, 107: 113–124
https://doi.org/10.1016/j.jnca.2018.01.014
27 Y W Zhou, B Yang. Continuous leakage-resilient certificateless public key encryption with CCA security. Knowledge Based Systems, 2017, 136: 27–36
https://doi.org/10.1016/j.knosys.2017.08.019
28 J Li, X Y Huang, J W Li, X F Chen, Y Xiang. Securely outsourcing attribute-based encryption with checkability. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(8): 2201–2210
https://doi.org/10.1109/TPDS.2013.271
29 H Wang, Z H Zheng, L Wu, P Li. New directly revocable attributebased encryption scheme and its application in cloud storage environment. Cluster Computing, 2017, 20(3): 2385–2392
https://doi.org/10.1007/s10586-016-0701-7
30 J Li, J W Li, X F Chen, C F Jia, W J Lou. Identity-based encryption with outsourced revocation in cloud computing. IEEE Transactions on Computers, 2015, 64(2): 425–437
https://doi.org/10.1109/TC.2013.208
31 Q Lin, H Y Yan, Z G Huang, W B Chen, J Shen, Y Tang. An idbased linearly homomorphic signature scheme and its application in blockchain. IEEE Access, 2018, 6(1): 20632–20640
https://doi.org/10.1109/ACCESS.2018.2809426
32 T H Yuen, S S Chow, Y Zhang, S M Yiu. Identity-based encryption resilient to continual auxiliary leakage. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2012, 117–134
https://doi.org/10.1007/978-3-642-29011-4_9
33 A B, Lewko Y Rouselakis, B Waters. Achieving leakage resilience through dual system encryption. In: Proceedings of Theory of Cryptography Conference. 2011, 70–88
https://doi.org/10.1007/978-3-642-19571-6_6
34 J G Li, Q H Yu, Y C. ZhangIdentity-based broadcast encryption with continuous leakage resilience. Information Sciences, 2018, 29(3): 177–193
https://doi.org/10.1016/j.ins.2017.11.008
35 Y W Zhou, B Yang, Y Mu. Continuous leakage-resilient identity-based encryption without random oracles. The Computer Journal, 2018, 61(4): 586–600
https://doi.org/10.1093/comjnl/bxy003
36 J Alwen, Y Dodis, W Naor, G Segev, S, Walfish D Wichs. Public-key encryption in the bounded-retrieval model. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2010, 113–134
https://doi.org/10.1007/978-3-642-13190-5_6
37 S S Chow, Y Dodis, Y Rouselakis, B Waters. Practical leakage-resilient identity-based encryption from simple assumptions. In: Proceedings of ACM Conference on Computer and Communications Security. 2010, 152–161
https://doi.org/10.1145/1866307.1866325
38 D Boneh, X Boyen. Efficient selective-id secure identitybased encryption without random oracles. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2004, 123–238
https://doi.org/10.1007/978-3-540-24676-3_14
39 B Waters. Efficient identity-based encryption without random oracles. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2005, 114–127
https://doi.org/10.1007/11426639_7
40 A Lewko, B Waters. New techniques for dual system encryption and fully secure hibe with short ciphertexts. In: Proceedings of Theory of Cryptography Conference. 2010, 455–479
https://doi.org/10.1007/978-3-642-11799-2_27
41 J G Li, M L Teng, Y C, Zhang Q H. YuA leakageresilient CCA-secure identity-based encryption scheme. The Computer Journal, 2016, 59(7): 1066–1075
https://doi.org/10.1093/comjnl/bxv128
42 C Gentry. Practical identity-based encryption without random oracles. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2006, 445–464
https://doi.org/10.1007/11761679_27
43 M Naor, G Segev. Public-key cryptosystems resilient to key leakage. In: Proceedings of Annual International Cryptology Conference. 2009, 18–35
https://doi.org/10.1007/978-3-642-03356-8_2
44 Y Dodis, L Reyzin. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2004, 523–540
https://doi.org/10.1007/978-3-540-24676-3_31
45 A Shamir. Identity-based cryptosystems and signature schemes. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. 1985, 47–53
https://doi.org/10.1007/3-540-39568-7_5
46 Y, Dodis K Haralambiev, A López-Alt, D. Wichs Cryptography against continuous memory attacks. In: Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science. 2010, 511–520
https://doi.org/10.1109/FOCS.2010.56
[1] FCS-0013-18140-YZ_suppl_1 Download
[1] Cungen CAO,Yuefei SUI,Zaiyue ZHANG. The M-computations induced by accessibility relations in nonstandard models M of Hoare logic[J]. Front. Comput. Sci., 2016, 10(4): 717-725.
[2] Hao WANG,Zhen LIU,Zhe LIU,Duncan S. WONG. Identity-based aggregate signcryption in the standard model from multilinear maps[J]. Front. Comput. Sci., 2016, 10(4): 741-754.
[3] Xiuhua LU,Qiaoyan WEN,Zhengping JIN,Licheng WANG,Chunli YANG. A lattice-based signcryption scheme without random oracles[J]. Front. Comput. Sci., 2014, 8(4): 667-675.
[4] Lin CHENG, Qiaoyan WEN, Zhengping JIN, Hua ZHANG. Cryptanalysis and improvement of a certificateless encryption scheme in the standard model[J]. Front. Comput. Sci., 2014, 8(1): 163-173.
[5] Xiujie ZHANG, Chunxiang XU, Wenzheng ZHANG, Wanpeng LI. Threshold public key encryption scheme resilient against continual leakage without random oracles[J]. Front Comput Sci, 2013, 7(6): 955-968.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed