Informatica logo


Login Register

  1. Home
  2. To appear
  3. Leakage-Resilient Public Key Signcryptio ...

Informatica

Information Submit your article For Referees Help ATTENTION!
  • Article info
  • Full article
  • Related articles
  • More
    Article info Full article Related articles

Leakage-Resilient Public Key Signcryption with Equality Test and Its Application
Tung-Tso Tsai  

Authors

 
Placeholder
https://doi.org/10.15388/25-INFOR597
Pub. online: 28 May 2025      Type: Research Article      Open accessOpen Access

Received
1 February 2024
Accepted
1 May 2025
Published
28 May 2025

Abstract

A public key signcryption with equality test (PKSCET) scheme is a public key signcryption (PKSC) scheme with the property of equality test. However, all the existing PKSCET schemes are vulnerable to a new kind of security threats, called side-channel attacks, which could potentially lead to the unauthorized disclosure of sensitive information or even the compromise of secret keys, undermining the overall confidentiality and integrity of the system. Therefore, this study aims to propose the first leakage-resilient PKSCET (LR-PKSCET) scheme that achieves resistance to side-channel attacks. Moreover, the proposed LR-PKSCET scheme is demonstrated to possess four security properties, namely, leakage resilience, indistinguishability, one-wayness, and existential unforgeability. Based on the proposed LR-PKSCET scheme, an anti-scam system (application) is presented to mitigate the ongoing occurrence of a myriad of scam cases.

References

 
Agrawal, S., Boneh, D., Boyen, X. (2010). Efficient lattice (h)ibe in the standard model. In: LNCS, Vol. 6110. EUROCRYPT’10, pp. 553–572.
 
Akavia, A., Goldwasser, S., Vaikuntanathan, V. (2009). Simultaneous hardcore bits and cryptography against memory attacks. In: TCC’09, LNCS, Vol. 5444. pp. 474–495.
 
Alouffi, B., Hasnain, M., Alharbi, A., Alosaimi, W., Alyami, H., Ayaz, M. (2021). A systematic literature review on cloud computing security: Threats and mitigation strategies. IEEE Access, 9, 57792–57807.
 
Boneh, D., Crescenz, G.D., Ostrovsky, R., Persiano, G. (2004). Public key encryption with keyword search. In: EUROCRYPT’04, LNCS, Vol. 3027. pp. 506–522.
 
Boneh, D., Boyen, X., Goh, E.J. (2005). Hierarchical identity-based encryption with constant size ciphertext. In: EUROCRYPT’05, LNCS, Vol. 3494. pp. 440–456.
 
Deverajan, G.G., Muthukumaran, V., Hsu, C.-H., Karuppiah, M., Chung, Y.-C., Chen, Y.-H. (2021). Public key encryption with equality test for industrial Internet of Things system in cloud computing. Transactions on Emerging Telecommunications Technologies, 4, e4202.
 
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A. (2008). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing, 38(1), 97–139.
 
Duong, D.H., Fukushima, K., Kiyomoto, S., Roy, P.S., Susilo, W. (2019). A lattice-based public key encryption with equality test in standard model. In: ACISP’19, LNCS, Vol. 11547. pp. 138–155.
 
Dziembowski, S., Pietrzak, K. (2008). Leakage-resilient cryptography. In: FOCS’08, 293–302.
 
Faust, S., Kiltz, E., Pietrzak, K., Rothblum, G. (2010). Leakage-resilient signatures. In: TCC’10, LNCS, Vol. 5978. pp. 343–360.
 
Galindo, D., Grobschadl, J., Liu, Z., Vadnala, P.K., Vivek, S. (2016). Implementation of a leakage-resilient ElGamal key encapsulation mechanism. Journal of Cryptographic Engineering, 6(3), 229–238.
 
Galindo, D., Virek, S. (2013). A practical leakage-resilient signature scheme in the generic group model. In: SAC’13, LNCS, Vol. 7707. pp. 50–65.
 
Huang, K., Tso, R., Chen, Y.-C., Li, W., Sun, H. (2014). A new public key encryption with equality test. In: NSS’15, LNCS, Vol. 8792. pp. 550–557.
 
Huang, K., Tso, R., Chen, Y.-C., Rahman, S.M.M., Almogren, A., Alamri, A. (2015). PKE-AET: Public key encryption with authorized equality test. The Computer Journal, 58(10), 2686–2697.
 
Huang, M., Yang, B., Zhou, Y., Hu, X. (2022). Continual leakage-resilient hedged public-key encryption. The Computer Journal, 65(6), 1574–1585.
 
Kiltz, E., Pietrzak, K. (2010). Leakage resilient elgamal encryption. In: ASIACRYPT’10, LNCS, Vol. 6477, pp. 595–612.
 
Kubota, T., Yoshida, K., Shiozaki, M., Fujino, T. (2021). Deep learning side-channel attack against hardware implementations of AES. Microprocessors and Microsystems, 87, 103383.
 
Le, H.Q., Duong, D.H., Roy, P.S., Susilo, W., Fukushima, K., Kiyomoto, S. (2021). Lattice-based signcryption with equality test in standard model. Computer Standards & Interfaces, 76, 103515.
 
Lee, H.T., Ling, S., Seo, J.H., Wang, H. (2019). Public key encryption with equality test from generic assumptions in the random oracle model. Information Sciences, 500, 15–33.
 
Lee, H.T., Ling, S., Seo, J.H., Wang, H., Youn, T. (2020). Public key encryption with equality test in the standard model. Information Sciences, 516, 89–108.
 
Li, S., Zhang, F., Sun, Y., Shen, L. (2013). Efficient leakage-resilient public key encryption from DDH assumption. Cluster Computing, 16(4), 797–806.
 
Ma, S., Huang, Q., Zhang, M., Yang, B. (2015). Efficient public key encryption with equality test supporting flexible authorization. IEEE Transactions on Information Forensics and Security, 10(3), 458–470.
 
Naor, M., Segev, G. (2009). Public-key cryptosystems resilient to key leakage. In: CRYPTO’09, LNCS, Vol. 5677. pp. 18–35.
 
Naor, M., Segev, G. (2012). Public-key cryptosystems resilient to key leakage. SIAM Journal on Computing, 41(4), 772–814.
 
Ngo, K., Dubrova, E., Guo, Q., Johansson, T. (2021). A side-channel attack on a masked ind-CCA secure saber kem implementation. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021(4), 676–707.
 
Sun, P. (2020). Security and privacy protection in cloud computing: Discussions and challenges. Journal of Network and Computer Applications, 160, 102642.
 
Tang, Q. (2011). Towards public key encryption scheme supporting equality test with fine-grained authorization. In: ACISP’11, LNCS, Vol. 6812, pp. 389–406.
 
Tang, Q. (2012a). Public key encryption supporting plaintext equality test and user-specified authorization. Security and Communication Networks, 5(12), 1351–1362.
 
Tang, Q. (2012b). Public key encryption schemes supporting equality test with authorisation of different granularity. International Journal of Applied Cryptography, 2(4), 304–321.
 
Tseng, Y.M., Tsai, T.T., Huang, S.S. (2022). Practical leakage-resilient signcryption scheme suitable for mobile environments. In: IEEE GCCE’22, pp. 383–384.
 
Xiong, H., Qin, Z. (2015). Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Transactions on Information Forensics and Security, 10(7), 1442–1455.
 
Yang, G., Tan, C.H., Huang, Q., Wong, D.S. (2010). Probabilistic public key encryption with equality test. In: CT-RSA’10, LNCS, Vol. 5985. pp. 119–131.
 
Zhou, Y., Hu, Z., Li, F. (2021). Searchable public-key encryption with cryptographic reverse firewalls for cloud storage. IEEE Transactions on Cloud Computing, 11(1), 383–396.

Biographies

Tsai Tung-Tso
tttsai@mail.ntou.edu.tw

T.-T. Tsai is currently an assistant professor in the Department of Computer Science and Engineering, National Taiwan Ocean University, Taiwan. His research interests include applied cryptography, pairing-based cryptography and leakage-resilient cryptography. He received the PhD degree from the Department of Mathematics, National Changhua University of Education, Taiwan, in 2014, under the supervision of professor Yuh-Min Tseng.


Full article Related articles PDF XML
Full article Related articles PDF XML

Copyright
© 2025 Vilnius University
by logo by logo
Open access article under the CC BY license.

Keywords
leakage-resilient side-channel attacks equality test signcryption

Funding
This research was partially supported by National Science and Technology Council, Taiwan, under contract no. NSTC112-2634-F-027-001-MBK.

Metrics
since January 2020
43

Article info
views

15

Full article
views

15

PDF
downloads

6

XML
downloads

Export citation

Copy and paste formatted citation
Placeholder

Download citation in file


Share


RSS

INFORMATICA

  • Online ISSN: 1822-8844
  • Print ISSN: 0868-4952
  • Copyright © 2023 Vilnius University

About

  • About journal

For contributors

  • OA Policy
  • Submit your article
  • Instructions for Referees
    •  

    •  

Contact us

  • Institute of Data Science and Digital Technologies
  • Vilnius University

    Akademijos St. 4

    08412 Vilnius, Lithuania

    Phone: (+370 5) 2109 338

    E-mail: informatica@mii.vu.lt

    https://informatica.vu.lt/journal/INFORMATICA
Powered by PubliMill  •  Privacy policy