Informatica logo


Login Register

  1. Home
  2. Issues
  3. Volume 29, Issue 1 (2018)
  4. Leakage-Resilient Certificateless Key En ...

Informatica

Information Submit your article For Referees Help ATTENTION!
  • Article info
  • Full article
  • Related articles
  • Cited by
  • More
    Article info Full article Related articles Cited by

Leakage-Resilient Certificateless Key Encapsulation Scheme
Volume 29, Issue 1 (2018), pp. 125–155
Jui-Di Wu   Yuh-Min Tseng   Sen-Shan Huang   Wei-Chieh Chou  

Authors

 
Placeholder
https://doi.org/10.15388/Informatica.2018.161
Pub. online: 1 January 2018      Type: Research Article      Open accessOpen Access

Received
1 June 2017
Accepted
1 January 2018
Published
1 January 2018

Abstract

The previous adversary models of public key cryptography usually have a nature assumption that permanent/temporary secret (private) keys must be kept safely and internal secret states are not leaked to an adversary. However, in practice, it is difficult to keep away from all possible kinds of leakage on these secret data due to a new kind of threat, called “side-channel attacks”. By side-channel attacks, an adversary could obtain partial information of these secret data so that some existing adversary models could be insufficient. Indeed, the study of leakage-resilient cryptography resistant to side-channel attacks has received significant attention recently. Up to date, no work has been done on the design of leakage-resilient certificateless key encapsulation (LR-CL-KE) or public key encryption (LR-CL-PKE) schemes under the continual leakage model. In this article, we propose the first LR-CL-KE scheme under the continual leakage model. Moreover, in the generic bilinear group (GBG) model, we formally prove that the proposed LR-CL-KE scheme is semantically secure against chosen ciphertext attacks for both Type I and Type II adversaries.

References

 
Akavia, A., Goldwasser, S., Vaikuntanathan, V. (2009). Simultaneous hardcore bits and cryptography against memory attacks. In: TCC’09, LNCS, Vol. 5444, pp. 474–495.
 
Al-Riyami, S.S., Paterson, K.G. (2003). Certificateless public key cryptography. In: ASIACRYPT’03, LNCS, Vol. 2894, pp. 452–473.
 
Alwen, J., Dodis, Y., Wichs, D. (2009). Leakage-resilient public-key cryptography in the bounded-retrieval model. In: CRYPTO’09, LNCS, Vol. 5677, pp. 36–54.
 
Biham, E., Carmeli, Y., Shamir, A. (2008). Bug attacks. In: CRYPTO’08, LNCS, Vol. 5157, pp. 221–240.
 
Boneh, D., Franklin, M. (2001). Identity-based encryption from the Weil pairing. In: CRYPTO’01, LNCS, Vol. 2139, pp. 213–229.
 
Boneh, D., Demillo, R.A., Lipton, R.J. (1997). On the importance of checking cryptographic protocols for faults. In: EUROCRYPT’97, LNCS, Vol. 1233, pp. 37–51.
 
Boneh, D., Boyen, X., Goh, E.J. (2005). Hierarchical identity-based encryption with constant size ciphertext. In: EUROCRYPT’05, LNCS, Vol. 3494, pp. 440–456.
 
Brakerski, Z., Kalai, Y.T., Katz, J., Vaikuntanathan, V. (2010). Cryptography resilient to continual memory leakage. In: 51st Annual IEEE Symposium on Foundations of Computer Science. IEEE Press, pp. 501–510.
 
Brumley, D., Boneh, D. (2005). Remote timing attacks are practical. Computer Networks, 48(5), 701–716.
 
Dodis, Y., Haralambiev, K. (2010). Cryptography against continuous memory attacks. In: 51st Annual IEEE Symposium on Foundations of Computer Science. IEEE Press, pp. 511–520.
 
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A. (2008). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing, 38(1), 97–139.
 
Galindo, D., Virek, S. (2013). A practical leakage-resilient signature scheme in the generic group model. In: SAC’12, LNCS, Vol. 7707, pp. 50–65.
 
Galindo, D., Grobschadl, J., Liu, Z., Vadnala, P.K., Vivek, S. (2016). Implementation of a leakage-resilient ElGamal key encapsulation mechanism. Journal of Cryptographic Engineering, 6(3), 229–238.
 
Hu, B., Wong, D., Zhang, Z., Deng, X. (2007). Certificateless signature: a new security model and an improved generic construction. Designs, Codes and Cryptography, 42(2), 109–126.
 
Huang, X., Mu, Y., Susilo, W., Wong, D., Wu, W. (2007). Certificateless signature revisited. In: ACISP’06, LNCS, Vol. 4586, pp. 308–322.
 
Hung, Y.H., Huang, S.S., Tseng, Y.M., Tsai, T.T. (2015). Certificateless signature with strong unforgeability in the standard model. Informatica, 26(4), 663–684.
 
Hung, Y.H., Tseng, Y.M., Huang, S.S. (2016). A revocable certificateless short signature scheme and its authentication application. Informatica, 27(3), 549–572.
 
Hung, Y.H., Huang, S.S., Tseng, Y.M., Tsai, T.T. (2017). Efficient anonymous multireceiver certificateless encryption. IEEE Systems Journal, 11(4), 2602–2613.
 
Hwang, Y.H., Liu, J.K., Chow, S.S.M. (2008). Certificateless public key encryption secure against malicious KGC attacks in the standard model. Journal of Universal Computer Science, 14(3), 463–480.
 
Katz, J., Vaikuntanathan, V. (2009). Signature schemes with bounded leakage resilience. In: ASIACRYPT’09, LNCS, Vol. 5912, pp. 703–720.
 
Kiltz, E., Pietrzak, K. (2010). Leakage resilient elgamal encryption. In: ASIACRYPT’10, LNCS, Vol. 6477, pp. 595–612.
 
Kocher, P.C. (1996). Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: CRYPTO’96, LNCS, Vol. 1163, pp. 104–113.
 
Kocher, P., Jaffe, J., Jun, B. (1999). Differential power analysis. In: CRYPTO’99, LNCS, Vol. 1666, pp. 388–397.
 
Lewko, A.B., Rouselakis, Y., Waters, B. (2011). Achieving leakage resilience through dual system encryption. In: TCC’11, LNCS, Vol. 6597, pp. 70–88.
 
Li, S., Zhang, F., Sun, Y., Shen, L. (2013). Efficient leakage-resilient public key encryption from DDH assumption. Cluster Computing, 16(4), 797–806.
 
Li, J., Guo, Y., Yu, Q., Lu, Y., Zhang, Y. (2016). Provably secure identity based encryption resilient to post challenge continuous auxiliary input leakage. Security and Communication Network, 9(10), 1016–1024.
 
Libert, B., Quisquater, J.J. (2006). On constructing certificateless cryptosystems from identity based encryption. In: PKC’06, LNCS, Vol. 3958, pp. 474–490.
 
Lin, X.J., Sun, L., Qu, H. (2017). An efficient RSA-based certificateless public key encryption scheme. Discrete Applied Mathematics. https://doi.org/10.1016/j.dam.2017.02.019.
 
Liu, S., Weng, J., Zhao, Y. (2013). Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks. In: CTRSA’13, LNCS, Vol. 7779, pp. 84–100.
 
Maurer, U., Wolf, S. (1998). Lower bounds on generic algorithms in groups. In: EUROCRYPT’98, LNCS, Vol. 1403, pp. 72–84.
 
Naor, M., Segev, G. (2009). Public-key cryptosystems resilient to key leakage. In: CRYPTO’09, LNCS, Vol. 5677, pp. 18–35.
 
Naor, M., Segev, G. (2012). Public-key cryptosystems resilient to key leakage. SIAM Journal on Computing, 41(4), 772–814.
 
Schwartz, J.T. (1980). Fast probabilistic algorithms for verification of polynomial identities. Journal of the ACM, 27(4), 701–717.
 
Scott, M. (2011). On the efficient implementation of pairing-based protocols. In: Cryptography and Coding, LNCS, Vol. 7089, pp. 296–308.
 
Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In: CRYPTO’84, LNCS, Vol. 196, pp. 47–53.
 
Sharma, G., Bala, S., Verma, A. (2016). An improved RSA-based certificateless signature scheme for wireless sensor networks. International Journal of Network Security, 18(1), 82–89.
 
Shoup, V. (1997). Lower bounds for discrete logarithms and related problems. In: EUROCRYPT’97, LNCS, Vol. 1233, pp. 256–266.
 
Tsai, T.T., Tseng, Y.M. (2015). Revocable certificateless public key encryption. IEEE Systems Journal, 9(3), 824–833.
 
Tsai, T.T., Tseng, Y.M., Huang, S.S. (2015). Efficient revocable certificateless public key encryption with a delegated revocation authority. Security and Communication Networks, 8(18), 3713–3725.
 
Waters, B. (2005). Efficient identity-based encryption without random oracles. In: EUROCRYPT’05, LNCS, Vol. 3494, pp. 114–127.
 
Wu, J.D., Tseng, Y.M., Huang, S.S. (2016). Leakage-resilient ID-based signature scheme in the generic bilinear group model. Security and Communication Networks, 9(17), 3987–4001.
 
Xiong, H., Yuen, T.H., Zhang, C., Yiu, S.M., He, Y.J. (2013). Leakage-resilient certificateless public key encryption. In: The first ACM workshop on Asia Public-Key Cryptography. ACM Press, pp. 13–22.
 
Yuen, T.H., Chow, S.S.M., Zhang, Y., Yiu, S.M. (2012). Identity-based encryption resilient to continual auxiliary leakage. In: EUROCRYPT’12, LNCS, Vol. 7237, pp. 117–134.
 
Zhang, J., Mao, J. (2012). An efficient RSA-based certificateless signature scheme. Journal of Systems and Software, 85(3), 638–642.
 
Zhou, Y., Yang, B., Zhang, W. (2016). Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing. Discrete Applied Mathematics, 204, 185–202.
 
Zippel, R. (1979). Probabilistic algorithms for sparse polynomials. In: EUROSAM’79, LNCS, Vol. 72, pp. 216–226.

Biographies

Wu Jui-Di

J.-D. Wu received the BS degree from the Department of Mathematics, National Changhua University of Education, Taiwan, in 2006. He received the MS degree from the Department of Mathematics, National Changhua University of Education, Taiwan, in 2008. He is currently a PhD candidate in the Department of Mathematics, National Changhua University of Education, Taiwan. His research interests include applied cryptography and pairing-based cryptography.

Tseng Yuh-Min
ymtseng@cc.ncue.edu.tw

Y.-M. Tseng is currently a professor in the Department of Mathematics, National Changhua University of Education, Taiwan. He is a member of IEEE Computer Society, IEEE Communications Society and the Chinese Cryptology and Information Security Association (CCISA). In 2006, his paper received the Wilkes Award from The British Computer Society. He has published over one hundred scientific journals and conference papers on various research areas of cryptography, security and computer network. His research interests include cryptography, network security, computer network and mobile communications. He serves as an editor of several international journals.

Huang Sen-Shan

S.-S. Huang is currently a professor in the Department of Mathematics, National Changhua University of Education, Taiwan. His research interests include number theory, cryptography, and network security. He received his PhD from the University of Illinois at Urbana-Champaign in 1997 under the supervision of Professor Bruce C. Berndt.

Chou Wei-Chieh

W.-C. Chou received the BS degree from the Department of Mathematics, National Changhua University of Education, Taiwan, in 2015. He received the MS degree from the Department of Mathematics, National Changhua University of Education, Taiwan, in 2017. His research interests include leakage-resilient cryptography and network security.


Full article Related articles Cited by PDF XML
Full article Related articles Cited by PDF XML

Copyright
© 2018 Vilnius University
by logo by logo
Open access article under the CC BY license.

Keywords
certificateless encryption continual leakage model side-channel attacks leakage resilience generic bilinear group model

Metrics
since January 2020
1296

Article info
views

702

Full article
views

531

PDF
downloads

212

XML
downloads

Export citation

Copy and paste formatted citation
Placeholder

Download citation in file


Share


RSS

INFORMATICA

  • Online ISSN: 1822-8844
  • Print ISSN: 0868-4952
  • Copyright © 2023 Vilnius University

About

  • About journal

For contributors

  • OA Policy
  • Submit your article
  • Instructions for Referees
    •  

    •  

Contact us

  • Institute of Data Science and Digital Technologies
  • Vilnius University

    Akademijos St. 4

    08412 Vilnius, Lithuania

    Phone: (+370 5) 2109 338

    E-mail: informatica@mii.vu.lt

    https://informatica.vu.lt/journal/INFORMATICA
Powered by PubliMill  •  Privacy policy