Pub. online:28 May 2025Type:Research ArticleOpen Access
Journal:Informatica
Volume 36, Issue 2 (2025), pp. 429–452
Abstract
A public key signcryption with equality test (PKSCET) scheme is a public key signcryption (PKSC) scheme with the property of equality test. However, all the existing PKSCET schemes are vulnerable to a new kind of security threats, called side-channel attacks, which could potentially lead to the unauthorized disclosure of sensitive information or even the compromise of secret keys, undermining the overall confidentiality and integrity of the system. Therefore, this study aims to propose the first leakage-resilient PKSCET (LR-PKSCET) scheme that achieves resistance to side-channel attacks. Moreover, the proposed LR-PKSCET scheme is demonstrated to possess four security properties, namely, leakage resilience, indistinguishability, one-wayness, and existential unforgeability. Based on the proposed LR-PKSCET scheme, an anti-scam system (application) is presented to mitigate the ongoing occurrence of a myriad of scam cases.
Pub. online:1 Jan 2018Type:Research ArticleOpen Access
Journal:Informatica
Volume 29, Issue 1 (2018), pp. 125–155
Abstract
The previous adversary models of public key cryptography usually have a nature assumption that permanent/temporary secret (private) keys must be kept safely and internal secret states are not leaked to an adversary. However, in practice, it is difficult to keep away from all possible kinds of leakage on these secret data due to a new kind of threat, called “side-channel attacks”. By side-channel attacks, an adversary could obtain partial information of these secret data so that some existing adversary models could be insufficient. Indeed, the study of leakage-resilient cryptography resistant to side-channel attacks has received significant attention recently. Up to date, no work has been done on the design of leakage-resilient certificateless key encapsulation (LR-CL-KE) or public key encryption (LR-CL-PKE) schemes under the continual leakage model. In this article, we propose the first LR-CL-KE scheme under the continual leakage model. Moreover, in the generic bilinear group (GBG) model, we formally prove that the proposed LR-CL-KE scheme is semantically secure against chosen ciphertext attacks for both Type I and Type II adversaries.