TY - JOUR
T1 - Public key encryption resilient to leakage and tampering attacks
AU - Sun, Shi Feng
AU - Gu, Dawu
AU - Parampalli, Udaya
AU - Yu, Yu
AU - Qin, Baodong
N1 - Publisher Copyright:
© 2017 Elsevier Inc.
PY - 2017/11
Y1 - 2017/11
N2 - In this work, we investigate how to protect public key encryption from both key-leakage attacks and tampering attacks. First, we formalize the notions of chosen ciphertext (CCA) security against key-leakage and tampering attacks. To this goal, we then introduce the concept of key-homomorphic hash proof systems and present a generic construction of public key encryption based on this new primitive. Our construction, compared with previous works, realizes leakage-resilience and tampering-resilience simultaneously but completely independently, so it can tolerate a larger amount of bounded-memory leakage and be instantiated with more flexibility. Moreover, it allows for an unbounded number of affine-tampering queries, even after the challenge phase. With slight adaptations, our construction also achieves CCA security against subexponentially hard auxiliary-input leakage attacks and a polynomial of affine-tampering attacks. Thus, to the best of our knowledge, we get the first public key encryption scheme secure against both auxiliary-input leakage attacks and tampering attacks.
AB - In this work, we investigate how to protect public key encryption from both key-leakage attacks and tampering attacks. First, we formalize the notions of chosen ciphertext (CCA) security against key-leakage and tampering attacks. To this goal, we then introduce the concept of key-homomorphic hash proof systems and present a generic construction of public key encryption based on this new primitive. Our construction, compared with previous works, realizes leakage-resilience and tampering-resilience simultaneously but completely independently, so it can tolerate a larger amount of bounded-memory leakage and be instantiated with more flexibility. Moreover, it allows for an unbounded number of affine-tampering queries, even after the challenge phase. With slight adaptations, our construction also achieves CCA security against subexponentially hard auxiliary-input leakage attacks and a polynomial of affine-tampering attacks. Thus, to the best of our knowledge, we get the first public key encryption scheme secure against both auxiliary-input leakage attacks and tampering attacks.
KW - Chosen-ciphertext security
KW - Hash proof system
KW - Key-leakage attack
KW - Public key encryption
KW - Tampering attack
UR - https://www.scopus.com/pages/publications/85019995471
U2 - 10.1016/j.jcss.2017.03.004
DO - 10.1016/j.jcss.2017.03.004
M3 - 文章
AN - SCOPUS:85019995471
SN - 0022-0000
VL - 89
SP - 142
EP - 156
JO - Journal of Computer and System Sciences
JF - Journal of Computer and System Sciences
ER -