TY - GEN
T1 - Updatable All-But-One Dual Projective Hashing and Its Applications
AU - Zhang, Kai
AU - Jiang, Zhe
AU - Gong, Junqing
AU - Qian, Haifeng
N1 - Publisher Copyright:
© 2021, Springer Nature Switzerland AG.
PY - 2021
Y1 - 2021
N2 - Dual projective hashing is an extension of Cramer-Shoup projective hashing, which implies lossy trapdoor functions (LTDFs) and deterministic PKE schemes secure with respect to hard-to-invert auxiliary input. In this paper, we introduce the notion of updatable all-but-one dual projective hashing (UDPH) based on the all-but-one variant of dual projective hashing, which allows us to investigate the continuous leakage of invisible key update in the same context. In particular, we give a general construction of leakage-resilient all-but-one LTDFs via UDPH, which yields high efficiency compared with existed direct leakage-resilient all-but-one LTDFs constructions based on MDDH and SXDH. Concretely, our generic framework can be instantiated with k-LIN, DCR, QR and LWE assumptions in the standard model.we present a modular framework for leakage-resilient deterministic PKEs with hard-to-invert auxiliary input, which is proven secure under the introduced continuous-leakage-resilient strong privacy indistinguishability-based security model of invisible key update. Compared with the known MDDH/SXDH-based schemes, our constructions can be instantiated with more widely-accepted assumptions including k-LIN, DCR, QR and LWE.
AB - Dual projective hashing is an extension of Cramer-Shoup projective hashing, which implies lossy trapdoor functions (LTDFs) and deterministic PKE schemes secure with respect to hard-to-invert auxiliary input. In this paper, we introduce the notion of updatable all-but-one dual projective hashing (UDPH) based on the all-but-one variant of dual projective hashing, which allows us to investigate the continuous leakage of invisible key update in the same context. In particular, we give a general construction of leakage-resilient all-but-one LTDFs via UDPH, which yields high efficiency compared with existed direct leakage-resilient all-but-one LTDFs constructions based on MDDH and SXDH. Concretely, our generic framework can be instantiated with k-LIN, DCR, QR and LWE assumptions in the standard model.we present a modular framework for leakage-resilient deterministic PKEs with hard-to-invert auxiliary input, which is proven secure under the introduced continuous-leakage-resilient strong privacy indistinguishability-based security model of invisible key update. Compared with the known MDDH/SXDH-based schemes, our constructions can be instantiated with more widely-accepted assumptions including k-LIN, DCR, QR and LWE.
KW - Continuous leakage-resilient
KW - Deterministic public key encryption
KW - Dual projective hashing
KW - Lossy trapdoor functions
UR - https://www.scopus.com/pages/publications/85116040965
U2 - 10.1007/978-3-030-88052-1_21
DO - 10.1007/978-3-030-88052-1_21
M3 - 会议稿件
AN - SCOPUS:85116040965
SN - 9783030880514
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 358
EP - 374
BT - Information and Communications Security - 23rd International Conference, ICICS 2021, Proceedings
A2 - Gao, Debin
A2 - Li, Qi
A2 - Guan, Xiaohong
A2 - Liao, Xiaofeng
PB - Springer Science and Business Media Deutschland GmbH
T2 - 23rd International Conference on Information and Communications Security, ICICS 2021
Y2 - 19 November 2021 through 21 November 2021
ER -