Skip to main content

2018 | OriginalPaper | Buchkapitel

Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption

verfasst von : Masahito Ishizaka, Kanta Matsuura

Erschienen in: Cryptology and Network Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Leakage-resilience guarantees that even if some information about the secret key is partially leaked, the security is maintained. Several security models considering leakage-resilience have been proposed. Among them, auxiliary leakage model proposed by Dodis et al. in STOC’09 is especially important, since it can deal with a leakage caused by a function which information-theoretically reveals the secret key, e.g., one-way permutation.
Contribution of this work is two-fold. Firstly, we propose an identity-based encryption (IBE) scheme and prove that it is fully secure and resilient to the auxiliary leakage under the decisional linear assumption in the standard model. Secondly, although the IBE scheme proposed by Yuen et al. in Eurocrypt’12 has been considered to be the only IBE scheme resilient to auxiliary leakage, we prove that the security proof for the IBE scheme is defective. We insist that our IBE scheme is the only IBE scheme resilient to auxiliary leakage.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Secret denotes the secret information. |Secret| denotes the bit-length of Secret.
 
2
k denotes the minimum entropy of the secret key \(\mathrm{sk}\). If the secret-key is generated uniformly at random, k is equivalent to the bit-length of the secret-key \(|\mathrm{sk}|\).
 
3
Note that each one of our counterexamples indicates that their current proof is wrong, but not that their scheme cannot be proven to be secure in their security model. Thus, it is possible that their scheme is proven to be secure if the proof is done in another manner.
 
4
It obviously holds that \(\begin{bmatrix} \mathbf {I}_m|(r_0+\varSigma _{i=1}^{n} ID[i]r_i)\mathbf {I}_m \end{bmatrix} \mathbf {v}= \mathbf {E}\). Note that by pre-multiplying this equation by \(\mathbf {A}_0\), we obtain \(\mathbf {F}(ID)\mathbf {v}= \mathbf {D}\).
 
Literatur
10.
Zurück zum Zitat Brakerski, Z., Kalai, Y.T., Katz, J., Vaikuntanathan, V.: Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage. In: FOCS 2010, pp. 501–510 (2010) Brakerski, Z., Kalai, Y.T., Katz, J., Vaikuntanathan, V.: Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage. In: FOCS 2010, pp. 501–510 (2010)
11.
Zurück zum Zitat Bellare, M., O’Neill, A., Stepanovs, I.: Forward-security under continual leakage. Cryptology ePrint Archive: Report 2017/476 (2017) Bellare, M., O’Neill, A., Stepanovs, I.: Forward-security under continual leakage. Cryptology ePrint Archive: Report 2017/476 (2017)
14.
Zurück zum Zitat Chow, S.S.M., Dodis, Y., Rouselakis, Y., Waters, B.: Practical leakage-resilient identity-based encryption from simple assumptions. In: ACMCCS 2010, pp. 152–161 (2010) Chow, S.S.M., Dodis, Y., Rouselakis, Y., Waters, B.: Practical leakage-resilient identity-based encryption from simple assumptions. In: ACMCCS 2010, pp. 152–161 (2010)
17.
Zurück zum Zitat Dodis, Y., Haralambiev, K., López-Alt, A., Wichs, D.: Cryptography against continuous memory attacks. In: FOCS 2010, pp. 511–520 (2010) Dodis, Y., Haralambiev, K., López-Alt, A., Wichs, D.: Cryptography against continuous memory attacks. In: FOCS 2010, pp. 511–520 (2010)
19.
Zurück zum Zitat Dodis, Y., Haralambiev, K., López-Alt, A., Wichs, D.: Efficient public-key cryptography in the presence of key leakage. Cryptology ePrint Archive: Report 2010/154 (2010) Dodis, Y., Haralambiev, K., López-Alt, A., Wichs, D.: Efficient public-key cryptography in the presence of key leakage. Cryptology ePrint Archive: Report 2010/154 (2010)
20.
Zurück zum Zitat Dodis, Y., Kalai, Y.T., Lovett, S.: On cryptography with auxiliary input. In: STOC 2009, pp. 621–630 (2009) Dodis, Y., Kalai, Y.T., Lovett, S.: On cryptography with auxiliary input. In: STOC 2009, pp. 621–630 (2009)
22.
Zurück zum Zitat Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: STOC 2008, pp. 197–206 (2008) Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: STOC 2008, pp. 197–206 (2008)
23.
Zurück zum Zitat Halderman, J.A., et al.: Lest we remember: cold boot attacks on encryption keys. In: USENIX Security Symposium, pp. 45–60 (2008) Halderman, J.A., et al.: Lest we remember: cold boot attacks on encryption keys. In: USENIX Security Symposium, pp. 45–60 (2008)
25.
Zurück zum Zitat Lewko, A., Lewko, M., Waters, B.: How to leak on key updates. Cryptology ePrint Archive: Report 2010/562 (2010) Lewko, A., Lewko, M., Waters, B.: How to leak on key updates. Cryptology ePrint Archive: Report 2010/562 (2010)
26.
Zurück zum Zitat Lewko, A., Lewko, M., Waters, B.: How to leak on key updates. In: STOC 2011, pp. 725–734 (2011) Lewko, A., Lewko, M., Waters, B.: How to leak on key updates. In: STOC 2011, pp. 725–734 (2011)
28.
Metadaten
Titel
Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption
verfasst von
Masahito Ishizaka
Kanta Matsuura
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00434-7_21