Continuous leakage-resilient certificateless public key encryption with CCA security

Abstract Recently, much attention has been focused on designing provably secure cryptographic scheme in the presence of key leakage, and many constructions are proposed by cryptography researchers. However, most of them are researched in the bounded-leakage model, and cannot keep their claimed security in the continuous-leakage setting. It has been a research challenge to achieve the claimed security in continuous leakage setting. Also, for any polynomial time adversary, most of pre-existing constructions cannot ensure that their output is random in the leakage setting, and any adversary can get a certain amount of additional information on the private key from the output of cryptographic scheme. To obtain better performance (e.g., continuous leakage-resilience, etc.), a new construction of CCA2 secure continuous leakage-resilient certificateless public-key encryption scheme is proposed in this paper, and the scheme’s security is proved based on the hardness of the classical decisional Diffie–Hellman assumption. According to the results of analysis, we can get that our construction not only tolerates continuous leakage attacks on the private key through periodically update, but also enjoys better performances, such as the round leakage parameter has the constant size, and any polynomial time adversary are unable to get leakage on the private key from the corresponding ciphertext, etc. In particular, the striking advantage of our method is the key leakage ratio, which can achieve 3/4. Because these good performance features, our proposal may have some significant value in the practical applications.

[1]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[2]  Bo Yang,et al.  Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security , 2017, Comput. J..

[3]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[4]  Siu-Ming Yiu,et al.  Leakage-resilient certificateless public key encryption , 2013, AsiaPKC '13.

[5]  Jiguo Li,et al.  A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme , 2016, Comput. J..

[6]  Kefei Chen,et al.  Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience , 2015, IET Inf. Secur..

[7]  Fuchun Guo,et al.  Strong authenticated key exchange with auxiliary inputs , 2016, Designs, Codes and Cryptography.

[8]  Yang Lu,et al.  Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage , 2016, Secur. Commun. Networks.

[9]  Fuchun Guo,et al.  Strongly Leakage-Resilient Authenticated Key Exchange , 2016, CT-RSA.

[10]  Yunlei Zhao,et al.  Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks , 2013, CT-RSA.

[11]  Yang Lu,et al.  Continuous leakage-resilient certificate-based encryption , 2016, Inf. Sci..

[12]  Brent Waters,et al.  Practical leakage-resilient identity-based encryption from simple assumptions , 2010, CCS '10.

[13]  Yi Mu,et al.  CCA2 secure public-key encryption scheme tolerating continual leakage attacks , 2016, Secur. Commun. Networks.

[14]  Ronald Cramer,et al.  Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..

[15]  Yevgeniy Dodis,et al.  Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model , 2009, CRYPTO.

[16]  Vinod Vaikuntanathan,et al.  Simultaneous Hardcore Bits and Cryptography against Memory Attacks , 2009, TCC.

[17]  Moni Naor,et al.  Public-Key Cryptosystems Resilient to Key Leakage , 2009, SIAM J. Comput..

[18]  Yevgeniy Dodis,et al.  Cryptography against Continuous Memory Attacks , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.

[19]  Bo Yang,et al.  Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing , 2016, Discret. Appl. Math..

[20]  Limin Shen,et al.  Efficient leakage-resilient public key encryption from DDH assumption , 2013, Cluster Computing.

[21]  Kaoru Kurosawa,et al.  New leakage-resilient CCA-secure public key encryption , 2013, J. Math. Cryptol..

[22]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[23]  Xinyi Huang,et al.  Certificate-based encryption resilient to key leakage , 2016, J. Syst. Softw..