Anonymous and Updatable Identity-Based Hash Proof System

In EUROCRYPT 2002, Alwen et al. demonstrated that an identity-based hash proof system (IB-HPS) can be used to generate an identity-based encryption (IBE) scheme, which is secure against partial leakage of the decryption key of the target identity. However, in many real-world applications, the leakage is normally unbounded, and an adversary could violate the security of such cryptography schemes by performing continuous leakage attacks. Therefore, cryptography schemes are desirable to maintain their claimed security even in the continuous leakage setting. In this paper, we first design an improved IB-HPS called updatable IB-HPS (U-IB-HPS), which has an additional key update algorithm to embed some fresh randomness into the user's private key, ensuring that enough entropy is maintained in the updated keys. Then, we further use the U-IB-HPS to propose a generic construction of continuously leakage-resilient IBE schemes. Finally, an instantiation of the U-IB-HPS with anonymity is presented. As a result, our construction delivers an anonymous IBE scheme that is secure against continuous leakage of user's private key. The security of our proposed scheme has been proved in the random oracle model under the classic decisional bilinear Diffie–Hellman assumption, which is a standard static security assumption.

[1]  Yi Mu,et al.  CCA2 secure public-key encryption scheme tolerating continual leakage attacks , 2016, Secur. Commun. Networks.

[2]  Dongdai Lin,et al.  Anonymous Identity-Based Hash Proof System and Its Applications , 2012, ProvSec.

[3]  Yang Lu,et al.  Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage , 2016, Secur. Commun. Networks.

[4]  Rui Zhang,et al.  Updatable Hash Proof System and Its Applications , 2015, ESORICS.

[5]  Yi Mu,et al.  Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles , 2018, Comput. J..

[6]  Bo Yang,et al.  Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security , 2017, Comput. J..

[7]  Fuchun Guo,et al.  Strongly Leakage-Resilient Authenticated Key Exchange , 2016, CT-RSA.

[8]  Yang Lu,et al.  Provably secure certificate-based encryption with leakage resilience , 2017, Theor. Comput. Sci..

[9]  Yunlei Zhao,et al.  Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks , 2013, CT-RSA.

[10]  Ronald Cramer,et al.  Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption , 2001, EUROCRYPT.

[11]  Yang Lu,et al.  Continuous leakage-resilient certificate-based encryption , 2016, Inf. Sci..

[12]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[13]  Yanqin Zhu,et al.  Leakage-resilient identity-based encryption scheme , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.

[14]  Yevgeniy Dodis,et al.  Cryptography against Continuous Memory Attacks , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.

[15]  Moni Naor,et al.  Public-Key Encryption in the Bounded-Retrieval Model , 2010, EUROCRYPT.

[16]  Jiguo Li,et al.  A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme , 2016, Comput. J..

[17]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[18]  Shengli Liu,et al.  Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing , 2014, Public Key Cryptography.

[19]  Kefei Chen,et al.  Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience , 2015, IET Inf. Secur..

[20]  Brent Waters,et al.  Practical leakage-resilient identity-based encryption from simple assumptions , 2010, CCS '10.

[21]  Mihir Bellare,et al.  Robust Encryption , 2010, TCC.

[22]  Jiguo Li,et al.  Leakage-resilient certificate-based encryption , 2015, Secur. Commun. Networks.

[23]  A. Lewko,et al.  Fully Secure HIBE with Short Ciphertexts , 2009 .

[24]  Jiguo Li,et al.  Identity-based broadcast encryption with continuous leakage resilience , 2018, Inf. Sci..

[25]  Craig Gentry,et al.  Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.

[26]  Oded Regev,et al.  On lattices, learning with errors, random linear codes, and cryptography , 2009, JACM.

[27]  Xinyi Huang,et al.  Certificate-based encryption resilient to key leakage , 2016, J. Syst. Softw..

[28]  Craig Gentry,et al.  Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..

[29]  Moni Naor,et al.  Public-Key Cryptosystems Resilient to Key Leakage , 2009, SIAM J. Comput..

[30]  Shengli Liu,et al.  Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter , 2013, IACR Cryptol. ePrint Arch..

[31]  M. Bellare,et al.  Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2008, Journal of Cryptology.

[32]  Patricia L. V. Ribeiro,et al.  SPACE-EFFICIENT IDENTITY-BASED ENCRYPTION , 2009 .

[33]  Zhong Chen,et al.  A New Leakage-Resilient IBE Scheme in the Relative Leakage Model , 2011, DBSec.