Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage

In the past, the security of most public-key encryption or key encapsulation schemes is shown in an ideal model, where private keys, secret keys and random values are assumed to be absolutely secure to adversaries. However, this ideal model is not practical due to side-channel attacks in the sense that adversaries could gain partial information of these secret values involved in decryption operations by perceiving energy consumption or execution timing. In such a case, these schemes under the ideal model could suffer from side-channel attacks. Recently, leakage-resilient cryptography resistant to side-channel attacks is an emerging research topic. Certificate-based encryption (CBE) or certificate-based key encapsulation (CB-KE) schemes are a class of important public-key encryption. However, little work addresses the design of leakage-resilient CBE (LR-CBE) or leakage-resilient CB-KE (LR-CB-KE) schemes. In this paper, we present the first LR-CB-KE scheme with overall unbounded leakage property which permits adversaries to continuously gain partial information of the system secret key of a trusted certificate authority (CA), the private keys and certificates of users, and random values. In the generic bilinear group model, formal security analysis is made to prove that the proposed LR-CB-KE scheme is secure against chosen ciphertext attacks.

[1]  Paz Morillo,et al.  Improved certificate-based encryption in the standard model , 2008, J. Syst. Softw..

[2]  Siu-Ming Yiu,et al.  Identity-Based Encryption Resilient to Continual Auxiliary Leakage , 2012, EUROCRYPT.

[3]  Yuh-Min Tseng,et al.  Revocable Certificateless Public Key Encryption , 2015, IEEE Systems Journal.

[4]  Carmit Hazay,et al.  Signature Schemes Secure Against Hard-to-Invert Leakage , 2015, Journal of Cryptology.

[5]  Yunlei Zhao,et al.  Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks , 2013, CT-RSA.

[6]  Michael Scott,et al.  On the Efficient Implementation of Pairing-Based Protocols , 2011, IMACC.

[7]  Eike Kiltz,et al.  Leakage Resilient ElGamal Encryption , 2010, ASIACRYPT.

[8]  Victor Shoup,et al.  Lower Bounds for Discrete Logarithms and Related Problems , 1997, EUROCRYPT.

[9]  Yuh-Min Tseng,et al.  Efficient Revocable ID-Based Encryption with a Public Channel , 2012, Comput. J..

[10]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[11]  Yang Lu,et al.  Provably secure certificate-based encryption with leakage resilience , 2017, Theor. Comput. Sci..

[12]  Xinyi Huang,et al.  Certificate-based encryption resilient to key leakage , 2016, J. Syst. Softw..

[13]  Yevgeniy Dodis,et al.  Efficient Public-Key Cryptography in the Presence of Key Leakage , 2010, ASIACRYPT.

[14]  Yang Lu,et al.  Continuous leakage-resilient certificate-based encryption , 2016, Inf. Sci..

[15]  Ueli Maurer,et al.  Lower Bounds on Generic Algorithms in Groups , 1998, EUROCRYPT.

[16]  Zhiguang Qin,et al.  Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks , 2015, IEEE Transactions on Information Forensics and Security.

[17]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[18]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[19]  Sen-Shan Huang,et al.  An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage , 2019, IEEE Systems Journal.

[20]  Srinivas Vivek,et al.  A Practical Leakage-Resilient Signature Scheme in the Generic Group Model , 2012, Selected Areas in Cryptography.

[21]  Yang Lu,et al.  Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage , 2016, Secur. Commun. Networks.

[22]  Douglas Stebila,et al.  Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange , 2015, IMACC.

[23]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[24]  Dan Boneh,et al.  Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.

[25]  Yang Lu,et al.  Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model , 2014, J. Inf. Sci. Eng..

[26]  Yael Tauman Kalai,et al.  Cryptography Resilient to Continual Memory Leakage , 2010 .

[27]  Zhe Liu,et al.  Implementation of a leakage-resilient ElGamal key encapsulation mechanism , 2016, Journal of Cryptographic Engineering.

[28]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[29]  Sen-Shan Huang,et al.  Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks , 2019, IEEE Access.

[30]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[31]  Vinod Vaikuntanathan,et al.  Simultaneous Hardcore Bits and Cryptography against Memory Attacks , 2009, TCC.

[32]  Sen-Shan Huang,et al.  Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model , 2018, IEEE Access.

[33]  Craig Gentry,et al.  Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.

[34]  Ying-Hao Hung,et al.  A Short Certificate-based Signature Scheme with Provable Security , 2016, Inf. Technol. Control..

[35]  Yevgeniy Dodis,et al.  Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model , 2009, CRYPTO.

[36]  Sen-Shan Huang,et al.  Leakage-resilient ID-based signature scheme in the generic bilinear group model , 2016, Secur. Commun. Networks.

[37]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[38]  Limin Shen,et al.  Efficient leakage-resilient public key encryption from DDH assumption , 2013, Cluster Computing.

[39]  Michael Scott,et al.  Implementing Cryptographic Pairings on Smartcards , 2006, CHES.

[40]  Moni Naor,et al.  Public-Key Cryptosystems Resilient to Key Leakage , 2012, SIAM J. Comput..

[41]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[42]  Zhiwei Wang,et al.  Provably secure certificate-based signature scheme without pairings , 2013, Inf. Sci..