Back to Search
Start Over
Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs
- Source :
- Journal of Ambient Intelligence and Humanized Computing. 7:681-692
- Publication Year :
- 2015
- Publisher :
- Springer Science and Business Media LLC, 2015.
-
Abstract
- Public-key encryption (PKE) can be used in cloud system to protect data in data sharing, identity authentication, etc. However, the security model of traditional PKE does not capture the “key-leakage attacks” which can leak partial information about the secret key. Also, the adversary can inject fault to tamper with the secret key and observe the output of the public key encryption scheme under this modified key which is called “related-key attack”. In this paper, we present a method to construct public key encryption schemes secure against both weak key-leakage attacks and affine related-key attacks directly from extractable hash proof systems. Specifically, we first add Key Homomorphism and Fingerprinting properties to all-but-one (ABO) extractable hash proofs and construct a key encapsulation mechanism scheme secure against related-key attacks via it and thus public key encryption scheme secure against related-key attacks. Also, we prove that if the based ABO-extractable hash proof with Key Homomorphism and Fingerprinting properties is weak leakage-resilient, then the key encapsulation mechanism scheme constructed from it is weak leakage-resilient and related-key attack secure. Moreover, we propose a public key encryption scheme secure against affine related-key attacks based on lattice.
- Subjects :
- Key Wrap
General Computer Science
Computer science
Hash function
Key distribution
0102 computer and information sciences
02 engineering and technology
Encryption
computer.software_genre
Computer security
01 natural sciences
Secure Hash Standard
Public-key cryptography
Multiple encryption
0202 electrical engineering, electronic engineering, information engineering
Cryptographic hash function
Key encapsulation
Pre-shared key
Authentication
business.industry
Computer security model
Adversary
010201 computation theory & mathematics
Probabilistic encryption
40-bit encryption
56-bit encryption
Hash chain
020201 artificial intelligence & image processing
Homomorphism
Attribute-based encryption
On-the-fly encryption
business
computer
Subjects
Details
- ISSN :
- 18685145 and 18685137
- Volume :
- 7
- Database :
- OpenAIRE
- Journal :
- Journal of Ambient Intelligence and Humanized Computing
- Accession number :
- edsair.doi...........71ee3f82ae038c06c6a810bd25f1dc02
- Full Text :
- https://doi.org/10.1007/s12652-015-0329-0