Back to Search
Start Over
Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
- Source :
- Soft Computing. 20:4919-4932
- Publication Year :
- 2015
- Publisher :
- Springer Science and Business Media LLC, 2015.
-
Abstract
- Public-key encryption can be used to protect the sensitive data in cloud system with intelligent mobile agents facilitating better services. However, many public-key encryption schemes do not resist the side-channel attacks which can be applied to the encryption instances implemented on a chip or cloud to obtain partial information leakage about the secret states, as the traditional security model of public-key encryption does not capture this kind of attacks. Also, the adversary can inject fault to tamper with the secret key and observe the output of the public-key encryption scheme under this modified key which is called "related-key attacks". Inspired by these, the models of key-leakage attacks and related-key attacks are formalized, respectively. In this paper, we present a method to construct public-key encryption schemes against both weak key-leakage attacks and linear related-key attacks from extractable hash proof systems (EHPS or XHPS). Specifically, we first transform ABOEHPS to weak leakage-resilient ABOEHPS and add Key Homomorphism and Fingerprinting properties to it. Then, based on this new ABOEHPS, we construct weak leakage-resilient adaptive trapdoor relation with these two properties and public-key encryption schemes against both weak key-leakage attacks and linear related-key attacks can be constructed from it. Moreover, we propose a public-key encryption scheme against both adaptive key-leakage attacks and linear related-key attacks.
- Subjects :
- Key Wrap
Plaintext-aware encryption
Blinding
Computer science
Data_MISCELLANEOUS
Hash function
0102 computer and information sciences
02 engineering and technology
computer.software_genre
Encryption
Computer security
01 natural sciences
Disk encryption hardware
Theoretical Computer Science
Public-key cryptography
Multiple encryption
0202 electrical engineering, electronic engineering, information engineering
Side channel attack
business.industry
Client-side encryption
Adversary
Computer security model
Disk encryption theory
Deterministic encryption
Disk encryption
Symmetric-key algorithm
010201 computation theory & mathematics
Probabilistic encryption
Information leakage
56-bit encryption
40-bit encryption
020201 artificial intelligence & image processing
Homomorphism
Geometry and Topology
Attribute-based encryption
Link encryption
On-the-fly encryption
business
computer
Software
Subjects
Details
- ISSN :
- 14337479 and 14327643
- Volume :
- 20
- Database :
- OpenAIRE
- Journal :
- Soft Computing
- Accession number :
- edsair.doi...........844436b8834c8ea50db13e1bf1191964
- Full Text :
- https://doi.org/10.1007/s00500-015-1782-6