File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1145/2484389.2484394
- Scopus: eid_2-s2.0-84877995564
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Leakage-Resilient Certificateless Public Key Encryption
Title | Leakage-Resilient Certificateless Public Key Encryption |
---|---|
Authors | |
Keywords | certificateless public key encryption dual system encryption leakage-resilient |
Issue Date | 2013 |
Publisher | The Association for Computing Machinery (ACM). |
Citation | AsiaPKC'13: Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography, Hangzhou, China, 8 May 2013, p. 13-22 How to Cite? |
Abstract | In certificateless public key encryption (CL-PKE), the Private Key Generator (PKG) keeps a master secret key to generate a partial private key corresponding to a user's identity. Together with a secret value generated by the user, a full private key can be constructed for decryption. Traditional security model for CL-PKE assumes that (i) both the master secret key of the PKG and the full private key of the user under attack are in absolute secrecy; and (ii) the attacker can only obtain either the target user's secret value without any partial knowledge of the partial private key or vice versa. However, the advancement of practical side-channel attacks enable attackers to obtain partial information of both keys easily, making the above assumption invalid.
In this paper, we give the first leakage-resilient CL-PKE. We consider different leakage conditions for Type I (third party attackers) and Type II (honest-but-curious PKG) attackers, following the classification in traditional CL-PKE. We give a concrete construction in the composite order bilinear group. We prove the security of our scheme in the standard model, overcoming some technical difficulties in the security proofs for both Type I and Type II attackers of CL-PKE. © 2013 ACM. |
Persistent Identifier | http://hdl.handle.net/10722/184860 |
ISBN |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Xiong, H | en_US |
dc.contributor.author | Yuen, TH | en_US |
dc.contributor.author | Zhang, C | en_US |
dc.contributor.author | Yiu, SM | en_US |
dc.contributor.author | He, YJ | en_US |
dc.date.accessioned | 2013-07-15T10:14:44Z | - |
dc.date.available | 2013-07-15T10:14:44Z | - |
dc.date.issued | 2013 | en_US |
dc.identifier.citation | AsiaPKC'13: Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography, Hangzhou, China, 8 May 2013, p. 13-22 | en_US |
dc.identifier.isbn | 9781450320696 | - |
dc.identifier.uri | http://hdl.handle.net/10722/184860 | - |
dc.description.abstract | In certificateless public key encryption (CL-PKE), the Private Key Generator (PKG) keeps a master secret key to generate a partial private key corresponding to a user's identity. Together with a secret value generated by the user, a full private key can be constructed for decryption. Traditional security model for CL-PKE assumes that (i) both the master secret key of the PKG and the full private key of the user under attack are in absolute secrecy; and (ii) the attacker can only obtain either the target user's secret value without any partial knowledge of the partial private key or vice versa. However, the advancement of practical side-channel attacks enable attackers to obtain partial information of both keys easily, making the above assumption invalid. In this paper, we give the first leakage-resilient CL-PKE. We consider different leakage conditions for Type I (third party attackers) and Type II (honest-but-curious PKG) attackers, following the classification in traditional CL-PKE. We give a concrete construction in the composite order bilinear group. We prove the security of our scheme in the standard model, overcoming some technical difficulties in the security proofs for both Type I and Type II attackers of CL-PKE. © 2013 ACM. | - |
dc.language | eng | en_US |
dc.publisher | The Association for Computing Machinery (ACM). | en_US |
dc.relation.ispartof | ACM Workshop on Asia public-key Cryptography | en_US |
dc.subject | certificateless public key encryption | - |
dc.subject | dual system encryption | - |
dc.subject | leakage-resilient | - |
dc.title | Leakage-Resilient Certificateless Public Key Encryption | en_US |
dc.type | Conference_Paper | en_US |
dc.identifier.email | Yuen, TH: johnyuen@hku.hk | en_US |
dc.identifier.email | Zhang, C: congz@hku.hk | en_US |
dc.identifier.email | Yiu, SM: smyiu@cs.hku.hk | en_US |
dc.identifier.authority | Yiu, SM=rp00207 | en_US |
dc.identifier.doi | 10.1145/2484389.2484394 | - |
dc.identifier.scopus | eid_2-s2.0-84877995564 | - |
dc.identifier.hkuros | 215068 | en_US |
dc.identifier.spage | 13 | en_US |
dc.identifier.epage | 22 | en_US |
dc.publisher.place | New York, NY, USA | - |