File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-030-21568-2_24
- Scopus: eid_2-s2.0-85067242402
- WOS: WOS:000501602600024
- Find via
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System
Title | Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System |
---|---|
Authors | |
Keywords | Hash proof system Leakage attack Public key encryption Chosen-ciphertext security Tampering attack |
Issue Date | 2019 |
Citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, v. 11464 LNCS, p. 486-506 How to Cite? |
Abstract | © Springer Nature Switzerland AG 2019. We revisit the problem of constructing public key encryption (PKE) secure against both key-leakage and tampering attacks. First, we present an enhanced security against both kinds of attacks, namely strong leakage and tamper-resilient chosen-ciphertext (sLTR-CCA) security, which imposes only minimal restrictions on the adversary’s queries and thus captures the capability of the adversary in a more reasonable way. Then, we propose a generic paradigm achieving this security on the basis of a refined hash proof system (HPS) called public-key-malleable HPS. The paradigm can not only tolerate a large amount of bounded key-leakage, but also resist an arbitrary polynomial of restricted tampering attacks, even depending on the challenge phase. Moreover, the paradigm with slight adaptations can also be proven sLTR-CCA secure with respect to subexponentially hard auxiliary-input leakage. In addition, we instantiate our paradigm under certain standard number-theoretic assumptions, and thus, to our best knowledge, obtain the first efficient PKE schemes possessing the strong bounded/auxiliary-input leakage and tamper-resilient chosen-ciphertext security in the standard model. |
Persistent Identifier | http://hdl.handle.net/10722/280497 |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sun, Shi Feng | - |
dc.contributor.author | Gu, Dawu | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Han, Shuai | - |
dc.contributor.author | Yu, Yu | - |
dc.contributor.author | Liu, Joseph | - |
dc.date.accessioned | 2020-02-17T14:34:10Z | - |
dc.date.available | 2020-02-17T14:34:10Z | - |
dc.date.issued | 2019 | - |
dc.identifier.citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, v. 11464 LNCS, p. 486-506 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280497 | - |
dc.description.abstract | © Springer Nature Switzerland AG 2019. We revisit the problem of constructing public key encryption (PKE) secure against both key-leakage and tampering attacks. First, we present an enhanced security against both kinds of attacks, namely strong leakage and tamper-resilient chosen-ciphertext (sLTR-CCA) security, which imposes only minimal restrictions on the adversary’s queries and thus captures the capability of the adversary in a more reasonable way. Then, we propose a generic paradigm achieving this security on the basis of a refined hash proof system (HPS) called public-key-malleable HPS. The paradigm can not only tolerate a large amount of bounded key-leakage, but also resist an arbitrary polynomial of restricted tampering attacks, even depending on the challenge phase. Moreover, the paradigm with slight adaptations can also be proven sLTR-CCA secure with respect to subexponentially hard auxiliary-input leakage. In addition, we instantiate our paradigm under certain standard number-theoretic assumptions, and thus, to our best knowledge, obtain the first efficient PKE schemes possessing the strong bounded/auxiliary-input leakage and tamper-resilient chosen-ciphertext security in the standard model. | - |
dc.language | eng | - |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.subject | Hash proof system | - |
dc.subject | Leakage attack | - |
dc.subject | Public key encryption | - |
dc.subject | Chosen-ciphertext security | - |
dc.subject | Tampering attack | - |
dc.title | Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/978-3-030-21568-2_24 | - |
dc.identifier.scopus | eid_2-s2.0-85067242402 | - |
dc.identifier.volume | 11464 LNCS | - |
dc.identifier.spage | 486 | - |
dc.identifier.epage | 506 | - |
dc.identifier.eissn | 1611-3349 | - |
dc.identifier.isi | WOS:000501602600024 | - |
dc.identifier.issnl | 0302-9743 | - |