Abstract
In recent years, much attention has been focused on designing provably secure cryptographic primitives in the presence of key leakage. Many constructions of leakage-resilient cryptographic primitives have been proposed. However, for any polynomial time adversary, most existing leakage-resilient cryptographic primitives cannot ensure that their outputs are random, and any polynomial time adversary can obtain a certain amount of leakage on the secret key from the corresponding output of a cryptographic primitive. In this study, to achieve better performance, a new construction of a chosen ciphertext attack 2 (CCA2) secure, leakage-resilient, and certificateless public-key encryption scheme is proposed, whose security is proved based on the hardness of the classic decisional Diffie-Hellman assumption. According to our analysis, our method can tolerate leakage attacks on the private key. This method also achieves better performance because polynomial time adversaries cannot achieve leakage on the private key from the corresponding ciphertext, and a key leakage ratio of 1/2 can be achieved. Because of these good features, our method may be significant in practical applications.
Similar content being viewed by others
References
Akavia A, Goldwasser S, Vaikuntanathan V, 2009. Simultaneous hardcore bits and cryptography against memory attacks. 6th Theory of Cryptography Conf, p.474–495. https://doi.org/10.1007/978-3-642-00457-5_28
Al-Riyami SS, Paterson KG, 2003. Certificateless public key cryptography. 9th Int Conf on the Theory and Application of Cryptology and Information Security, p.452–473. https://doi.org/10.1007/978-3-540-40061-5_29
Alwen J, Dodis Y, Wichs D, 2009. Leakage-resilient publickey cryptography in the bounded-retrieval model. 29th Annual Int Conf on Advances in Cryptology, p.36–54. https://doi.org/10.1007/978-3-642-03356-8_3
Chen R, Mu Y, Yang G, et al., 2016a. Strong authenticated key exchange with auxiliary inputs. Des Cod Crypt, 85(1):145–173. https://doi.org/10.1007/s10623-016-0295-3
Chen R, Mu Y, Yang G, et al., 2016b. Strongly leakageresilient authenticated key exchange. Cryptographers’ Track at the RSA Conf, p.19–36. https://doi.org/10.1007/978-3-319-29485-8_2
Cramer R, Shoup V, 2003. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J Comput, 33(1):167–226. https://doi.org/10.1137/S0097539702403773
Dodis Y, Ostrovsky R, Reyzin L, et al., 2008. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J Comput, 38(1):97–139. https://doi.org/10.1137/060651380
Li J, Teng M, Zhang Y, et al., 2016. A leakage-resilient CCA-secure identity-based encryption scheme. Comput J, 59(7):1066–1075. https://doi.org/10.1093/comjnl/bxv128
Li S, Zhang F, Sun Y, et al., 2013. Efficient leakage-resilient public key encryption from DDH assumption. Clust Comput, 16(4):797–806. https://doi.org/10.1007/s10586-013-0253-z
Liu S, Weng J, Zhao Y, 2013. Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks. Cryptographers’ Track at the RSA Conf, p.84–100. https://doi.org/10.1007/978-3-642-36095-4_6
Naor M, Segev G, 2012. Public-key cryptosystems resilient to key leakage. SIAM J Comput, 41(4):772–814. https://doi.org/10.1137/100813464
Qin B, Liu S, Chen K, 2015. Efficient chosen-ciphertext secure public-key encryption scheme with high leakageresilience. IET Inform Secur, 9(1):32–42. https://doi.org/10.1049/iet-ifs.2013.0173
Shamir A, 1984. Identity-based cryptosystems and signature schemes. Workshop on the Theory and Application of Cryptographic Techniques, p.47–53. https://doi.org/10.1007/3-540-39568-7_5
Xiong H, Yuen T, ZHANG C, et al., 2013. Leakage-resilient certificateless public key encryption. Proc 1st ACM Workshop on Asia Public-Key Cryptography, p.13–22. https://doi.org/10.1145/2484389.2484394
Yu Q, Li J, Zhanga Y, et al., 2016. Certificate-based encryption resilient to key leakage. J Syst Softw, 116:101–102. https://doi.org/10.1016/j.jss.2015.05.066
Zhou Y, Yang B, Zhang W, 2016. Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing. Disc Appl Math, 204:185–202. https://doi.org/10.1016/j.dam.2015.10.018
Author information
Authors and Affiliations
Corresponding author
Additional information
Project supported by the National Key R&D Program of China (No. 2017YFB0802000), the National Natural Science Foundation of China (Nos. 61572303 and 61772326), the National Cryptography Development Fund During the 13th Five-Year Plan Period, China (No. MMJJ20170216), the Foundation of State Key Laboratory of Information Security, China (No. 2017-MS-03), and the Fundamental Research Funds for the Central Universities, China (No. GK201803064)
Rights and permissions
About this article
Cite this article
Zhou, Yw., Yang, B., Cheng, H. et al. Aleakage-resilient certificateless public key encryption scheme with CCA2 security. Frontiers Inf Technol Electronic Eng 19, 481–493 (2018). https://doi.org/10.1631/FITEE.1601849
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1631/FITEE.1601849
Key words
- Certificateless public-key encryption
- Leakage-resilience
- Provable security
- CCA2 security
- Decisional Diffie-Hellman