Fully secure wicked identity-based encryption against key leakage attacks

Shi-Feng Sun, Dawu Gu, Zhengan Huang

Research output: Contribution to journalArticleResearchpeer-review

Abstract

With the purpose of taking physical attacks into account in security proofs, leakage-resilient cryptography has been initiated. Recently, many leakage-resilient cryptographic primitives have been proposed. In this paper, we put forward the first leakage-resilient wicked identity-based encryption (wicked IBE) scheme. To achieve this goal, we first present a new wicked IBE scheme in the composite order groups. The security proof of this scheme is achieved via the dual system encryption technique. In contrast with existing wicked IBE schemes, the new proposal can be proved fully secure in the standard model, even when the maximum hierarchy depth is a polynomial in the security parameter. Moreover, its security is based on some standard assumptions in the composite groups, which are independent of the hierarchy depth of the scheme. Based on this newly proposed scheme, we then put forward a fully secure leakage-resilient wicked IBE scheme in the bounded memory-leakage model. The leakage here is not only allowed on the user's secret key, but also on the master secret key. Its security is proved in the standard model by a hybrid argument in a sequence of computationally indistinguishable games. To the best of our knowledge, this is the first wicked IBE scheme in the context of leakage resilience.

Original languageEnglish
Pages (from-to)2520-2536
Number of pages17
JournalComputer Journal
Volume58
Issue number10
DOIs
Publication statusPublished - Oct 2015
Externally publishedYes

Keywords

  • dual system encryption
  • full security
  • leakage resilience
  • side-channel attack
  • wicked identity-based encryption

Cite this

Sun, Shi-Feng ; Gu, Dawu ; Huang, Zhengan. / Fully secure wicked identity-based encryption against key leakage attacks. In: Computer Journal. 2015 ; Vol. 58, No. 10. pp. 2520-2536.
@article{f345b70101bf4c658dea3c0115b6833f,
title = "Fully secure wicked identity-based encryption against key leakage attacks",
abstract = "With the purpose of taking physical attacks into account in security proofs, leakage-resilient cryptography has been initiated. Recently, many leakage-resilient cryptographic primitives have been proposed. In this paper, we put forward the first leakage-resilient wicked identity-based encryption (wicked IBE) scheme. To achieve this goal, we first present a new wicked IBE scheme in the composite order groups. The security proof of this scheme is achieved via the dual system encryption technique. In contrast with existing wicked IBE schemes, the new proposal can be proved fully secure in the standard model, even when the maximum hierarchy depth is a polynomial in the security parameter. Moreover, its security is based on some standard assumptions in the composite groups, which are independent of the hierarchy depth of the scheme. Based on this newly proposed scheme, we then put forward a fully secure leakage-resilient wicked IBE scheme in the bounded memory-leakage model. The leakage here is not only allowed on the user's secret key, but also on the master secret key. Its security is proved in the standard model by a hybrid argument in a sequence of computationally indistinguishable games. To the best of our knowledge, this is the first wicked IBE scheme in the context of leakage resilience.",
keywords = "dual system encryption, full security, leakage resilience, side-channel attack, wicked identity-based encryption",
author = "Shi-Feng Sun and Dawu Gu and Zhengan Huang",
year = "2015",
month = "10",
doi = "10.1093/comjnl/bxu110",
language = "English",
volume = "58",
pages = "2520--2536",
journal = "Computer Journal",
issn = "0010-4620",
publisher = "Oxford University Press",
number = "10",

}

Fully secure wicked identity-based encryption against key leakage attacks. / Sun, Shi-Feng; Gu, Dawu; Huang, Zhengan.

In: Computer Journal, Vol. 58, No. 10, 10.2015, p. 2520-2536.

Research output: Contribution to journalArticleResearchpeer-review

TY - JOUR

T1 - Fully secure wicked identity-based encryption against key leakage attacks

AU - Sun, Shi-Feng

AU - Gu, Dawu

AU - Huang, Zhengan

PY - 2015/10

Y1 - 2015/10

N2 - With the purpose of taking physical attacks into account in security proofs, leakage-resilient cryptography has been initiated. Recently, many leakage-resilient cryptographic primitives have been proposed. In this paper, we put forward the first leakage-resilient wicked identity-based encryption (wicked IBE) scheme. To achieve this goal, we first present a new wicked IBE scheme in the composite order groups. The security proof of this scheme is achieved via the dual system encryption technique. In contrast with existing wicked IBE schemes, the new proposal can be proved fully secure in the standard model, even when the maximum hierarchy depth is a polynomial in the security parameter. Moreover, its security is based on some standard assumptions in the composite groups, which are independent of the hierarchy depth of the scheme. Based on this newly proposed scheme, we then put forward a fully secure leakage-resilient wicked IBE scheme in the bounded memory-leakage model. The leakage here is not only allowed on the user's secret key, but also on the master secret key. Its security is proved in the standard model by a hybrid argument in a sequence of computationally indistinguishable games. To the best of our knowledge, this is the first wicked IBE scheme in the context of leakage resilience.

AB - With the purpose of taking physical attacks into account in security proofs, leakage-resilient cryptography has been initiated. Recently, many leakage-resilient cryptographic primitives have been proposed. In this paper, we put forward the first leakage-resilient wicked identity-based encryption (wicked IBE) scheme. To achieve this goal, we first present a new wicked IBE scheme in the composite order groups. The security proof of this scheme is achieved via the dual system encryption technique. In contrast with existing wicked IBE schemes, the new proposal can be proved fully secure in the standard model, even when the maximum hierarchy depth is a polynomial in the security parameter. Moreover, its security is based on some standard assumptions in the composite groups, which are independent of the hierarchy depth of the scheme. Based on this newly proposed scheme, we then put forward a fully secure leakage-resilient wicked IBE scheme in the bounded memory-leakage model. The leakage here is not only allowed on the user's secret key, but also on the master secret key. Its security is proved in the standard model by a hybrid argument in a sequence of computationally indistinguishable games. To the best of our knowledge, this is the first wicked IBE scheme in the context of leakage resilience.

KW - dual system encryption

KW - full security

KW - leakage resilience

KW - side-channel attack

KW - wicked identity-based encryption

UR - http://www.scopus.com/inward/record.url?scp=84943410900&partnerID=8YFLogxK

U2 - 10.1093/comjnl/bxu110

DO - 10.1093/comjnl/bxu110

M3 - Article

VL - 58

SP - 2520

EP - 2536

JO - Computer Journal

JF - Computer Journal

SN - 0010-4620

IS - 10

ER -