Fully secure wicked identity-based encryption against key leakage attacks

Shi-Feng Sun, Dawu Gu, Zhengan Huang

Research output: Contribution to journalArticleResearchpeer-review

11 Citations (Scopus)


With the purpose of taking physical attacks into account in security proofs, leakage-resilient cryptography has been initiated. Recently, many leakage-resilient cryptographic primitives have been proposed. In this paper, we put forward the first leakage-resilient wicked identity-based encryption (wicked IBE) scheme. To achieve this goal, we first present a new wicked IBE scheme in the composite order groups. The security proof of this scheme is achieved via the dual system encryption technique. In contrast with existing wicked IBE schemes, the new proposal can be proved fully secure in the standard model, even when the maximum hierarchy depth is a polynomial in the security parameter. Moreover, its security is based on some standard assumptions in the composite groups, which are independent of the hierarchy depth of the scheme. Based on this newly proposed scheme, we then put forward a fully secure leakage-resilient wicked IBE scheme in the bounded memory-leakage model. The leakage here is not only allowed on the user's secret key, but also on the master secret key. Its security is proved in the standard model by a hybrid argument in a sequence of computationally indistinguishable games. To the best of our knowledge, this is the first wicked IBE scheme in the context of leakage resilience.

Original languageEnglish
Pages (from-to)2520-2536
Number of pages17
JournalThe Computer Journal
Issue number10
Publication statusPublished - Oct 2015
Externally publishedYes


  • dual system encryption
  • full security
  • leakage resilience
  • side-channel attack
  • wicked identity-based encryption

Cite this