Related-key secure key encapsulation from extended computational bilinear Diffie–Hellman

Baodong Qin, Shengli Liu, Shifeng Sun, Robert H. Deng, Dawu Gu

Research output: Contribution to journalArticleResearchpeer-review

Abstract

As a special type of fault injection attacks, Related-Key Attacks (RKAs) allow an adversary to manipulate a cryptographic key and subsequently observe the outcomes of the cryptographic scheme under these modified keys. In the real life, related-key attacks are already practical enough to be implemented on cryptographic devices. To avoid cryptographic devices suffering from related-key attacks, it is necessary to design a cryptographic scheme that resists against such attacks. This paper proposes an efficient RKA-secure Key Encapsulation Mechanism (KEM), in which the adversary can modify the secret key sk to any value f(sk), as long as, f is a polynomial function of a bounded degree d. Especially, the polynomial-RKA security can be reduced to a hard search problem, namely d-extended computational Bilinear Diffie-Hellman (BDH) problem, in the standard model. Our construction essentially refines the security of Haralambiev et al.’s BDH-based KEM scheme from chosen-ciphertext security to related-key security. The main technique applied in our scheme is the re-computation of the public key in the decryption algorithm so that any (non-trivial) modification to the secret key can be detected.

Original languageEnglish
Pages (from-to)1-11
Number of pages11
JournalInformation Sciences
Volume406-407
DOIs
Publication statusPublished - 1 Sep 2017
Externally publishedYes

Keywords

  • BDH
  • Key-encapsulation mechanism
  • Related-key attacks

Cite this