RKA-secure public key encryptions against efficiently invertible functions

Shi-Feng Sun, Joseph K. Liu, Yu Yu, Baodong Qin, Dawu Gu

    Research output: Contribution to journalArticleResearchpeer-review

    Abstract

    Related-key attacks (RKAs) are a flavor of powerful physical attacks, which allow an adversary to modify the secret key stored in a cryptographic device and subsequently observe the effect of such modifications on the output of the device. Designing secure encryption schemes against such attacks is a challenging task, especially for a large class of such physical attacks which are usually captured by related-key derivation functions. In this work, we achieve the security of public key encryptions (PKEs) against a new and broad function class that consists of almost all efficiently invertible functions in two different ways. Specifically, we first give a generic construction of PKE which is proven secure against such a broad function class under the standard chosen-ciphertext security. Moreover, we present two practical concrete constructions, both of which are shown to be secure against such function class under standard assumptions in the standard model. At last, we give a detailed performance analysis, which shows that our constructions can not only resist to a large class of RKAs but also achieve a good efficiency.
    Original languageEnglish
    Pages (from-to)1637-1658
    Number of pages22
    JournalComputer Journal
    Volume59
    Issue number11
    DOIs
    Publication statusPublished - 2016

    Keywords

    • Related-key attack
    • Chosen-ciphertext security
    • Public key encryption

    Cite this

    Sun, Shi-Feng ; Liu, Joseph K. ; Yu, Yu ; Qin, Baodong ; Gu, Dawu. / RKA-secure public key encryptions against efficiently invertible functions. In: Computer Journal. 2016 ; Vol. 59, No. 11. pp. 1637-1658.
    @article{d073582032df448d991620b61088c6d1,
    title = "RKA-secure public key encryptions against efficiently invertible functions",
    abstract = "Related-key attacks (RKAs) are a flavor of powerful physical attacks, which allow an adversary to modify the secret key stored in a cryptographic device and subsequently observe the effect of such modifications on the output of the device. Designing secure encryption schemes against such attacks is a challenging task, especially for a large class of such physical attacks which are usually captured by related-key derivation functions. In this work, we achieve the security of public key encryptions (PKEs) against a new and broad function class that consists of almost all efficiently invertible functions in two different ways. Specifically, we first give a generic construction of PKE which is proven secure against such a broad function class under the standard chosen-ciphertext security. Moreover, we present two practical concrete constructions, both of which are shown to be secure against such function class under standard assumptions in the standard model. At last, we give a detailed performance analysis, which shows that our constructions can not only resist to a large class of RKAs but also achieve a good efficiency.",
    keywords = "Related-key attack, Chosen-ciphertext security, Public key encryption",
    author = "Shi-Feng Sun and Liu, {Joseph K.} and Yu Yu and Baodong Qin and Dawu Gu",
    year = "2016",
    doi = "10.1093/comjnl/bxw025",
    language = "English",
    volume = "59",
    pages = "1637--1658",
    journal = "Computer Journal",
    issn = "0010-4620",
    publisher = "Oxford University Press",
    number = "11",

    }

    RKA-secure public key encryptions against efficiently invertible functions. / Sun, Shi-Feng; Liu, Joseph K.; Yu, Yu; Qin, Baodong; Gu, Dawu.

    In: Computer Journal, Vol. 59, No. 11, 2016, p. 1637-1658.

    Research output: Contribution to journalArticleResearchpeer-review

    TY - JOUR

    T1 - RKA-secure public key encryptions against efficiently invertible functions

    AU - Sun, Shi-Feng

    AU - Liu, Joseph K.

    AU - Yu, Yu

    AU - Qin, Baodong

    AU - Gu, Dawu

    PY - 2016

    Y1 - 2016

    N2 - Related-key attacks (RKAs) are a flavor of powerful physical attacks, which allow an adversary to modify the secret key stored in a cryptographic device and subsequently observe the effect of such modifications on the output of the device. Designing secure encryption schemes against such attacks is a challenging task, especially for a large class of such physical attacks which are usually captured by related-key derivation functions. In this work, we achieve the security of public key encryptions (PKEs) against a new and broad function class that consists of almost all efficiently invertible functions in two different ways. Specifically, we first give a generic construction of PKE which is proven secure against such a broad function class under the standard chosen-ciphertext security. Moreover, we present two practical concrete constructions, both of which are shown to be secure against such function class under standard assumptions in the standard model. At last, we give a detailed performance analysis, which shows that our constructions can not only resist to a large class of RKAs but also achieve a good efficiency.

    AB - Related-key attacks (RKAs) are a flavor of powerful physical attacks, which allow an adversary to modify the secret key stored in a cryptographic device and subsequently observe the effect of such modifications on the output of the device. Designing secure encryption schemes against such attacks is a challenging task, especially for a large class of such physical attacks which are usually captured by related-key derivation functions. In this work, we achieve the security of public key encryptions (PKEs) against a new and broad function class that consists of almost all efficiently invertible functions in two different ways. Specifically, we first give a generic construction of PKE which is proven secure against such a broad function class under the standard chosen-ciphertext security. Moreover, we present two practical concrete constructions, both of which are shown to be secure against such function class under standard assumptions in the standard model. At last, we give a detailed performance analysis, which shows that our constructions can not only resist to a large class of RKAs but also achieve a good efficiency.

    KW - Related-key attack

    KW - Chosen-ciphertext security

    KW - Public key encryption

    UR - http://www.scopus.com/inward/record.url?scp=85016028762&partnerID=8YFLogxK

    U2 - 10.1093/comjnl/bxw025

    DO - 10.1093/comjnl/bxw025

    M3 - Article

    VL - 59

    SP - 1637

    EP - 1658

    JO - Computer Journal

    JF - Computer Journal

    SN - 0010-4620

    IS - 11

    ER -