A CCA-PKE Secure-Cryptosystem Resilient to Randomness Reset and Secret-Key Leakage
نویسندگان
چکیده
In recent years, several new notions of security have begun receiving consideration for public-key cryptosystems, beyond the standard against adaptive chosen ciphertext attack (CCA2). Among these are randomness reset attacks, in which used encryption is forcibly set to some previous value, and constant secret-key leakage wherein factor a secret key’s bits leaked. terms formal definitions, cast as games between challenger an adversary, joint combination attacks means that adversary has access additional queries under his own choosing along with queries. This implies both decryption processes cryptosystem being tampered this notion. paper, we attempt address problem through two cryptosystems incorporate hash proof system extractor primitives. The first relies on random oracle model secure class adversaries, called non-reversing adversaries. We remove assumption requirement our second cryptosystem, proposed primitive LM lossy functions. These functions allow up M branches collection substantially lose information, allowing use loss information challenge For each present detailed proofs using game-hopping procedure. addition, concrete instantation end paper—which DDH assumption.
منابع مشابه
A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE
A new hierarchical identity based (ID-based) cryptosystem is proposed, including hierarchical identity based encryption (HIBE) and signature (HIBS) schemes. The new HIBE scheme can be proved to be secure without relying on the random oracle model. Then, a new public key encryption (PKE) scheme is constructed based on the new HIBE. It is secure against adaptively chosen ciphertext attacks (IND-C...
متن کاملNew leakage-resilient CCA-secure public key encryption
This paper shows a generic method of constructing CCAsecure public key encryption schemes with leakage resilience on the secret key. It is based on a new kind of universal2 hash proof system which accepts an auxiliary parameter. Specifically, two schemes are presented, basing on the DCR assumption and DLIN assumption respectively.
متن کاملPost-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model
Leakage resilient cryptography is often considered in the presence of a very strong leakage oracle: An adversary may submit arbitrary efficiently computable function f to the leakage oracle to receive f (x), where x denotes the entire secret that a party possesses. This model is somewhat too strong in the setting of public-key encryption (PKE). It is known that no secret-key leakage resilient P...
متن کاملEfficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE
The goal of leakage-resilient cryptography is to construct cryptographic algorithms that are secure even if the adversary obtains side-channel information from the real world implementation of these algorithms. Most of the prior works on leakage-resilient cryptography consider leakage models where the adversary has access to the leakage oracle before the challenge-ciphertext is generated (befor...
متن کاملDefinition of Leakage-resilient Cca Encryption
Key Generation The challenger computes (pk, sk) ← Gen(1λ) and give pk to A. Test 1: The adversaryA (adaptively) submits decryption queries Ci and getsmi = Dsk(Ci). The adversary also (adaptviely) submits leakage queries fj : {0, 1} ∗ → {0, 1}lj and gets fj(sk). Challenge: The adversary A comes up with two message m0, m1. The challenger chooses a random bit b ← {0, 1} and gives A the value C∗ = ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cryptography
سال: 2022
ISSN: ['2410-387X']
DOI: https://doi.org/10.3390/cryptography6010002