A new construction of leakage-resilient CCA secure IBE scheme
نویسندگان
چکیده
منابع مشابه
New leakage-resilient CCA-secure public key encryption
This paper shows a generic method of constructing CCAsecure public key encryption schemes with leakage resilience on the secret key. It is based on a new kind of universal2 hash proof system which accepts an auxiliary parameter. Specifically, two schemes are presented, basing on the DCR assumption and DLIN assumption respectively.
متن کاملA New Leakage-Resilient IBE Scheme in the Relative Leakage Model
We propose the first leakage-resilient Identity-Based Encryption (IBE) scheme with full domain hash structure. Our scheme is leakageresilient in the relative leakage model and the random oracle model under the decisional bilinear Diffie-Hellman (DBDH) assumption.
متن کاملLeakage Resilient IBE and IPE schemes
We construct identity-based encryption (IBE) and inner product encryption (IPE) schemes under the decision linear (DLIN) or symmetric external Diffie-Hellman (SXDH) assumptions. Their private user keys are leakage-resilient in several scenarios. In particular, • In the bounded memory leakage model (Akavia et al., TCC ’09), our basic schemes reach the maximum-possible leakage rate 1− o(1). • In ...
متن کاملDefinition of Leakage-resilient Cca Encryption
Key Generation The challenger computes (pk, sk) ← Gen(1λ) and give pk to A. Test 1: The adversaryA (adaptively) submits decryption queries Ci and getsmi = Dsk(Ci). The adversary also (adaptviely) submits leakage queries fj : {0, 1} ∗ → {0, 1}lj and gets fj(sk). Challenge: The adversary A comes up with two message m0, m1. The challenger chooses a random bit b ← {0, 1} and gives A the value C∗ = ...
متن کاملLeakage Resilient IBE and IPE under the DLIN Assumption
In this paper, we show identity-based encryption (IBE) and inner product encryption (IPE) schemes which achieve the maximum-possible leakage rate 1 − o(1). These schemes are secure under the decision linear (DLIN) assumption in the standard model. Specifically, even if 1− o(1) fraction of each private key is arbitrarily leaked, the IBE scheme is fully secure and the IPE scheme is selectively se...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SCIENTIA SINICA Informationis
سال: 2021
ISSN: 1674-7267
DOI: 10.1360/ssi-2020-0001