Title: Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application

Authors: Chengyu Hu; Pengtao Liu; Shanqing Guo; Qiuliang Xu

Addresses: School of Computer Science and Technology, Shandong University, Jinan 250101, China ' School of Information, Shandong University of Political Science and Law, Jinan, 250014, China ' School of Computer Science and Technology, Shandong University, Jinan 250101, China ' School of Computer Science and Technology, Shandong University, Jinan 250101, China

Abstract: Hierarchical identity-based encryption can be used to protect the sensitive data in cloud system. However, as the traditional security model does not capture side-channel attacks, many hierarchical identity-based encryption schemes do not resist this kind of attack, which can exploit various forms of unintended information leakage. Inspired by these, leakage-resilience cryptography formalises some models of side-channel attacks. In this paper, we consider the memory leakage resilience in anonymous hierarchical identity-based encryption schemes. By applying Lewko et al.'s tools, we construct a master key leakage-resilient anonymous hierarchical identity-based encryption scheme based on dual system encryption techniques. As an interesting application of our scheme, we consider security for public-key encryption with multi-keyword ranked search (PEMKRS) in the presence of secret key leakage in the trapdoor generation algorithm, and provide a generic construction of leakage-resilient secure PEMKRS from a master key leakage-resilient anonymous hierarchical identity-based encryption scheme.

Keywords: side-channel attacks; leakage-resilient; anonymous hierarchical identity-based encryption; AHIBE; multi-keyword ranked search.

DOI: 10.1504/IJHPCN.2017.084251

International Journal of High Performance Computing and Networking, 2017 Vol.10 No.3, pp.226 - 239

Received: 25 Jul 2015
Accepted: 29 Sep 2015

Published online: 22 May 2017 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article