Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption
by Chengyu Hu; Zuoxia Yu; Rupeng Yang; Qiuliang Xu; Yongbin Zhou; Qixia Yuan
International Journal of Embedded Systems (IJES), Vol. 7, No. 3/4, 2015

Abstract: Public-key encryption can be used in cloud systems to protect data in data sharing, identity authentication, etc. However, traditional public-key encryption does not capture the side-channel attacks. Inspired by this, the model of key-leakage attacks is formalised. However, constructing schemes in this model seems somewhat difficult and most key-leakage attacks in reality may be weak. In this paper, we consider the model of weak key-leakage attacks and focus on how to construct a weak leakage-resilient CCA-secure key encapsulation scheme. To this end, we present the new definitions of weak leakage-resilient extractable hash proofs and weak leakage-resilient partial ABO-extractable hash proofs and propose generic transformations to construct them from extractable hash proof. Then we show how to derive a weak leakage-resilient CCA-secure key encapsulation scheme based on them. We also give a concrete instantiation in a group of prime order and design an experiment to show the leakage-resilience in reality.

Online publication date: Sun, 11-Oct-2015

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Embedded Systems (IJES):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com