Title: Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption

Authors: Chengyu Hu; Zuoxia Yu; Rupeng Yang; Qiuliang Xu; Yongbin Zhou; Qixia Yuan

Addresses: School of Computer Science and Technology, Shandong University, Jinan 250101, China ' School of Computer Science and Technology, Shandong University, Jinan 250101, China ' School of Computer Science and Technology, Shandong University, Jinan 250101, China ' School of Computer Science and Technology, Shandong University, Jinan 250101, China ' State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China ' Computer Science and Communications, University of Luxembourg, Luxembourg L-1359, Luxembourg

Abstract: Public-key encryption can be used in cloud systems to protect data in data sharing, identity authentication, etc. However, traditional public-key encryption does not capture the side-channel attacks. Inspired by this, the model of key-leakage attacks is formalised. However, constructing schemes in this model seems somewhat difficult and most key-leakage attacks in reality may be weak. In this paper, we consider the model of weak key-leakage attacks and focus on how to construct a weak leakage-resilient CCA-secure key encapsulation scheme. To this end, we present the new definitions of weak leakage-resilient extractable hash proofs and weak leakage-resilient partial ABO-extractable hash proofs and propose generic transformations to construct them from extractable hash proof. Then we show how to derive a weak leakage-resilient CCA-secure key encapsulation scheme based on them. We also give a concrete instantiation in a group of prime order and design an experiment to show the leakage-resilience in reality.

Keywords: side-channel attacks; weak leakage resilience; extractable hash proof; key encapsulation; CCA; security; public key encryption; cryptography; cloud computing; key leakage attacks; chosen ciphertext attack; cryptanalysis.

DOI: 10.1504/IJES.2015.072367

International Journal of Embedded Systems, 2015 Vol.7 No.3/4, pp.216 - 229

Received: 15 Jul 2014
Accepted: 24 Sep 2014

Published online: 11 Oct 2015 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article