首页> 外文会议>IEEE International Conference on Awareness Science and Technology >Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments
【24h】

Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments

机译:基于泄漏的基于证书的IOT环境加密方案

获取原文
获取外文期刊封面目录资料

摘要

Now, Internet of Things (IoT) brings people innovative experiences and applications through connectivity of numerous computing devices. In these applications, computing devices generate and exchange a large number of critical and sensitive data. Typically, these computing devices are putted on some unprotected environments that make them to be attractive attack targets while easily suffering from a new kind of threat, called "side-channel attacks". By side-channel attacks, an adversary could obtain partial information of secret values (or internal states) stored in these devices by observing execution timing or energy consumption. However, most adversary models of previous cryptographic schemes/protocols do not concern with such side-channel attacks. Indeed, leakage-resilient cryptography is a flexible solution for resisting to side-channel attacks. So far, little work focuses on the design of leakage-resilient certificate-based encryption (LR-CBE) schemes. In the article, we propose the first LR-CBE scheme resilient to continuous key leakage of user's private keys, system secret key and random values. In the generic bilinear group model, security analysis is given to show that the proposed LR-CBE scheme is provably secure against chosen cipher-text attacks under the continual leakage model. Performance evaluation is made to demonstrate that our scheme is suitable for embedded devices.
机译:现在,事物互联网(IOT)通过许多计算设备的连接带来了人们的创新体验和应用。在这些应用中,计算设备生成并交换大量临界和敏感的数据。通常,这些计算设备被推出在一些未受保护的环境中,使它们成为有吸引力的攻击目标,同时容易遭受一种被称为“侧通道攻击”的新类型威胁。通过侧通道攻击,对手可以通过观察执行定时或能量消耗来获得存储在这些设备中的秘密值(或内部状态)的部分信息。然而,先前加密方案/协议的大多数逆模型都不关心这种侧通道攻击。实际上,泄漏 - 弹性加密是一种抗侧通道攻击的灵活解决方案。到目前为止,很少的工作侧重于漏燃器基于证书的加密(LR-CBE)方案的设计。在文章中,我们提出了第一个LR-CBE方案弹性,以连续键泄漏用户的私钥,系统密钥和随机值。在通用双线性组模型中,给出了安全分析,表明所提出的LR-CBE方案在连续泄漏模型下可以针对所选的密码攻击来确保安全。进行性能评估,以证明我们的方案适用于嵌入式设备。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号