【24h】

Updatable Encryption with Post-Compromise Security

机译:具有后危害安全性的可更新加密

获取原文

摘要

An updatable encryption scheme allows to periodically rotate the encryption key and move already existing ciphertexts from the old to the new key. These ciphertext updates are done with the help of a so-called update token and cam be performed by an untrusted party, as the update never decrypts the data. Updatable encryption is particularly useful in settings where encrypted data is outsourced, e.g., stored on a cloud server. The data owner can produce an update token, and the cloud server can update the ciphertexts. We provide a comprehensive treatment of ciphertext-independent schemes, where a single token is used to update all ciphertexts. We show that the existing ciphertext-independent schemes and models by Boneh et al. (CRYPTOT3) and Everspaugh et al. (CRYPTOT7) do not guarantee the post-compromise security one would intuitively expect from key rotation. In fact, the simple scheme recently proposed by Everspaugh et al. allows to recover the current key upon corruption of a single old key. Surprisingly, none of the models so far reflects the timely aspect of key rotation which makes it hard to grasp when an adversary is allowed to corrupt keys. We propose strong security models that clearly capture post-compromise and forward security under adaptive attacks. We then analyze various existing schemes and show that none of them is secure in this strong model, but we formulate the additional constraints that suffice to prove their security in a relaxed version of our model. Finally, we propose a new updatable encryption scheme that achieves our strong notions while being (at least) as efficient as the existing solutions.
机译:可更新的加密方案允许定期旋转加密密钥,并将已经存在的密文从旧密钥移动到新密钥。这些密文更新是在所谓的更新令牌的帮助下完成的,并且可以由不受信任的一方执行,因为该更新永远不会解密数据。在将加密数据外包(例如存储在云服务器上)的设置中,可更新加密特别有用。数据所有者可以产生更新令牌,而云服务器可以更新密文。我们提供了与密文无关的方案的全面处理,其中单个令牌用于更新所有密文。我们证明了Boneh等人现有的与密文无关的方案和模型。 (CRYPTOT3)和Everspaugh等人。 (CRYPTOT7)不能保证人们可以从密钥轮换中直观地期望到折衷后的安全性。实际上,Everspaugh等人最近提出了一种简单的方案。允许在单个旧密钥损坏时恢复当前密钥。令人惊讶的是,到目前为止,没有一个模型能够反映出密钥轮换的及时性,这使得当对手被允许破坏密钥时很难把握。我们提出了强大的安全模型,该模型可以清晰地捕获自适应攻击下的后期安全漏洞和转发安全漏洞。然后,我们分析了各种现有方案,并表明在这种强大的模型中没有一种方案是安全的,但是我们制定了额外的约束条件,这些约束条件足以在模型的简化版本中证明其安全性。最后,我们提出了一种新的可更新的加密方案,该方案在达到(至少)与现有解决方案一样高效的同时,实现了我们的强项理念。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号