首页> 外文期刊>International Journal of Embedded Systems >Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption
【24h】

Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption

机译:弱泄漏弹性可提取哈希算法和用于弱泄漏弹性CCA安全公钥加密的构造

获取原文
获取原文并翻译 | 示例
           

摘要

Public-key encryption can be used in cloud systems to protect data in data sharing, identity authentication, etc. However, traditional public-key encryption does not capture the side-channel attacks. Inspired by this, the model of key-leakage attacks is formalised. However, constructing schemes in this model seems somewhat difficult and most key-leakage attacks in reality may be weak. In this paper, we consider the model of weak key-leakage attacks and focus on how to construct a weak leakage-resilient CCA-secure key encapsulation scheme. To this end, we present the new definitions of weak leakage-resilient extractable hash proofs and weak leakage-resilient partial ABO-extractable hash proofs and propose generic transformations to construct them from extractable hash proof. Then we show how to derive a weak leakage-resilient CCA-secure key encapsulation scheme based on them. We also give a concrete instantiation in a group of prime order and design an experiment to show the leakage-resilience in reality.
机译:可以在云系统中使用公钥加密来保护数据共享,身份验证等数据。但是,传统的公钥加密无法捕获边信道攻击。受此启发,密钥泄漏攻击模型得以形式化。但是,在此模型中构造方案似乎有些困难,并且现实中大多数密钥泄漏攻击可能都很弱。在本文中,我们考虑了弱密钥泄漏攻击的模型,并着重于如何构建一种弱泄漏-弹性CCA-安全密钥封装方案。为此,我们提出了弱防漏弹性可提取哈希证明和弱防漏弹性部分ABO可提取哈希证明的新定义,并提出了通用变换以从可提取哈希证明构造它们。然后,我们展示了如何基于它们来推导弱防漏回弹性CCA安全密钥封装方案。我们还以一组素数顺序给出了具体的实例,并设计了一个实验来显示实际的泄漏弹性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号