Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System

Shi Feng Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu, Joseph Liu

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

Abstract

We revisit the problem of constructing public key encryption (PKE) secure against both key-leakage and tampering attacks. First, we present an enhanced security against both kinds of attacks, namely strong leakage and tamper-resilient chosen-ciphertext (sLTR-CCA) security, which imposes only minimal restrictions on the adversary’s queries and thus captures the capability of the adversary in a more reasonable way. Then, we propose a generic paradigm achieving this security on the basis of a refined hash proof system (HPS) called public-key-malleable HPS. The paradigm can not only tolerate a large amount of bounded key-leakage, but also resist an arbitrary polynomial of restricted tampering attacks, even depending on the challenge phase. Moreover, the paradigm with slight adaptations can also be proven sLTR-CCA secure with respect to subexponentially hard auxiliary-input leakage. In addition, we instantiate our paradigm under certain standard number-theoretic assumptions, and thus, to our best knowledge, obtain the first efficient PKE schemes possessing the strong bounded/auxiliary-input leakage and tamper-resilient chosen-ciphertext security in the standard model.

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security - 17th International Conference, ACNS 2019, Proceedings
EditorsValérie Gauthier-Umaña, Robert H. Deng, Moti Yung, Martín Ochoa
PublisherSpringer Verlag
Pages486-506
Number of pages21
ISBN (Print)9783030215675
DOIs
Publication statusPublished - 2019
Event17th International Conference on Applied Cryptography and Network Security, ACNS 2019 - Bogota, Colombia
Duration: 5 Jun 20197 Jun 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11464 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference17th International Conference on Applied Cryptography and Network Security, ACNS 2019
Country/TerritoryColombia
CityBogota
Period5/06/197/06/19

Keywords

  • Chosen-ciphertext security
  • Hash proof system
  • Leakage attack
  • Public key encryption
  • Tampering attack

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System'. Together they form a unique fingerprint.

Cite this