2016
DOI: 10.1093/comjnl/bxv128
|View full text |Cite
|
Sign up to set email alerts
|

A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme

Abstract: Identity-based encryption (IBE) has many appealing applications. However, some traditional IBE schemes may not be secure in the real world due to the side-channel attacks. Leakage-resilient cryptography can capture these attacks by modeling information leakage that adversary can access. In this paper, we apply a hash proof technique in the existing CCA-secure variant of the Gentry's IBE scheme to construct a new leakage-resilient IBE scheme in the bounded-leakage model. The proposed scheme is more computationa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
36
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 57 publications
(38 citation statements)
references
References 35 publications
0
36
0
Order By: Relevance
“…Apart from all other constructions, the scheme in Lewko et al listed in the above tables supports CPA security and enjoys additional property under subgroup decision (SD) assumptions. The scheme of Li et al supports CCA security under decisional q ‐augmented bilinear Diffie‐Hellman exponent ( q ‐ABDHE) assumption.…”
Section: Ibe Resilient Continual Leakagementioning
confidence: 93%
See 3 more Smart Citations
“…Apart from all other constructions, the scheme in Lewko et al listed in the above tables supports CPA security and enjoys additional property under subgroup decision (SD) assumptions. The scheme of Li et al supports CCA security under decisional q ‐augmented bilinear Diffie‐Hellman exponent ( q ‐ABDHE) assumption.…”
Section: Ibe Resilient Continual Leakagementioning
confidence: 93%
“…The scheme in Wang and Yiu does not perform the algorithm of bilinear group during calculating encryption cost and decryption cost, but it has a bigger ciphertext size than our scheme. The scheme in Li et al has lower public key size and decryption cost, whereas ours has lower ciphertext size and encryption cost. In addition, not all of the schemes support the continuous leakage–resilient property.…”
Section: Ibe Resilient Continual Leakagementioning
confidence: 99%
See 2 more Smart Citations
“…However, the first identity-based encryption (IBE) construction was put forward in the literature [23] until 2001. Subsequently, many IBE schemes were proposed [24,25]. By leveraging the idea of IBE, Delerablée [26] raised identity-based broadcast encryption (IBBE), which can be deemed as a special type of PKBE.…”
Section: Introductionmentioning
confidence: 99%