2020
DOI: 10.1109/ojcs.2020.3008961
|View full text |Cite
|
Sign up to set email alerts
|

Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage

Abstract: In the past, the security of most public-key encryption or key encapsulation schemes is shown in an ideal model, where private keys, secret keys and random values are assumed to be absolutely secure to adversaries. However, this ideal model is not practical due to side-channel attacks in the sense that adversaries could gain partial information of these secret values involved in decryption operations by perceiving energy consumption or execution timing. In such a case, these schemes under the ideal model could… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 43 publications
(81 reference statements)
0
3
0
Order By: Relevance
“…The CA uses its own secret key CSK to compute the member's certificate CTF m using the member ID m 's identity information and public key, and returns it back to the member ID m . By combining the adversary models of both the LR certificate-based signature (LR-CBS) scheme (Wu et al, 2019) and the LR certificate-based encryption (LR-CBE) scheme (Wu et al, 2020a), we define the adversary model of the FCLR-CBSC scheme. In this adversary model, there are two types of adversaries that include an uncertified member and the honest-but-curious CA.…”
Section: Contributionsmentioning
confidence: 99%
See 2 more Smart Citations
“…The CA uses its own secret key CSK to compute the member's certificate CTF m using the member ID m 's identity information and public key, and returns it back to the member ID m . By combining the adversary models of both the LR certificate-based signature (LR-CBS) scheme (Wu et al, 2019) and the LR certificate-based encryption (LR-CBE) scheme (Wu et al, 2020a), we define the adversary model of the FCLR-CBSC scheme. In this adversary model, there are two types of adversaries that include an uncertified member and the honest-but-curious CA.…”
Section: Contributionsmentioning
confidence: 99%
“…Based on the frameworks of both the LR-CBS (Wu et al, 2019) and the LR-CBE (Wu et al, 2020a) schemes, a new framework of FCLR-CBSC schemes is defined as follows.…”
Section: Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…To remove the key escrow problem, certificate-based public key system (CB-PKS) was proposed by Gentry [8], which not only eliminates the key escrow problem in the ID-PKS, but also avoids the construction of PKI in traditional public key systems. Based on the CB-PKS, a large number of certificate-based encryption (CBE) schemes have been published in the literature [7,9,19,25,29,30] to protect the confidentiality of private data. Research related to CBE continues to be explored to this day.…”
Section: Introductionmentioning
confidence: 99%
“…To the best of our knowledge, there is no related work on equality test of ciphertexts in the CB-PKS. Table 1 lists the comparisons between the PKE scheme [31], the PKEET scheme [6], IBE scheme [23], IBEET scheme [13], CBE scheme [25] and our CBEET scheme in terms of public key setting, eliminating PKI construction, avoiding key escrow problem and possessing equality test property. After comparing with other existing schemes, we attempt to propose the first CBEET scheme that provides the equality test of ciphertexts in the CB-PKS.…”
Section: Introductionmentioning
confidence: 99%