2015
DOI: 10.1007/s12652-015-0329-0
|View full text |Cite
|
Sign up to set email alerts
|

Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs

Abstract: Public-key encryption (PKE) can be used in cloud system to protect data in data sharing, identity authentication, etc. However, the security model of traditional PKE does not capture the ''key-leakage attacks'' which can leak partial information about the secret key. Also, the adversary can inject fault to tamper with the secret key and observe the output of the public key encryption scheme under this modified key which is called ''related-key attack''. In this paper, we present a method to construct public ke… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 45 publications
0
1
0
Order By: Relevance
“…The eighth paper entitled ''Public Key Encryption Secure Against Related-key Attacks and Key-leakage Attacks from Extractable Hash Proofs'' by Hu et al (2015) proposed a method to construct the public key encryption schemes which is secure against both weak key-leakage attacks and affine related-key attacks directly from extractable hash proof systems. Specifically, the authors first added Key Homomorphism and Fingerprinting properties to all-but-one (ABO) extractable hash proofs, and then, constructed a key encapsulation mechanism (KEM) scheme for security against related-key attacks.…”
mentioning
confidence: 99%
“…The eighth paper entitled ''Public Key Encryption Secure Against Related-key Attacks and Key-leakage Attacks from Extractable Hash Proofs'' by Hu et al (2015) proposed a method to construct the public key encryption schemes which is secure against both weak key-leakage attacks and affine related-key attacks directly from extractable hash proof systems. Specifically, the authors first added Key Homomorphism and Fingerprinting properties to all-but-one (ABO) extractable hash proofs, and then, constructed a key encapsulation mechanism (KEM) scheme for security against related-key attacks.…”
mentioning
confidence: 99%