Public-Key Encryption In The Standard Model Against Strong Leakage Adversary

Loading...
Thumbnail Image
File version

Accepted Manuscript (AM)

Author(s)
Alawatugoda, Janaka
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Date
2020
Size
File type(s)
Location
License
Abstract

Over the years, security against adaptively chosen-ciphertext attacks (CCA2) is considered as the strongest security definition for public-key encryption schemes. With the uprise of side-channel attacks, new security definitions are proposed, addressing leakage of secret keys together with the standard CCA2 definition. Among the new security definitions, security against continuous and after-the-fact leakage-resilient CCA2 can be considered as the strongest security definition, which is called as security against (continuous) adaptively chosen-ciphertext leakage attacks (continuous CCLA2). In this paper, we present a construction of a public-key encryption scheme, namely LR-PKE, which satisfies the aforementioned security definition. The security of our public-key encryption scheme is proven in the standard model, under decision BDH assumption. Thus, we emphasize that our public-key encryption scheme LR-PKE is (continuous) CCLA2-secure in the standard model. For our construction of LR-PKE, we have used a strong one-time signature scheme and a leakage-resilient refreshing protocol as underlying building blocks. The leakage bound is 0.15n log p-1 bits per leakage query, for a security parameter k and a statistical security parameter n, such that log p = k and n is a function of k. It is possible to see that LR-PKE is efficient enough to be used for real-world usage.

Journal Title

The Computer Journal

Conference Title
Book Title
Edition
Volume

63

Issue

12

Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement

© 2020 Oxford University Press. This is a pre-copy-editing, author-produced PDF of an article accepted for publication in Journal of Economic Entomology following peer review. The definitive publisher-authenticated version Public-Key Encryption In The Standard Model Against Strong Leakage Adversary, The Computer Journal, 63 (12), pp. 1904-1914, 2020, is available online at: https://doi.org/10.1093/comjnl/bxaa055

Item Access Status
Note
Access the data
Related item(s)
Subject

Cryptography

Science & Technology

Technology

Computer Science, Hardware & Architecture

Computer Science, Information Systems

Computer Science, Software Engineering

Persistent link to this record
Citation

Alawatugoda, J, Public-Key Encryption In The Standard Model Against Strong Leakage Adversary, The Computer Journal, 2020, 63 (12), pp. 1904-1914

Collections