Public key encryption resilient to leakage and tampering attacks

作者:

Highlights:

• Formalize LTR-CCA security w.r.t. both bounded-memory and auxiliary-input leakage.

• Introduce the notion of KH-HPS, and present a generic construction of LTR-CCA PKE.

• Get the 1st PKE secure against both auxiliary-input leakage and tampering attacks.

• Give several instantiations based on some standard number-theoretical assumptions.

摘要

•Formalize LTR-CCA security w.r.t. both bounded-memory and auxiliary-input leakage.•Introduce the notion of KH-HPS, and present a generic construction of LTR-CCA PKE.•Get the 1st PKE secure against both auxiliary-input leakage and tampering attacks.•Give several instantiations based on some standard number-theoretical assumptions.

论文关键词:Public key encryption,Hash proof system,Chosen-ciphertext security,Key-leakage attack,Tampering attack

论文评审过程:Received 14 November 2015, Revised 13 September 2016, Accepted 1 March 2017, Available online 26 April 2017, Version of Record 7 August 2017.

论文官网地址:https://doi.org/10.1016/j.jcss.2017.03.004