高级检索
    马海英, 曾国荪, 包志华, 陈建平, 王金华, 王占君. 抗连续辅助输入泄漏的属性基加密方案[J]. 计算机研究与发展, 2016, 53(8): 1867-1878. DOI: 10.7544/issn1000-1239.2016.20140787
    引用本文: 马海英, 曾国荪, 包志华, 陈建平, 王金华, 王占君. 抗连续辅助输入泄漏的属性基加密方案[J]. 计算机研究与发展, 2016, 53(8): 1867-1878. DOI: 10.7544/issn1000-1239.2016.20140787
    Ma Haiying, Zeng Guosun, Bao Zhihua, Chen Jianping, Wang Jinhua, Wang Zhanjun. Attribute-Based Encryption Scheme Resilient Against Continuous Auxiliary-Inputs Leakage[J]. Journal of Computer Research and Development, 2016, 53(8): 1867-1878. DOI: 10.7544/issn1000-1239.2016.20140787
    Citation: Ma Haiying, Zeng Guosun, Bao Zhihua, Chen Jianping, Wang Jinhua, Wang Zhanjun. Attribute-Based Encryption Scheme Resilient Against Continuous Auxiliary-Inputs Leakage[J]. Journal of Computer Research and Development, 2016, 53(8): 1867-1878. DOI: 10.7544/issn1000-1239.2016.20140787

    抗连续辅助输入泄漏的属性基加密方案

    Attribute-Based Encryption Scheme Resilient Against Continuous Auxiliary-Inputs Leakage

    • 摘要: 针对属性基加密(attribute-based encryption, ABE)机制中边信道攻击下的密钥泄漏问题,现有的解决方案仅允许密钥的有界泄漏. 将连续辅助输入泄漏模型和双系统加密相结合,通过合理设计主密钥和用户私钥的生成过程,提出了一种抗连续辅助输入泄漏的ABE方案. 基于合数阶群的子群判定假设和域GF(q)上Goldreich-Levin定理,在标准模型下,证明该方案在攻击者获知辅助输入密钥泄漏信息的情况下仍具有自适应安全性. 该方案实现了主密钥和用户私钥的连续无界泄漏,在密钥更新询问时无需假定旧密钥必须从内存中彻底清除,且具有较好的合成性质. 与相关的解决方案相比,该方案不仅具有最好的抗泄漏容忍性,而且具有较短的密钥长度.

       

      Abstract: For the leakage of secret keying material under side-channel attacks in attribute-based encryption, these existing solutions only allow attackers to get length-bounded leakage on the secret key. First of all, we combine the model of continuous auxiliary-inputs leakage with dual system encryption to achieve strong leakage resilience. Secondly, we reasonably design the generation of secret key to reduce its size, and then devise the first attribute-based encryption that remains secure even if the attacker can obtain the leakage of continuous auxiliary inputs. In the end, our scheme is proved fully secure in the standard model based on reasonable assumptions, even if the attacker gets the leakage of the secret key from an auxiliary-input function. Our scheme achieves the continuous and unbounded leakage of both the master key and the private key, and does not assume fully erasure of old secret keys during the key-update query. In addition, it has a desirable composition feature. Compared with relevant solutions, this scheme not only benefits the best leakage resilience, but also has shorter length of master keys and private keys.

       

    /

    返回文章
    返回