ISSN 1000-1239 CN 11-1777/TP

计算机研究与发展 ›› 2016, Vol. 53 ›› Issue (8): 1867-1878.doi: 10.7544/issn1000-1239.2016.20140787

• 人工智能 • 上一篇    下一篇



  1. 1(南通大学计算机科学与技术学院 江苏南通 226019); 2(同济大学计算机科学与技术系 上海 201804); 3(南通大学电子信息学院 江苏南通 226019); 4(南通大学理学院 江苏南通 226019) (
  • 出版日期: 2016-08-01
  • 基金资助: 

Attribute-Based Encryption Scheme Resilient Against Continuous Auxiliary-Inputs Leakage

Ma Haiying1, Zeng Guosun2, Bao Zhihua3, Chen Jianping1, Wang Jinhua4,Wang Zhanjun4   

  1. 1(School of Computer Science and Technology, Nantong University, Nantong, Jiangsu 226019);2(Department of Computer Science and Technology, Tongji University, Shanghai 201804);3(School of Electronics and Information, Nantong University, Nantong, Jiangsu 226019);4(School of Science, Nantong University, Nantong, Jiangsu 226019)
  • Online: 2016-08-01

摘要: 针对属性基加密(attribute-based encryption, ABE)机制中边信道攻击下的密钥泄漏问题,现有的解决方案仅允许密钥的有界泄漏. 将连续辅助输入泄漏模型和双系统加密相结合,通过合理设计主密钥和用户私钥的生成过程,提出了一种抗连续辅助输入泄漏的ABE方案. 基于合数阶群的子群判定假设和域GF(q)上Goldreich-Levin定理,在标准模型下,证明该方案在攻击者获知辅助输入密钥泄漏信息的情况下仍具有自适应安全性. 该方案实现了主密钥和用户私钥的连续无界泄漏,在密钥更新询问时无需假定旧密钥必须从内存中彻底清除,且具有较好的合成性质. 与相关的解决方案相比,该方案不仅具有最好的抗泄漏容忍性,而且具有较短的密钥长度.

关键词: 属性基加密, 连续辅助输入泄漏, 双系统加密, Goldreich-Levin定理, 可证明安全性

Abstract: For the leakage of secret keying material under side-channel attacks in attribute-based encryption, these existing solutions only allow attackers to get length-bounded leakage on the secret key. First of all, we combine the model of continuous auxiliary-inputs leakage with dual system encryption to achieve strong leakage resilience. Secondly, we reasonably design the generation of secret key to reduce its size, and then devise the first attribute-based encryption that remains secure even if the attacker can obtain the leakage of continuous auxiliary inputs. In the end, our scheme is proved fully secure in the standard model based on reasonable assumptions, even if the attacker gets the leakage of the secret key from an auxiliary-input function. Our scheme achieves the continuous and unbounded leakage of both the master key and the private key, and does not assume fully erasure of old secret keys during the key-update query. In addition, it has a desirable composition feature. Compared with relevant solutions, this scheme not only benefits the best leakage resilience, but also has shorter length of master keys and private keys.

Key words: attribute-based encryption, continuous auxiliary-inputs leakages, dual system encryption, Goldreich-Levin theorem, provable security