ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2016, Vol. 53 ›› Issue (8): 1867-1878.doi: 10.7544/issn1000-1239.2016.20140787

Previous Articles     Next Articles

Attribute-Based Encryption Scheme Resilient Against Continuous Auxiliary-Inputs Leakage

Ma Haiying1, Zeng Guosun2, Bao Zhihua3, Chen Jianping1, Wang Jinhua4,Wang Zhanjun4   

  1. 1(School of Computer Science and Technology, Nantong University, Nantong, Jiangsu 226019);2(Department of Computer Science and Technology, Tongji University, Shanghai 201804);3(School of Electronics and Information, Nantong University, Nantong, Jiangsu 226019);4(School of Science, Nantong University, Nantong, Jiangsu 226019)
  • Online:2016-08-01

Abstract: For the leakage of secret keying material under side-channel attacks in attribute-based encryption, these existing solutions only allow attackers to get length-bounded leakage on the secret key. First of all, we combine the model of continuous auxiliary-inputs leakage with dual system encryption to achieve strong leakage resilience. Secondly, we reasonably design the generation of secret key to reduce its size, and then devise the first attribute-based encryption that remains secure even if the attacker can obtain the leakage of continuous auxiliary inputs. In the end, our scheme is proved fully secure in the standard model based on reasonable assumptions, even if the attacker gets the leakage of the secret key from an auxiliary-input function. Our scheme achieves the continuous and unbounded leakage of both the master key and the private key, and does not assume fully erasure of old secret keys during the key-update query. In addition, it has a desirable composition feature. Compared with relevant solutions, this scheme not only benefits the best leakage resilience, but also has shorter length of master keys and private keys.

Key words: attribute-based encryption, continuous auxiliary-inputs leakages, dual system encryption, Goldreich-Levin theorem, provable security

CLC Number: