Public key encryption resilient to leakage and tampering attacks
作者:
Highlights:
• Formalize LTR-CCA security w.r.t. both bounded-memory and auxiliary-input leakage.
• Introduce the notion of KH-HPS, and present a generic construction of LTR-CCA PKE.
• Get the 1st PKE secure against both auxiliary-input leakage and tampering attacks.
• Give several instantiations based on some standard number-theoretical assumptions.
摘要
•Formalize LTR-CCA security w.r.t. both bounded-memory and auxiliary-input leakage.•Introduce the notion of KH-HPS, and present a generic construction of LTR-CCA PKE.•Get the 1st PKE secure against both auxiliary-input leakage and tampering attacks.•Give several instantiations based on some standard number-theoretical assumptions.
论文关键词:Public key encryption,Hash proof system,Chosen-ciphertext security,Key-leakage attack,Tampering attack
论文评审过程:Received 14 November 2015, Revised 13 September 2016, Accepted 1 March 2017, Available online 26 April 2017, Version of Record 7 August 2017.
论文官网地址:https://doi.org/10.1016/j.jcss.2017.03.004