We found a match
Your institution may have access to this item. Find your institution then sign in to continue.
- Title
Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage.
- Authors
Li, Jiguo; Guo, Yuyan; Yu, Qihong; Lu, Yang; Zhang, Yichen
- Abstract
The situation for post-challenge continuous auxiliary input leakage has not been considered in the cryptography schemes for previous literature. We present a semantic-security model with post-challenge continuous auxiliary inputs for identity-based encryption. In this model, the adversary is permitted to obtain some information of the private keys constantly and to query more information after seeing the challenge ciphertext through the side-channel attacks. Furthermore, we present an identity-based encryption scheme resilient to leakage under composite order groups. Our scheme is secure against post-challenge continuous auxiliary input, adaptive chosen-identity, and adaptive chosen plaintext attacks under three static assumptions in the standard model. Compared with existing identity-based encryption schemes under security properties and performance, our scheme is practical. Copyright © 2015 John Wiley & Sons, Ltd.
- Subjects
CRYPTOGRAPHY research; SEMANTICS research; DATA encryption; DATA security; CYBERTERRORISM
- Publication
Security & Communication Networks, 2016, Vol 9, Issue 10, p1016
- ISSN
1939-0114
- Publication type
Article
- DOI
10.1002/sec.1396