Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes
作者机构:School of Computer Science Shaanxi Normal University Xi'an 710119 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China School of Computer Science and Technology Wuhan University of Technology Wuhan 430070 China State Key Laboratory of Integrated Services Networks Xidian University Xi'an 710071 China
出 版 物:《Journal of Computer Science & Technology》 (计算机科学技术学报(英文版))
年 卷 期:2018年第33卷第6期
页 面:1243-1260页
核心收录:
学科分类:12[管理学] 1201[管理学-管理科学与工程(可授管理学、工学学位)] 0808[工学-电气工程] 08[工学] 0835[工学-软件工程] 0701[理学-数学] 0811[工学-控制科学与工程] 0812[工学-计算机科学与技术(可授工学、理学学位)]
基 金:This work was supported by the National Key Research and Development Program of China under Grant No. 2017YFt30802000 the National Natural Science Foundation of China under Grant Nos. 61802241 61772326 61572303 61872229 61802242 and 61602290 the National Natural Science Foundation of China for International Young Scientists under Grant No. 61750110528 the National Cryp-tographv Development Fund during the 13th Five-Year Plan Period of China under Grant Nos. MMJJ20170216 and MMJJ20180217 the Foundation of State Key Laboratory of Information Security of China under Grant No. 2017-MS-03 and the Fundamental Re- search Funds for the Central Universities of China under Grant Nos. GK201603084 GK201702004 GK201603092 GK201603093 and GK201703062
主 题:public-key encryption identity-based hash proof system lattice updatable leakage-resilience
摘 要:Identity-based hash proof system is a basic and important primitive. Ittographic schemes and protocols that are secure against key-leakage attacks. In thisupdatable identity-based hash proof system, in which the related master secret keyis widely utilized to construct cryp-paper, we introduce the concept ofand the identity secret key can beupdated securely. Then, we instantiate this primitive based on lattices in the standard model. Moreover, we introduce anapplication of this new primitive by giving a generic construction of leakage-resilient public-key encryption schemes withanonymity. This construction can be considered as the integration of the bounded-retrieval model and the continual leakagemodel. Compared with the existing leakage-resilient schemes, our construction not only is more efficient but also can resistmuch more key leakage.