版权所有:内蒙古大学图书馆 技术提供:维普资讯• 智图
内蒙古自治区呼和浩特市赛罕区大学西街235号 邮编: 010021
作者机构:Shaanxi Normal Univ Sch Comp Sci Xian Peoples R China State Key Lab Cryptol POB 5159 Beijing Peoples R China Wuhan Univ Technol Sch Comp Sci Wuhan Peoples R China Guilin Univ Elect Technol Sch Comp Sci & Informat Secur Guilin Peoples R China Fujian Normal Univ Fujian Prov Key Lab Network Secur & Cryptol Fujian Peoples R China
出 版 物:《THEORETICAL COMPUTER SCIENCE》 (理论计算机科学)
年 卷 期:2020年第809卷
页 面:277-295页
核心收录:
学科分类:08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)]
基 金:National Key R&D Program of China [2017YFB0802000] National Natural Science Foundation of China [61802242, 61572303, 61772326, 61802241, 61702259, 61602290] Natural Science Basic Research Plan in Shaanxi Province of China [2018JQ6088] National Cryptography Development Foundation during the 13th Fiveyear Plan Period [MMJJ20180217] Fundamental Research Funds for the Central Universities [GK202003068]
主 题:Identity-based encryption Leakage resilience Generic construction Identity-based hash proof system CCA security
摘 要:Alwen et al. (EUROCRYPT 2010) proposed the formal definition of identity-based hash proof system (IB-HPS). As an independent interest, they showed that a leakage-resilient identity-based encryption (LR-IBE) scheme can be created based on an IB-HPS. That is, a generic construction of LR-IBE scheme with the chosen-plaintext attacks (CPA) security be designed from the IB-HPS. However, in order to further improve the practicability of identity-based encryption (IBE) system, an IBE scheme must have the chosen-ciphertext attacks (CCA) security. Hence, in this paper, a generic construction of LR-IBE scheme with the CCA security is proposed from the IB-HPS. In additional, to design an LR-IBE schemes with an arbitrarily length leakage parameter, we design a novel generic construction of leakage amplified IBE scheme with CCA security, where we only increase the size of private key proportionally, while do not change all other parameters, and the upper bound of permitted leakage can be flexibly controlled by changing the leakage-size parameter. In other words, the length of allowed leakage of our generic construction is determined by the leakage requirements of actual applications. (C) 2019 Published by Elsevier B.V.