File Download
Supplementary
-
Citations:
- Appears in Collections:
postgraduate thesis: Practical public key encryption with continual leakage resilience
Title | Practical public key encryption with continual leakage resilience |
---|---|
Authors | |
Advisors | |
Issue Date | 2022 |
Publisher | The University of Hong Kong (Pokfulam, Hong Kong) |
Citation | Cai, C. [蔡彩玲]. (2022). Practical public key encryption with continual leakage resilience. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. |
Abstract | Public key encryption is an essential cryptographic primitive, which is usually used to confidentially convey messages under a public/insecure communication environment. Meanwhile, it is also a significant building block of various physical applications, such as storing private data over the cloud platform, performing private computations over different database, proving the transaction data over the blockchain, and so on. However, a public key encryption framework that follows the traditional and standard security definition will be broken by the side-channel attacks, because the adversary indeed could obtain some information of the internal secret state (e.g., the secret key). This thesis studies the constructions of public key encryption with continual leakage resilience under different security model.
Our first construction is about leakage-resilient signature (LR-Sig) schemes, in which the secret key can be leaked to the adversary information-theoretically. Apart from the leakage of the secret key, we also admit the leakage of the signing randomness. In particular, the public key and the ciphertext of our LR-Sig schemes remain the same as the original schemes. Thereby, our framework can be easily embedded in related applications, such as the LR-ECDSA over the blockchain. Meanwhile, our LR-Sig obtains the shortest signature-size, without involving any commitment scheme or non-zero knowledge proof. Besides, the secret key can be refreshed periodically, achieving the first LR-Sig that is resilient to the continual memory leakage with auxiliary inputs.
Our second construction is about leakage-resilient public key encryption (LR-PKE). We begin by devising a useful tool called hash proof system with auxiliary inputs $(\HPSAI)$. After that, via the $\HPSAI$, we derive the first LR-PKE with an optimal leakage ratio ($1-0(1)$) in the auxiliary input model, without using the pairing operations and composite order group. Moreover, our LR-PKE is secure against the chosen-ciphertext attack (CCA).
Our third construction is about leakage-resilient identity-based encryption (LR-IBE). The most important feature is that the security reduction is independent of the number of the challenge ciphertexts and users, deriving the first tight LR-IBE. Our CCA-secure LR-IBE not only allows the leakage of the secret key, but also the leakage of the master secret key, which is not achieved in most existing works. By updating both secret keys, we devise the first CCA-secure LR-IBE that is resilient to the continual memory leakage with the bound leakage model and the ciphertext size is a small constant. Furthermore, we obtain the first tightly CCA-secure LR-PKE with the unbounded leakage of the secret key during the life span of the public key. |
Degree | Doctor of Philosophy |
Subject | Public key cryptography Data encryption (Computer science) |
Dept/Program | Computer Science |
Persistent Identifier | http://hdl.handle.net/10722/332079 |
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Yuen, TH | - |
dc.contributor.advisor | Yiu, SM | - |
dc.contributor.author | Cai, Cailing | - |
dc.contributor.author | 蔡彩玲 | - |
dc.date.accessioned | 2023-09-29T04:40:23Z | - |
dc.date.available | 2023-09-29T04:40:23Z | - |
dc.date.issued | 2022 | - |
dc.identifier.citation | Cai, C. [蔡彩玲]. (2022). Practical public key encryption with continual leakage resilience. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. | - |
dc.identifier.uri | http://hdl.handle.net/10722/332079 | - |
dc.description.abstract | Public key encryption is an essential cryptographic primitive, which is usually used to confidentially convey messages under a public/insecure communication environment. Meanwhile, it is also a significant building block of various physical applications, such as storing private data over the cloud platform, performing private computations over different database, proving the transaction data over the blockchain, and so on. However, a public key encryption framework that follows the traditional and standard security definition will be broken by the side-channel attacks, because the adversary indeed could obtain some information of the internal secret state (e.g., the secret key). This thesis studies the constructions of public key encryption with continual leakage resilience under different security model. Our first construction is about leakage-resilient signature (LR-Sig) schemes, in which the secret key can be leaked to the adversary information-theoretically. Apart from the leakage of the secret key, we also admit the leakage of the signing randomness. In particular, the public key and the ciphertext of our LR-Sig schemes remain the same as the original schemes. Thereby, our framework can be easily embedded in related applications, such as the LR-ECDSA over the blockchain. Meanwhile, our LR-Sig obtains the shortest signature-size, without involving any commitment scheme or non-zero knowledge proof. Besides, the secret key can be refreshed periodically, achieving the first LR-Sig that is resilient to the continual memory leakage with auxiliary inputs. Our second construction is about leakage-resilient public key encryption (LR-PKE). We begin by devising a useful tool called hash proof system with auxiliary inputs $(\HPSAI)$. After that, via the $\HPSAI$, we derive the first LR-PKE with an optimal leakage ratio ($1-0(1)$) in the auxiliary input model, without using the pairing operations and composite order group. Moreover, our LR-PKE is secure against the chosen-ciphertext attack (CCA). Our third construction is about leakage-resilient identity-based encryption (LR-IBE). The most important feature is that the security reduction is independent of the number of the challenge ciphertexts and users, deriving the first tight LR-IBE. Our CCA-secure LR-IBE not only allows the leakage of the secret key, but also the leakage of the master secret key, which is not achieved in most existing works. By updating both secret keys, we devise the first CCA-secure LR-IBE that is resilient to the continual memory leakage with the bound leakage model and the ciphertext size is a small constant. Furthermore, we obtain the first tightly CCA-secure LR-PKE with the unbounded leakage of the secret key during the life span of the public key. | - |
dc.language | eng | - |
dc.publisher | The University of Hong Kong (Pokfulam, Hong Kong) | - |
dc.relation.ispartof | HKU Theses Online (HKUTO) | - |
dc.rights | The author retains all proprietary rights, (such as patent rights) and the right to use in future works. | - |
dc.rights | This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. | - |
dc.subject.lcsh | Public key cryptography | - |
dc.subject.lcsh | Data encryption (Computer science) | - |
dc.title | Practical public key encryption with continual leakage resilience | - |
dc.type | PG_Thesis | - |
dc.description.thesisname | Doctor of Philosophy | - |
dc.description.thesislevel | Doctoral | - |
dc.description.thesisdiscipline | Computer Science | - |
dc.description.nature | published_or_final_version | - |
dc.date.hkucongregation | 2022 | - |
dc.identifier.mmsid | 991044609100403414 | - |