Key leakage-resilient secure cryptosystem with hierarchical wildcard pattern delegation

Ming Wu Zhang, Chun Zhi Wang, Bo Yang, Tsuyoshi Takagi

Research output: Contribution to journalArticle

Abstract

In the traditional cryptosystems, secret keys are perfectly hidden for any possible attackers and only the cryptographic algorithms and public parameters are public. However, in practical applications, the attacker can obtain partial information about the matched decryption key from the noise channels or by the side-channel attacks. This study proposes a leakage-resilient hierarchical wildcard pattern encryption in which a user is associated with a wildcard identity pattern. A secret key is derived for a vector of identity strings where entries can be left blank using a wildcard, and this key can then be used to derive keys for any pattern that replaces wildcards with concrete identities. The scheme supports the wildcard pattern key delegation, which is considered as a general extension of leakage-resilient hierarchical IBE (identity-based encryption) and HVE (hidden vector encryption). Moreover, the proposed scheme can tolerate partial key leakage, and the scheme is proven to be leakage-resilient and semantically secure in the standard model under the subgroup decision assumptions.

Original languageEnglish
Pages (from-to)1196-1212
Number of pages17
JournalRuan Jian Xue Bao/Journal of Software
Volume26
Issue number5
DOIs
Publication statusPublished - Jan 1 2015

Fingerprint

Cryptography
Concretes

All Science Journal Classification (ASJC) codes

  • Software

Cite this

Key leakage-resilient secure cryptosystem with hierarchical wildcard pattern delegation. / Zhang, Ming Wu; Wang, Chun Zhi; Yang, Bo; Takagi, Tsuyoshi.

In: Ruan Jian Xue Bao/Journal of Software, Vol. 26, No. 5, 01.01.2015, p. 1196-1212.

Research output: Contribution to journalArticle

Zhang, Ming Wu ; Wang, Chun Zhi ; Yang, Bo ; Takagi, Tsuyoshi. / Key leakage-resilient secure cryptosystem with hierarchical wildcard pattern delegation. In: Ruan Jian Xue Bao/Journal of Software. 2015 ; Vol. 26, No. 5. pp. 1196-1212.
@article{e3b9f0cb4f8f44d18be7cdb61b2e283e,
title = "Key leakage-resilient secure cryptosystem with hierarchical wildcard pattern delegation",
abstract = "In the traditional cryptosystems, secret keys are perfectly hidden for any possible attackers and only the cryptographic algorithms and public parameters are public. However, in practical applications, the attacker can obtain partial information about the matched decryption key from the noise channels or by the side-channel attacks. This study proposes a leakage-resilient hierarchical wildcard pattern encryption in which a user is associated with a wildcard identity pattern. A secret key is derived for a vector of identity strings where entries can be left blank using a wildcard, and this key can then be used to derive keys for any pattern that replaces wildcards with concrete identities. The scheme supports the wildcard pattern key delegation, which is considered as a general extension of leakage-resilient hierarchical IBE (identity-based encryption) and HVE (hidden vector encryption). Moreover, the proposed scheme can tolerate partial key leakage, and the scheme is proven to be leakage-resilient and semantically secure in the standard model under the subgroup decision assumptions.",
author = "Zhang, {Ming Wu} and Wang, {Chun Zhi} and Bo Yang and Tsuyoshi Takagi",
year = "2015",
month = "1",
day = "1",
doi = "10.13328/j.cnki.jos.004693",
language = "English",
volume = "26",
pages = "1196--1212",
journal = "Ruan Jian Xue Bao/Journal of Software",
issn = "1000-9825",
publisher = "Chinese Academy of Sciences",
number = "5",

}

TY - JOUR

T1 - Key leakage-resilient secure cryptosystem with hierarchical wildcard pattern delegation

AU - Zhang, Ming Wu

AU - Wang, Chun Zhi

AU - Yang, Bo

AU - Takagi, Tsuyoshi

PY - 2015/1/1

Y1 - 2015/1/1

N2 - In the traditional cryptosystems, secret keys are perfectly hidden for any possible attackers and only the cryptographic algorithms and public parameters are public. However, in practical applications, the attacker can obtain partial information about the matched decryption key from the noise channels or by the side-channel attacks. This study proposes a leakage-resilient hierarchical wildcard pattern encryption in which a user is associated with a wildcard identity pattern. A secret key is derived for a vector of identity strings where entries can be left blank using a wildcard, and this key can then be used to derive keys for any pattern that replaces wildcards with concrete identities. The scheme supports the wildcard pattern key delegation, which is considered as a general extension of leakage-resilient hierarchical IBE (identity-based encryption) and HVE (hidden vector encryption). Moreover, the proposed scheme can tolerate partial key leakage, and the scheme is proven to be leakage-resilient and semantically secure in the standard model under the subgroup decision assumptions.

AB - In the traditional cryptosystems, secret keys are perfectly hidden for any possible attackers and only the cryptographic algorithms and public parameters are public. However, in practical applications, the attacker can obtain partial information about the matched decryption key from the noise channels or by the side-channel attacks. This study proposes a leakage-resilient hierarchical wildcard pattern encryption in which a user is associated with a wildcard identity pattern. A secret key is derived for a vector of identity strings where entries can be left blank using a wildcard, and this key can then be used to derive keys for any pattern that replaces wildcards with concrete identities. The scheme supports the wildcard pattern key delegation, which is considered as a general extension of leakage-resilient hierarchical IBE (identity-based encryption) and HVE (hidden vector encryption). Moreover, the proposed scheme can tolerate partial key leakage, and the scheme is proven to be leakage-resilient and semantically secure in the standard model under the subgroup decision assumptions.

UR - http://www.scopus.com/inward/record.url?scp=84930064153&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84930064153&partnerID=8YFLogxK

U2 - 10.13328/j.cnki.jos.004693

DO - 10.13328/j.cnki.jos.004693

M3 - Article

VL - 26

SP - 1196

EP - 1212

JO - Ruan Jian Xue Bao/Journal of Software

JF - Ruan Jian Xue Bao/Journal of Software

SN - 1000-9825

IS - 5

ER -