Leakage-Resilient Functional Encryption via Pair Encodings

Leakage-resilient cryptography is proposed to address physical attacks on real world crypto-systems. Dual system encryption methodology is developed to guide design and analysis of various functional encryption schemes (FEs) with adaptive security. Observ

  • PDF / 348,946 Bytes
  • 18 Pages / 439.37 x 666.142 pts Page_size
  • 21 Downloads / 240 Views

DOWNLOAD

REPORT


3

Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Hong Kong [email protected], [email protected] 2 School of Computer Science and Technology, Shandong University, Jinan 250101, China [email protected], [email protected] Jiangsu Provincial Key Laboratory of E-Business, Nanjing University of Finance and Economics, Nanjing 210003, China [email protected] 4 State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China

Abstract. Leakage-resilient cryptography is proposed to address physical attacks on real world crypto-systems. Dual system encryption methodology is developed to guide design and analysis of various functional encryption schemes (FEs) with adaptive security. Observing the compatibility of dual system methodology and leakage-resilience, Lewko et al. present constructions of a number of strong leakage-resilient functional encryptions. In particular, they present fully secure identity-based encryption (IBE), hierarchical IBE (HIBE) and attribute-based encryption (ABE) satisfying the continual memory leakage (CML) model, one of the strongest models that allows continuous leakage on both user and master secret keys. Inspired by the recent work from Attrapadung on pair encodings which greatly simplifies the design and analysis of FE, we propose a generic framework for constructing fully secure FEs in the CML model (LR-FEs). Specifically, our framework “compiles” predicate encodings into fully secure LR-FEs in a two-step process. Firstly, we propose a generic transformation of pair encoding schemes into their leakageresilient forms. Next, we present another conversion that turns leakageresilient pair encodings into fully secure LR-FEs. Our framework is highly compatible with Attrapadung’s, meaning that it is applicable to many existing pair encoding schemes. The contribution of this paper is threefold. Firstly, our framework simplifies the design and analysis of LR-FEs into the design and analysis of predicate encodings. Secondly, our framework allows us to improve the security of some existing LR-FEs, such as LR-IBE with a tighter reduction. Thirdly, we discover new adaptively secure LR-FEs, including FE for regular languages, ABE for large universe and ABE with short ciphertext. c Springer International Publishing Switzerland 2016  J.K. Liu and R. Steinfeld (Eds.): ACISP 2016, Part I, LNCS 9722, pp. 443–460, 2016. DOI: 10.1007/978-3-319-40253-6 27

444

1

Z. Yu et al.

Introduction

Leakage-Resilient Cryptography. Traditionally, security of a cryptographic scheme relies on the secrecy of its secret states. In practice, however, state information could be revealed from measurements of the physical attributes of the device on which the cryptographic system is deployed. Attacks based on this extra information, such as timing attacks [19], power attacks [18], cold-boot attacks [16], etc., are grouped under the umbrella term of side-channel attacks. Leakage-resilient cryptography was developed to address si