Font Size: a A A

Identity-Based Encryption Scheme Resilient To Adaptive Leakage

Posted on:2013-05-01Degree:MasterType:Thesis
Country:ChinaCandidate:J H TangFull Text:PDF
GTID:2248330371494131Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Since the middle of the1990s, the leakage attack, which makes use of the physicalcharacteristics of the cryptographic chip, has drawn much attention both at home andabroad. In order to deal with the leakage attack, cryptographers proposed leakage-resilientcryptographic algorithms. At present, the research of IBE algorithm against adaptiveleakage is still in its initial stage both at home and abroad, high level researchachievements has not yet been published. In allusion to this problem, we have thefollowing research results:ⅰ. We analyze and research the leakage-resilient cryptographic algorithms. Introducethe development process and the latest research results, of which the important theory andthe core model are discussed. We give the classification of leakage-resilient cryptographicalgorithms according to different standards, from which the research hotspot and openproblems are excavated, and feasible solutions to these problems are sought.ⅱ. In allusion to the problem that IBE scheme resilient to adaptive leakage waslacked in the BML model, a notion of entropic leakage-resilient was used to define thesecurity against adaptive leakage in IBE. Then propose an adaptive-leakage secure IBEscheme. And for instantiation, an IBE scheme against adaptive leakage based onq-TABDHE assumption was constructed. Security analysis shows that the scheme achieveschosen-plaintext attack security, and it can not only resist adaptive leakage effectively, butalso tolerate more key leakage.ⅲ. We verify whether the IBE scheme resilient to adaptive leakage in the BML modelcan be applied to higher layer protocol to get full semantic security. We define the semanticsecurity against adaptive leakage in a split-state model. Then based on the entropic secureIBE scheme we constructed before, we construct an IBE scheme in a split-state model inthe presence of adaptive leakage. And using the technology of games sequences, we prove the IBE scheme is semantic secure. Moreover, instantiations and parameters are analyzed.ⅳ. We research the IBE scheme resilient to adaptive leakage in the CML model, andprove that an IBE scheme which not only can resist the adaptive leakage, but also allow theleakage of master key and identity key is existed. We define the security against adaptiveleakage in the CML model. Then introduce an IBE scheme resilient to adaptive leakage inthe CML model. Using the technology of games sequences, we prove the security of ourscheme, and the key leakage rate is analyzed.
Keywords/Search Tags:resilient to adaptive leakage, identity-based encryption, BML model, split-state model, CML model
PDF Full Text Request
Related items