Font Size: a A A

Research On Leakage Resilient Certificate-based Encryption Scheme

Posted on:2022-11-29Degree:MasterType:Thesis
Country:ChinaCandidate:J DongFull Text:PDF
GTID:2518306779984909Subject:Automation Technology
Abstract/Summary:PDF Full Text Request
Certificate-based encryption scheme is a significant branch of public key encryption.Certificate-based encryption schemes use certificate authorities and issue certificates to users.Users can decrypt ciphertext only by using the private key and the latest certificate.Certificate-based encryption scheme solves the key escrow and key distribution problems existing in identity-based encryption scheme,solves the third-party query and certificate management problems in traditional public key encryption.Therefore,the research of certificate-based encryption scheme has significant theoretical and practical significance.This paper studies certificate-based encryption schemes,mainly including:(1)Most certificate-based encryption schemes do not consider side channel attack.Once side channel attack is suffered,there may be key leakage problem.As to this problem,a continuous leakage security model is formalized as well as a certificate-based encryption scheme against continuous leakage is proposed.Then,in the standard model,based on the decision truncated and q-augmented bilinear Diffie-Hellman exponent problem and the decision 1-bilinear Diffie-Hellman inversion problem,the proposed scheme is proved to be suitable for adaptive selective ciphertext attack.Finally,the performance of the scheme is analyzed.(2)Aiming at most key leakage problems of certificate-based broadcast encryption,come up with a certificate-based broadcast encryption scheme against continuous leakage.In the standard model,based on the decision truncation q-ABDHE problem and the decision 1-BDHI problem,it is proved that the proposed scheme is suitable for adaptive selective ciphertext attack.Eventually,The scheme is compared with other schemes and its performance is analyzed.
Keywords/Search Tags:Certificate-based encryption scheme, Certificate-based broadcast encryption scheme, Continuous leakage, Side channel attack, Standard model
PDF Full Text Request
Related items