2011
DOI: 10.1007/978-3-642-19571-6_6
|View full text |Cite
|
Sign up to set email alerts
|

Achieving Leakage Resilience through Dual System Encryption

Abstract: In this work, we show that strong leakage resilience for cryptosystems with advanced functionalities can be obtained quite naturally within the methodology of dual system encryption, recently introduced by Waters. We demonstrate this concretely by providing fully secure IBE, HIBE, and ABE systems which are resilient to bounded leakage from each of many secret keys per user, as well as many master keys. This can be realized as resilience against continual leakage if we assume keys are periodically updated and n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
129
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 120 publications
(129 citation statements)
references
References 68 publications
0
129
0
Order By: Relevance
“…It was further developed in several subsequent works [27,25,33,26,29,28]. Most of these works have used composite order groups as a convenient setting for instantiating the dual system methodology, with the exception of [33].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…It was further developed in several subsequent works [27,25,33,26,29,28]. Most of these works have used composite order groups as a convenient setting for instantiating the dual system methodology, with the exception of [33].…”
Section: Related Workmentioning
confidence: 99%
“…For example, the systems presented in [27,25,29,28,26] provide diverse and advanced functionalities like identity-based encryption (IBE), hierarchical identity-based encryption (HIBE), and attribute-based encryption with strong security guarantees (e.g. full security, leakage-resilience) proven from static assumptions.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…1 The CML model is indeed a very powerful model since it allows the attacker to potentially learn unbounded leakage on the system's secret memory. In addition to constructions of randomized PKE mentioned above, leakage-resilient schemes for several tasks in a variety of leakage models are now known, e.g., digital signatures [LW10,BSW11,LLW11], identity-based encryption [BKKV10,CDRW10,LRW11], interactive proofs [GJS11,Pan14,AGP14], secure computation [FRR + 10, BGJK12,GR12], and so on. We remark that the study of leakage-resilient cryptography was initiated in [DP08,MR04,ISW03] as an attempt to provide an algorithmic defense against side-channel attacks [Koc96,AK97,QS01,OST06].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the number of bits leaked between updates is still restricted. secure with auxiliary input, even though there are a number of (bounded) leakageresilient IBE schemes [1,2,8,6,13]. A distinctive feature of IBE is that any string can be used as a public key and potentially an exponential number of identities can be supported.…”
Section: Introductionmentioning
confidence: 99%