Public‐key encryption with keyword search secure against continual memory attacks
Continual memory attacks, inspired by recent realistic physical attacks, have broken many cryptographic schemes that were considered secure in traditional cryptography model. In this paper, we consider the continual memory leakage resilience in public‐key encryption with keyword search scheme (PEKS)...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2016-07, Vol.9 (11), p.1613-1629 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1629 |
---|---|
container_issue | 11 |
container_start_page | 1613 |
container_title | Security and communication networks |
container_volume | 9 |
creator | Hu, Chengyu Yang, Rupeng Liu, Pengtao Yu, Zuoxia Zhou, Yongbin Xu, Qiuliang |
description | Continual memory attacks, inspired by recent realistic physical attacks, have broken many cryptographic schemes that were considered secure in traditional cryptography model. In this paper, we consider the continual memory leakage resilience in public‐key encryption with keyword search scheme (PEKS). We give the definition of continual memory leakage resilience security for PEKS, which allows continual secret key leakage in the trapdoor generation algorithm rather than leakage of trapdoor itself. We believe that the definition is more suitable for practical PEKS scenario. To construct a concrete PEKS scheme secure against continual memory attacks, we firstly obtain a continual master‐key leakage‐resilient anonymous identity‐based encryption (IBE) scheme by applying the generic tool provided by Lewko et al. to a fully secure anonymous IBE scheme that comes from the fully secure anonymous hierarchical identity‐based encryption (HIBE) scheme of De Caro and colleagues. Then, we transform our continual master‐key leakage‐resilient anonymous IBE scheme to a PEKS scheme using the generic Anonymous IBE‐to‐PEKS transformation and prove its continual leakage‐resilient security. Copyright © 2016 John Wiley & Sons, Ltd.
In this paper, we propose a method of constructing public‐key encryption with keyword search scheme (PEKS) secure against continual memory attacks which allow the adversary to continually obtain secret key leakage in the trapdoor generation algorithm. Our method applies identity‐based encryption(IBE)‐to‐PEKS transformation to a master‐key leakage‐resilient anonymous IBE scheme. Also, we give a concrete master‐key leakage‐resilient anonymous IBE scheme which can be used to construct a concrete PEKS scheme secure against continual memory attacks. |
doi_str_mv | 10.1002/sec.1451 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1825499330</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1825499330</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3261-17f8717a9e716099e3ababb3c7be4e101e5b3612460f780d57335c2cd3cec58d3</originalsourceid><addsrcrecordid>eNp1kM1Kw0AUhQdRsFbBRxhw4yZ17kySySyl1B8oKFTXw2RyY9Pmp84klOx8BJ_RJzG1oiC4OofLx-HyEXIObAKM8SuPdgJhBAdkBEqogAHnhz8dwmNy4v2KsRhCGY7I4rFLy8J-vL2vsadYW9dv2qKp6bZol3S4bRuXUY_G2eUQtnNIzYspat9S29RtUXempBVWjeupaVtj1_6UHOWm9Hj2nWPyfDN7mt4F84fb--n1PLCCxxCAzBMJ0iiUEDOlUJjUpKmwMsUQgQFGqYiBhzHLZcKySAoRWW4zYdFGSSbG5HK_u3HNa4e-1VXhLZalqbHpvIaER6FSQrABvfiDrprO1cN3GqSKuZBCwu-gdY33DnO9cUVlXK-B6Z1dPRjQO7sDGuzRbVFi_y-nF7PpF_8JQwN8Dw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1796237371</pqid></control><display><type>article</type><title>Public‐key encryption with keyword search secure against continual memory attacks</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Alma/SFX Local Collection</source><creator>Hu, Chengyu ; Yang, Rupeng ; Liu, Pengtao ; Yu, Zuoxia ; Zhou, Yongbin ; Xu, Qiuliang</creator><creatorcontrib>Hu, Chengyu ; Yang, Rupeng ; Liu, Pengtao ; Yu, Zuoxia ; Zhou, Yongbin ; Xu, Qiuliang</creatorcontrib><description>Continual memory attacks, inspired by recent realistic physical attacks, have broken many cryptographic schemes that were considered secure in traditional cryptography model. In this paper, we consider the continual memory leakage resilience in public‐key encryption with keyword search scheme (PEKS). We give the definition of continual memory leakage resilience security for PEKS, which allows continual secret key leakage in the trapdoor generation algorithm rather than leakage of trapdoor itself. We believe that the definition is more suitable for practical PEKS scenario. To construct a concrete PEKS scheme secure against continual memory attacks, we firstly obtain a continual master‐key leakage‐resilient anonymous identity‐based encryption (IBE) scheme by applying the generic tool provided by Lewko et al. to a fully secure anonymous IBE scheme that comes from the fully secure anonymous hierarchical identity‐based encryption (HIBE) scheme of De Caro and colleagues. Then, we transform our continual master‐key leakage‐resilient anonymous IBE scheme to a PEKS scheme using the generic Anonymous IBE‐to‐PEKS transformation and prove its continual leakage‐resilient security. Copyright © 2016 John Wiley & Sons, Ltd.
In this paper, we propose a method of constructing public‐key encryption with keyword search scheme (PEKS) secure against continual memory attacks which allow the adversary to continually obtain secret key leakage in the trapdoor generation algorithm. Our method applies identity‐based encryption(IBE)‐to‐PEKS transformation to a master‐key leakage‐resilient anonymous IBE scheme. Also, we give a concrete master‐key leakage‐resilient anonymous IBE scheme which can be used to construct a concrete PEKS scheme secure against continual memory attacks.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1002/sec.1451</identifier><language>eng</language><publisher>London: Hindawi Limited</publisher><subject>anonymous identity‐based encryption ; Concrete construction ; continual memory attacks ; Cryptography ; Encryption ; keyword search ; Leakage ; Polyetherketones ; public‐key encryption ; Searching ; Security ; Transformations</subject><ispartof>Security and communication networks, 2016-07, Vol.9 (11), p.1613-1629</ispartof><rights>Copyright © 2016 John Wiley & Sons, Ltd.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c3261-17f8717a9e716099e3ababb3c7be4e101e5b3612460f780d57335c2cd3cec58d3</citedby><cites>FETCH-LOGICAL-c3261-17f8717a9e716099e3ababb3c7be4e101e5b3612460f780d57335c2cd3cec58d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Hu, Chengyu</creatorcontrib><creatorcontrib>Yang, Rupeng</creatorcontrib><creatorcontrib>Liu, Pengtao</creatorcontrib><creatorcontrib>Yu, Zuoxia</creatorcontrib><creatorcontrib>Zhou, Yongbin</creatorcontrib><creatorcontrib>Xu, Qiuliang</creatorcontrib><title>Public‐key encryption with keyword search secure against continual memory attacks</title><title>Security and communication networks</title><description>Continual memory attacks, inspired by recent realistic physical attacks, have broken many cryptographic schemes that were considered secure in traditional cryptography model. In this paper, we consider the continual memory leakage resilience in public‐key encryption with keyword search scheme (PEKS). We give the definition of continual memory leakage resilience security for PEKS, which allows continual secret key leakage in the trapdoor generation algorithm rather than leakage of trapdoor itself. We believe that the definition is more suitable for practical PEKS scenario. To construct a concrete PEKS scheme secure against continual memory attacks, we firstly obtain a continual master‐key leakage‐resilient anonymous identity‐based encryption (IBE) scheme by applying the generic tool provided by Lewko et al. to a fully secure anonymous IBE scheme that comes from the fully secure anonymous hierarchical identity‐based encryption (HIBE) scheme of De Caro and colleagues. Then, we transform our continual master‐key leakage‐resilient anonymous IBE scheme to a PEKS scheme using the generic Anonymous IBE‐to‐PEKS transformation and prove its continual leakage‐resilient security. Copyright © 2016 John Wiley & Sons, Ltd.
In this paper, we propose a method of constructing public‐key encryption with keyword search scheme (PEKS) secure against continual memory attacks which allow the adversary to continually obtain secret key leakage in the trapdoor generation algorithm. Our method applies identity‐based encryption(IBE)‐to‐PEKS transformation to a master‐key leakage‐resilient anonymous IBE scheme. Also, we give a concrete master‐key leakage‐resilient anonymous IBE scheme which can be used to construct a concrete PEKS scheme secure against continual memory attacks.</description><subject>anonymous identity‐based encryption</subject><subject>Concrete construction</subject><subject>continual memory attacks</subject><subject>Cryptography</subject><subject>Encryption</subject><subject>keyword search</subject><subject>Leakage</subject><subject>Polyetherketones</subject><subject>public‐key encryption</subject><subject>Searching</subject><subject>Security</subject><subject>Transformations</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kM1Kw0AUhQdRsFbBRxhw4yZ17kySySyl1B8oKFTXw2RyY9Pmp84klOx8BJ_RJzG1oiC4OofLx-HyEXIObAKM8SuPdgJhBAdkBEqogAHnhz8dwmNy4v2KsRhCGY7I4rFLy8J-vL2vsadYW9dv2qKp6bZol3S4bRuXUY_G2eUQtnNIzYspat9S29RtUXempBVWjeupaVtj1_6UHOWm9Hj2nWPyfDN7mt4F84fb--n1PLCCxxCAzBMJ0iiUEDOlUJjUpKmwMsUQgQFGqYiBhzHLZcKySAoRWW4zYdFGSSbG5HK_u3HNa4e-1VXhLZalqbHpvIaER6FSQrABvfiDrprO1cN3GqSKuZBCwu-gdY33DnO9cUVlXK-B6Z1dPRjQO7sDGuzRbVFi_y-nF7PpF_8JQwN8Dw</recordid><startdate>20160725</startdate><enddate>20160725</enddate><creator>Hu, Chengyu</creator><creator>Yang, Rupeng</creator><creator>Liu, Pengtao</creator><creator>Yu, Zuoxia</creator><creator>Zhou, Yongbin</creator><creator>Xu, Qiuliang</creator><general>Hindawi Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20160725</creationdate><title>Public‐key encryption with keyword search secure against continual memory attacks</title><author>Hu, Chengyu ; Yang, Rupeng ; Liu, Pengtao ; Yu, Zuoxia ; Zhou, Yongbin ; Xu, Qiuliang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3261-17f8717a9e716099e3ababb3c7be4e101e5b3612460f780d57335c2cd3cec58d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>anonymous identity‐based encryption</topic><topic>Concrete construction</topic><topic>continual memory attacks</topic><topic>Cryptography</topic><topic>Encryption</topic><topic>keyword search</topic><topic>Leakage</topic><topic>Polyetherketones</topic><topic>public‐key encryption</topic><topic>Searching</topic><topic>Security</topic><topic>Transformations</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hu, Chengyu</creatorcontrib><creatorcontrib>Yang, Rupeng</creatorcontrib><creatorcontrib>Liu, Pengtao</creatorcontrib><creatorcontrib>Yu, Zuoxia</creatorcontrib><creatorcontrib>Zhou, Yongbin</creatorcontrib><creatorcontrib>Xu, Qiuliang</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hu, Chengyu</au><au>Yang, Rupeng</au><au>Liu, Pengtao</au><au>Yu, Zuoxia</au><au>Zhou, Yongbin</au><au>Xu, Qiuliang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Public‐key encryption with keyword search secure against continual memory attacks</atitle><jtitle>Security and communication networks</jtitle><date>2016-07-25</date><risdate>2016</risdate><volume>9</volume><issue>11</issue><spage>1613</spage><epage>1629</epage><pages>1613-1629</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>Continual memory attacks, inspired by recent realistic physical attacks, have broken many cryptographic schemes that were considered secure in traditional cryptography model. In this paper, we consider the continual memory leakage resilience in public‐key encryption with keyword search scheme (PEKS). We give the definition of continual memory leakage resilience security for PEKS, which allows continual secret key leakage in the trapdoor generation algorithm rather than leakage of trapdoor itself. We believe that the definition is more suitable for practical PEKS scenario. To construct a concrete PEKS scheme secure against continual memory attacks, we firstly obtain a continual master‐key leakage‐resilient anonymous identity‐based encryption (IBE) scheme by applying the generic tool provided by Lewko et al. to a fully secure anonymous IBE scheme that comes from the fully secure anonymous hierarchical identity‐based encryption (HIBE) scheme of De Caro and colleagues. Then, we transform our continual master‐key leakage‐resilient anonymous IBE scheme to a PEKS scheme using the generic Anonymous IBE‐to‐PEKS transformation and prove its continual leakage‐resilient security. Copyright © 2016 John Wiley & Sons, Ltd.
In this paper, we propose a method of constructing public‐key encryption with keyword search scheme (PEKS) secure against continual memory attacks which allow the adversary to continually obtain secret key leakage in the trapdoor generation algorithm. Our method applies identity‐based encryption(IBE)‐to‐PEKS transformation to a master‐key leakage‐resilient anonymous IBE scheme. Also, we give a concrete master‐key leakage‐resilient anonymous IBE scheme which can be used to construct a concrete PEKS scheme secure against continual memory attacks.</abstract><cop>London</cop><pub>Hindawi Limited</pub><doi>10.1002/sec.1451</doi><tpages>17</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2016-07, Vol.9 (11), p.1613-1629 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_miscellaneous_1825499330 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Alma/SFX Local Collection |
subjects | anonymous identity‐based encryption Concrete construction continual memory attacks Cryptography Encryption keyword search Leakage Polyetherketones public‐key encryption Searching Security Transformations |
title | Public‐key encryption with keyword search secure against continual memory attacks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T16%3A44%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Public%E2%80%90key%20encryption%20with%20keyword%20search%20secure%20against%20continual%20memory%20attacks&rft.jtitle=Security%20and%20communication%20networks&rft.au=Hu,%20Chengyu&rft.date=2016-07-25&rft.volume=9&rft.issue=11&rft.spage=1613&rft.epage=1629&rft.pages=1613-1629&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1002/sec.1451&rft_dat=%3Cproquest_cross%3E1825499330%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1796237371&rft_id=info:pmid/&rfr_iscdi=true |