首页 > 最新文献

Int. J. Appl. Cryptogr.最新文献

英文 中文
Dynamic MDS diffusion layers with efficient software implementation 动态MDS扩散层与高效的软件实现
Pub Date : 2020-05-04 DOI: 10.1504/ijact.2020.10029198
M. R. M. Shamsabad, S. M. Dehnavi
Maximum distance separable (MDS) matrices play a crucial role in symmetric ciphers as diffusion layers. Dynamic diffusion layers for software applications are less considered up to now. Dynamic (randomised) components could make symmetric ciphers more resistant against statistical and algebraic attacks. In this paper, after some theoretical investigation we present a family of parametric n × n, binary matrices Aα, n = 4t, such that for 4t many α ∈ Fn2 the matrices Aα, A3α ⊕ I and A7α ⊕ I are non-singular. With the aid of the proposed family of matrices, some well-known diffusion layers including the cyclic AES-like matrices and some recursive MDS diffusion layers could be made dynamic, at little extra cost in software. Then, we provide new families of MDS matrices which could be used as dynamic diffusion layers, using the proposed family of matrices. The implementation cost of every member in the presented families of MDS diffusion layers (except one cyclic family) is equal to its inverse. The proposed diffusion layers have a suitable implementation cost on a variety of modern processors.
最大距离可分离矩阵作为扩散层在对称密码中起着至关重要的作用。软件应用的动态扩散层目前研究较少。动态(随机)组件可以使对称密码更能抵抗统计和代数攻击。本文通过一些理论研究,给出了一类参数n × n的二元矩阵a α, n = 4t,使得对于4t个α∈Fn2,矩阵a α, A3α⊕I和A7α⊕I是非奇异的。利用所提出的矩阵族,一些众所周知的扩散层,包括循环类aes矩阵和一些递归MDS扩散层,可以在软件上以很少的额外成本实现动态。然后,我们利用提出的矩阵族提供了新的MDS矩阵族,这些矩阵族可以作为动态扩散层。所提出的MDS扩散层族中每个成员(除一个循环族外)的实现成本都等于其逆。所提出的扩散层在各种现代处理器上具有合适的实现成本。
{"title":"Dynamic MDS diffusion layers with efficient software implementation","authors":"M. R. M. Shamsabad, S. M. Dehnavi","doi":"10.1504/ijact.2020.10029198","DOIUrl":"https://doi.org/10.1504/ijact.2020.10029198","url":null,"abstract":"Maximum distance separable (MDS) matrices play a crucial role in symmetric ciphers as diffusion layers. Dynamic diffusion layers for software applications are less considered up to now. Dynamic (randomised) components could make symmetric ciphers more resistant against statistical and algebraic attacks. In this paper, after some theoretical investigation we present a family of parametric n × n, binary matrices Aα, n = 4t, such that for 4t many α ∈ Fn2 the matrices Aα, A3α ⊕ I and A7α ⊕ I are non-singular. With the aid of the proposed family of matrices, some well-known diffusion layers including the cyclic AES-like matrices and some recursive MDS diffusion layers could be made dynamic, at little extra cost in software. Then, we provide new families of MDS matrices which could be used as dynamic diffusion layers, using the proposed family of matrices. The implementation cost of every member in the presented families of MDS diffusion layers (except one cyclic family) is equal to its inverse. The proposed diffusion layers have a suitable implementation cost on a variety of modern processors.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114735680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Computing the optimal ate pairing over elliptic curves with embedding degrees 54 and 48 at the 256-bit security level 在256位安全级别下,计算嵌入度为54和48的椭圆曲线上的最优ate配对
Pub Date : 2020-05-04 DOI: 10.1504/ijact.2020.10027563
Narcisse Bang Mbiang, Emmanuel Fouotsa, Diego F. Aranha
Due to recent advances in the computation of finite fields discrete logarithms, the Barreto-Lynn-Scott family of elliptic curves of embedding degree 48 became suitable for instantiating pairing-based cryptography at the 256-bit security level. Observing the uncertainty around determining the constants that govern the best approach for computing discrete logarithms, Scott and Guillevic consider pairing-friendly elliptic curves of embedding degree higher than 50, and discovered a new family of elliptic curves with embedding degree 54. This work aims at investigating the theoretical and practical cost of both the Miller algorithm and the final exponentiation in the computation of the optimal ate pairing on the two aforementioned curves. Both our theoretical results, based on the operation counts of base-field operations, and our experimental observations collected from a real implementation, confirm that BLS48 curves remain the faster curve in the computation of the optimal ate pairing at the 256-bit security level.
由于有限域离散对数计算的最新进展,嵌入度为48的巴雷托-林恩-斯科特椭圆曲线族适合于实例化256位安全级别的基于配对的加密。Scott和Guillevic观察到决定离散对数最佳计算方法的常数的不确定性,考虑嵌入度大于50的配对友好型椭圆曲线,并发现了嵌入度为54的新椭圆曲线族。这项工作的目的是研究米勒算法的理论和实际成本,以及在上述两条曲线上计算最优ate配对的最终幂次。我们的理论结果(基于基场操作的操作计数)和我们从实际实现中收集的实验观察结果都证实,在256位安全级别上,BLS48曲线仍然是计算最佳ate配对的更快曲线。
{"title":"Computing the optimal ate pairing over elliptic curves with embedding degrees 54 and 48 at the 256-bit security level","authors":"Narcisse Bang Mbiang, Emmanuel Fouotsa, Diego F. Aranha","doi":"10.1504/ijact.2020.10027563","DOIUrl":"https://doi.org/10.1504/ijact.2020.10027563","url":null,"abstract":"Due to recent advances in the computation of finite fields discrete logarithms, the Barreto-Lynn-Scott family of elliptic curves of embedding degree 48 became suitable for instantiating pairing-based cryptography at the 256-bit security level. Observing the uncertainty around determining the constants that govern the best approach for computing discrete logarithms, Scott and Guillevic consider pairing-friendly elliptic curves of embedding degree higher than 50, and discovered a new family of elliptic curves with embedding degree 54. This work aims at investigating the theoretical and practical cost of both the Miller algorithm and the final exponentiation in the computation of the optimal ate pairing on the two aforementioned curves. Both our theoretical results, based on the operation counts of base-field operations, and our experimental observations collected from a real implementation, confirm that BLS48 curves remain the faster curve in the computation of the optimal ate pairing at the 256-bit security level.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124463319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Delegation-based conversion from CPA to CCA-secure predicate encryption 基于委托的从CPA到cca安全谓词加密的转换
Pub Date : 2020-05-03 DOI: 10.1504/ijact.2020.10029197
M. Nandi, Tapas Pandit
In 2011, Yamada et al. proposed CPA to CCA-secure conversions for attribute-based encryption (ABE) based on the properties, verifiability and delegation. Later, the verifiability-based conversion was generalised from ABE to predicate encryption (PE) by Yamada et al. (2012) and Nandi et al. (2017). We observe that for bilinear-pairing based PE schemes, the cost of CCA-decryption blows up to the double of the cost of CPA-decryption due to verifiability testing. Therefore, the conversion based on delegation is mostly acceptable whenever a delegation-based conversion is available for the primitive PE scheme. In this paper, we investigate a generic delegation-based conversion from CPA to CCA-secure predicate encryption schemes. Our conversion generalises the delegation-based conversion of Yamada et al. (2011) from ABE to PE. We show that our conversion captures many subclasses of PE, e.g., (hierarchical) inner-product encryption, (doubly-)spatial encryption and functional encryption for regular languages.
2011年,Yamada等人提出了基于属性、可验证性和委托的基于属性的加密(ABE)的CPA到cca安全转换。后来,Yamada等人(2012)和Nandi等人(2017)将基于可验证性的转换从ABE推广到谓词加密(PE)。我们观察到,对于基于双线性配对的PE方案,由于可验证性测试,cca解密的成本激增到cpa解密成本的两倍。因此,只要基于委托的转换可用于基本PE方案,基于委托的转换基本上是可以接受的。在本文中,我们研究了一种通用的基于委托的从CPA到cca安全谓词加密方案的转换。我们的转换推广了Yamada等人(2011)从ABE到PE的基于委托的转换。我们证明了我们的转换捕获了PE的许多子类,例如(分层)内积加密,(双-)空间加密和正则语言的功能加密。
{"title":"Delegation-based conversion from CPA to CCA-secure predicate encryption","authors":"M. Nandi, Tapas Pandit","doi":"10.1504/ijact.2020.10029197","DOIUrl":"https://doi.org/10.1504/ijact.2020.10029197","url":null,"abstract":"In 2011, Yamada et al. proposed CPA to CCA-secure conversions for attribute-based encryption (ABE) based on the properties, verifiability and delegation. Later, the verifiability-based conversion was generalised from ABE to predicate encryption (PE) by Yamada et al. (2012) and Nandi et al. (2017). We observe that for bilinear-pairing based PE schemes, the cost of CCA-decryption blows up to the double of the cost of CPA-decryption due to verifiability testing. Therefore, the conversion based on delegation is mostly acceptable whenever a delegation-based conversion is available for the primitive PE scheme. In this paper, we investigate a generic delegation-based conversion from CPA to CCA-secure predicate encryption schemes. Our conversion generalises the delegation-based conversion of Yamada et al. (2011) from ABE to PE. We show that our conversion captures many subclasses of PE, e.g., (hierarchical) inner-product encryption, (doubly-)spatial encryption and functional encryption for regular languages.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127313762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new authenticated encryption technique for handling long ciphertexts in memory constrained devices 在内存受限设备中处理长密文的一种新的身份验证加密技术
Pub Date : 2017-09-04 DOI: 10.1504/IJACT.2017.10007291
Megha Agrawal, D. Chang, S. K. Sanadhya
In authenticated encryption schemes, there are two techniques for handling long ciphertexts while working within the constraints of a low buffer size: releasing unverified plaintext (RUP) or producing intermediate tags (PIT). In this paper, in addition to the two techniques, we propose another way to handle a long ciphertext with a low buffer size by storing and releasing only one (generally, or only few) intermediate state without releasing or storing any part of an unverified plaintext and without need of generating any intermediate tag. In this paper we explain this generalised technique using our new construction sp-AELM. sp-AELM is a sponge-based authenticated encryption scheme that provides support for limited memory devices. We also provide its security proof for privacy and authenticity in an ideal permutation model, using a code-based game playing framework. Furthermore, we also present two more variants of sp-AELM that serve the same purpose and are more efficient than sp-AELM. The ongoing CAESAR competition has nine submissions which are based on the sponge construction. We apply our generalised technique of storing single intermediate state to all these submissions, to determine their suitability with a crypto module having limited memory. Our findings show that only ASCON and one of the PRIMATE's modes (namely GIBBON) satisfy the limited memory constraint using this technique, while the remaining schemes (namely, Artemia, ICEPOLE, Ketje, Keyak, NORX, Π-cipher, STRIBOB and two of the PRIMATEs modes: APE and HANUMAN) are not suitable for this scenario directly.
在经过身份验证的加密方案中,在低缓冲区大小的约束下处理长密文有两种技术:释放未经验证的明文(RUP)或产生中间标记(PIT)。在本文中,除了这两种技术之外,我们提出了另一种方法来处理具有低缓冲区大小的长密文,即只存储和释放一个(通常或只有几个)中间状态,而不释放或存储未经验证的明文的任何部分,并且不需要生成任何中间标记。在本文中,我们使用我们的新结构sp-AELM来解释这种广义技术。sp-AELM是一种基于海绵的身份验证加密方案,支持有限内存设备。我们还使用基于代码的游戏框架,在理想的排列模型中提供其隐私和真实性的安全性证明。此外,我们还提出了sp-AELM的另外两种变体,它们具有相同的目的,并且比sp-AELM更有效。正在进行的CAESAR竞赛有九份基于海绵结构的参赛作品。我们将存储单一中间状态的通用技术应用于所有这些提交,以确定它们与内存有限的加密模块的适用性。我们的研究结果表明,只有ASCON和灵长类动物的一种模式(即GIBBON)满足使用该技术的有限记忆约束,而其他模式(即Artemia, ICEPOLE, Ketje, Keyak, NORX, Π-cipher, STRIBOB以及灵长类动物的两种模式:APE和HANUMAN)并不直接适用于该场景。
{"title":"A new authenticated encryption technique for handling long ciphertexts in memory constrained devices","authors":"Megha Agrawal, D. Chang, S. K. Sanadhya","doi":"10.1504/IJACT.2017.10007291","DOIUrl":"https://doi.org/10.1504/IJACT.2017.10007291","url":null,"abstract":"In authenticated encryption schemes, there are two techniques for handling long ciphertexts while working within the constraints of a low buffer size: releasing unverified plaintext (RUP) or producing intermediate tags (PIT). In this paper, in addition to the two techniques, we propose another way to handle a long ciphertext with a low buffer size by storing and releasing only one (generally, or only few) intermediate state without releasing or storing any part of an unverified plaintext and without need of generating any intermediate tag. In this paper we explain this generalised technique using our new construction sp-AELM. sp-AELM is a sponge-based authenticated encryption scheme that provides support for limited memory devices. We also provide its security proof for privacy and authenticity in an ideal permutation model, using a code-based game playing framework. Furthermore, we also present two more variants of sp-AELM that serve the same purpose and are more efficient than sp-AELM. The ongoing CAESAR competition has nine submissions which are based on the sponge construction. We apply our generalised technique of storing single intermediate state to all these submissions, to determine their suitability with a crypto module having limited memory. Our findings show that only ASCON and one of the PRIMATE's modes (namely GIBBON) satisfy the limited memory constraint using this technique, while the remaining schemes (namely, Artemia, ICEPOLE, Ketje, Keyak, NORX, Π-cipher, STRIBOB and two of the PRIMATEs modes: APE and HANUMAN) are not suitable for this scenario directly.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116304376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A new public remote integrity checking scheme with user and data privacy 一种新的具有用户和数据隐私的公共远程完整性检查方案
Pub Date : 2017-09-04 DOI: 10.1504/IJACT.2017.10007296
Yiteng Feng, Guomin Yang, Joseph K. Liu
With cloud storage, users can store their data files on a remote cloud server with a high quality on-demand cloud service and are able to share their data with other users. Since cloud servers usually are not regarded as fully trusted and the cloud data can be shared amongst users, the integrity checking of the remote files has become an important issue. A number of remote data integrity checking protocols have been proposed in the literature to allow public auditing of cloud data by a third party auditor (TPA). However, user privacy is not taken into account in most of the existing protocols. We believe that preserving the anonymity (i.e., identity privacy) of the data owner is also very important in many applications. In this paper, we propose a new remote integrity checking scheme which allows the cloud server to protect the identity information of the data owner against the TPA. We also define a formal security model to capture the requirement of user anonymity, and prove the anonymity of the proposed scheme. Moreover, we improve the existing security model for data privacy against the TPA, and show that an extended version of our protocol is secure under the strengthened security model.
使用云存储,用户可以将数据文件存储在具有高质量按需云服务的远程云服务器上,并能够与其他用户共享数据。由于云服务器通常不被认为是完全可信的,并且云数据可以在用户之间共享,因此远程文件的完整性检查已成为一个重要问题。文献中提出了许多远程数据完整性检查协议,以允许第三方审计员(TPA)对云数据进行公共审计。然而,现有的大多数协议都没有考虑到用户的隐私。我们相信,在许多应用程序中,保持数据所有者的匿名性(即身份隐私)也非常重要。在本文中,我们提出了一种新的远程完整性检查方案,该方案允许云服务器保护数据所有者的身份信息免受TPA的攻击。我们还定义了一个形式化的安全模型来捕获用户匿名的需求,并证明了所提出方案的匿名性。此外,我们针对TPA改进了现有的数据隐私安全模型,并证明了我们协议的扩展版本在增强的安全模型下是安全的。
{"title":"A new public remote integrity checking scheme with user and data privacy","authors":"Yiteng Feng, Guomin Yang, Joseph K. Liu","doi":"10.1504/IJACT.2017.10007296","DOIUrl":"https://doi.org/10.1504/IJACT.2017.10007296","url":null,"abstract":"With cloud storage, users can store their data files on a remote cloud server with a high quality on-demand cloud service and are able to share their data with other users. Since cloud servers usually are not regarded as fully trusted and the cloud data can be shared amongst users, the integrity checking of the remote files has become an important issue. A number of remote data integrity checking protocols have been proposed in the literature to allow public auditing of cloud data by a third party auditor (TPA). However, user privacy is not taken into account in most of the existing protocols. We believe that preserving the anonymity (i.e., identity privacy) of the data owner is also very important in many applications. In this paper, we propose a new remote integrity checking scheme which allows the cloud server to protect the identity information of the data owner against the TPA. We also define a formal security model to capture the requirement of user anonymity, and prove the anonymity of the proposed scheme. Moreover, we improve the existing security model for data privacy against the TPA, and show that an extended version of our protocol is secure under the strengthened security model.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132673561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Preventing fault attacks using fault randomisation with a case study on AES 利用故障随机化防止故障攻击,并以AES为例进行研究
Pub Date : 2017-09-04 DOI: 10.1504/IJACT.2017.10007295
S. Ghosh, Dhiman Saha, A. Sengupta, D. R. Chowdhury
Fault attacks are one of the most effective side-channel attacks on symmetric key ciphers. Over the years a variety of countermeasure techniques have been proposed to prevent this kind of attack. A...
故障攻击是对称密钥密码中最有效的侧信道攻击之一。多年来,人们提出了各种对抗技术来防止这种攻击。一个……
{"title":"Preventing fault attacks using fault randomisation with a case study on AES","authors":"S. Ghosh, Dhiman Saha, A. Sengupta, D. R. Chowdhury","doi":"10.1504/IJACT.2017.10007295","DOIUrl":"https://doi.org/10.1504/IJACT.2017.10007295","url":null,"abstract":"Fault attacks are one of the most effective side-channel attacks on symmetric key ciphers. Over the years a variety of countermeasure techniques have been proposed to prevent this kind of attack. A...","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114808834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance 具有抗解密密钥暴露的cca安全可撤销的基于身份的加密方案
Pub Date : 2017-09-04 DOI: 10.1504/IJACT.2017.10007294
Yuu Ishida, Junji Shikata, Yohei Watanabe
Key revocation functionality is important for identity-based encryption (IBE) to manage users dynamically. Revocable IBE (RIBE) realises such revocation functionality with scalability. In PKC 2013, Seo and Emura first considered decryption key exposure resistance (DKER) as a new realistic threat, and proposed the first RIBE scheme with DKER. Their RIBE scheme is adaptively secure against chosen plaintext attacks (CPA), and there is no concrete RIBE scheme adaptively secure against chosen ciphertext attacks (CCA) even without DKER so far. In this paper, we first propose three constructions of adaptively CCA-secure RIBE schemes with DKER. The first and second schemes are based on an existing transformation, which is called a BCHK transformation, that a CPA-secure hierarchical IBE scheme can be transformed into a CCA-secure scheme. The third scheme is constructed via the KEM/DEM framework. Specifically, we newly propose a revocable identity-based key encapsulation mechanism (RIB-KEM), and we show a generic construction of a CCA-secure RIBE scheme from the RIB-KEM and a data encapsulation mechanism (DEM). The third scheme is more efficient than the first and second ones in terms of the ciphertext size.
密钥撤销功能对于基于身份的加密(IBE)动态管理用户非常重要。可撤销IBE (RIBE)通过可伸缩性实现了这种撤销功能。在PKC 2013中,Seo和Emura首次将解密密钥暴露阻力(DKER)视为一种新的现实威胁,并提出了第一个带有DKER的RIBE方案。他们的RIBE方案对选择明文攻击(CPA)具有自适应安全性,即使没有DKER,到目前为止也没有具体的RIBE方案对选择密文攻击(CCA)具有自适应安全性。本文首先提出了三种基于DKER的自适应cca安全RIBE方案。第一种和第二种方案是基于现有的一种转换,即BCHK转换,即cpa安全的分层IBE方案可以转换为ca安全的方案。第三种方案是通过KEM/DEM框架构建的。具体来说,我们提出了一种可撤销的基于身份的密钥封装机制(RIB-KEM),并展示了一个基于RIB-KEM和数据封装机制(DEM)的cca安全RIBE方案的通用结构。就密文大小而言,第三种方案比第一种和第二种方案更有效。
{"title":"CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance","authors":"Yuu Ishida, Junji Shikata, Yohei Watanabe","doi":"10.1504/IJACT.2017.10007294","DOIUrl":"https://doi.org/10.1504/IJACT.2017.10007294","url":null,"abstract":"Key revocation functionality is important for identity-based encryption (IBE) to manage users dynamically. Revocable IBE (RIBE) realises such revocation functionality with scalability. In PKC 2013, Seo and Emura first considered decryption key exposure resistance (DKER) as a new realistic threat, and proposed the first RIBE scheme with DKER. Their RIBE scheme is adaptively secure against chosen plaintext attacks (CPA), and there is no concrete RIBE scheme adaptively secure against chosen ciphertext attacks (CCA) even without DKER so far. In this paper, we first propose three constructions of adaptively CCA-secure RIBE schemes with DKER. The first and second schemes are based on an existing transformation, which is called a BCHK transformation, that a CPA-secure hierarchical IBE scheme can be transformed into a CCA-secure scheme. The third scheme is constructed via the KEM/DEM framework. Specifically, we newly propose a revocable identity-based key encapsulation mechanism (RIB-KEM), and we show a generic construction of a CCA-secure RIBE scheme from the RIB-KEM and a data encapsulation mechanism (DEM). The third scheme is more efficient than the first and second ones in terms of the ciphertext size.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128508483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
IBE and function-private IBE under linear assumptions with shorter ciphertexts and private keys, and extensions 线性假设下的IBE和功能私有IBE,具有更短的密文和私钥,以及扩展
Pub Date : 2017-09-04 DOI: 10.1504/IJACT.2017.10007292
K. Kurosawa, L. T. Phong
Many identity-based encryption schemes under the k-LIN assumption contain 2k + 1 group elements in the ciphertext overhead and private keys. In this paper, we push the limit further by constructing an IBE scheme under the k-LIN assumption with 2k group elements in the ciphertext overhead and private keys. The schemes have variants with shorter public parameters under the k-SCasc assumption, which is a close assumption to k-LIN. Furthermore, via additional refinements, we also put efforts in reducing the public parameter size of our schemes, under either k-LIN or k-SCasc. While we mainly consider securities in the standard model for our schemes, we also show how to make relatively more efficient schemes secure in the random oracle model. Our technique additionally expands to the scheme of Boneh et al. (CRYPTO 2013) to yield more efficient function-private IBE under the 2-LIN (aka, DLIN) assumption. Overall, the shortened size in ciphertexts and private keys inherently leads to fewer exponentiations and pairings in encryption and decryption, and hence yields schemes with better computational efficiency.
在k-LIN假设下,许多基于身份的加密方案在密文开销和私钥中包含2k + 1个组元素。在本文中,我们进一步突破了这一极限,在k-LIN假设下构造了一个具有2k组元素的密文开销和私钥的IBE方案。在与k-LIN相似的k-SCasc假设下,这些方案具有公共参数更短的变体。此外,通过额外的改进,我们还在k-LIN或k-SCasc下努力减小方案的公共参数大小。虽然我们主要在标准模型中考虑方案的安全性,但我们也展示了如何在随机oracle模型中使相对更有效的方案安全。我们的技术还扩展到Boneh等人(CRYPTO 2013)的方案,以在2-LIN(也称为DLIN)假设下产生更有效的函数私有IBE。总的来说,密文和私钥的缩短本质上减少了加密和解密中的幂次和配对,从而产生了具有更好计算效率的方案。
{"title":"IBE and function-private IBE under linear assumptions with shorter ciphertexts and private keys, and extensions","authors":"K. Kurosawa, L. T. Phong","doi":"10.1504/IJACT.2017.10007292","DOIUrl":"https://doi.org/10.1504/IJACT.2017.10007292","url":null,"abstract":"Many identity-based encryption schemes under the k-LIN assumption contain 2k + 1 group elements in the ciphertext overhead and private keys. In this paper, we push the limit further by constructing an IBE scheme under the k-LIN assumption with 2k group elements in the ciphertext overhead and private keys. The schemes have variants with shorter public parameters under the k-SCasc assumption, which is a close assumption to k-LIN. Furthermore, via additional refinements, we also put efforts in reducing the public parameter size of our schemes, under either k-LIN or k-SCasc. While we mainly consider securities in the standard model for our schemes, we also show how to make relatively more efficient schemes secure in the random oracle model. Our technique additionally expands to the scheme of Boneh et al. (CRYPTO 2013) to yield more efficient function-private IBE under the 2-LIN (aka, DLIN) assumption. Overall, the shortened size in ciphertexts and private keys inherently leads to fewer exponentiations and pairings in encryption and decryption, and hence yields schemes with better computational efficiency.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124323460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version) 针对任意长度消息的基于海绵的CCA2安全非对称加密(扩展版本)
Pub Date : 2017-09-04 DOI: 10.1504/IJACT.2017.10007290
Tarun Kumar Bansal, D. Chang, S. K. Sanadhya
OAEP and other similar schemes, proven secure in random-oracle model, require one or more hash functions with an output size larger than those of the standard hash functions. In this paper, we show that by using the popular Sponge construction in the OAEP framework, we can eliminate the need for such a hash function. We provide a new scheme in the OAEP framework and call our scheme Sponge-based asymmetric encryption padding (SpAEP). The scheme SpAEP is based on two functions: Sponge and SpongeWrap, and requires only standard output sizes proposed and standardised for Sponge functions. Our scheme is CCA2 secure for any trapdoor one-way permutation in the ideal permutation model for arbitrary length messages. Our scheme utilises the versatile Sponge function to enhance the capability and efficiency of the OAEP framework. Prior to this work, the only scheme proven secure in the ideal permutation model was OAEP-3R. However this scheme is not efficient in practice as it utilises a full domain permutation which is hard to find and construct efficiently in practice. Therefore, the author of OAEP-3R provided another version of OAEP-3R but in random oracle model. Our scheme SpAEP utilises the ideal permutation model in a novel manner which makes SpAEP efficient and practical to construct a public key encryption. We also propose a key encapsulation mechanism for hybrid encryption using SpAEP with any trapdoor one-way permutation.
OAEP和其他类似的方案在random-oracle模型中被证明是安全的,它们需要一个或多个输出大小大于标准哈希函数的哈希函数。在本文中,我们展示了通过在OAEP框架中使用流行的海绵结构,我们可以消除对这种哈希函数的需求。我们在OAEP框架中提出了一种新的方案,并将其称为基于海绵的非对称加密填充(SpAEP)。spep方案基于Sponge和SpongeWrap两个功能,只需要针对Sponge功能提出和标准化的标准输出尺寸。我们的方案对于任意长度消息的理想排列模型中的任何活板门单向排列都是CCA2安全的。我们的方案利用多功能海绵功能来提高OAEP框架的能力和效率。在此之前,唯一被证明在理想排列模型中安全的方案是OAEP-3R。然而,该方案在实际应用中效率不高,因为它利用了全域排列,在实际应用中很难有效地找到和构造。因此,OAEP-3R的作者提供了另一个版本的OAEP-3R,但采用随机oracle模型。我们的方案以一种新颖的方式利用了理想的排列模型,使得spep在构造公钥加密时既高效又实用。我们还提出了一种基于任意活门单向排列的spep混合加密的密钥封装机制。
{"title":"Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version)","authors":"Tarun Kumar Bansal, D. Chang, S. K. Sanadhya","doi":"10.1504/IJACT.2017.10007290","DOIUrl":"https://doi.org/10.1504/IJACT.2017.10007290","url":null,"abstract":"OAEP and other similar schemes, proven secure in random-oracle model, require one or more hash functions with an output size larger than those of the standard hash functions. In this paper, we show that by using the popular Sponge construction in the OAEP framework, we can eliminate the need for such a hash function. We provide a new scheme in the OAEP framework and call our scheme Sponge-based asymmetric encryption padding (SpAEP). The scheme SpAEP is based on two functions: Sponge and SpongeWrap, and requires only standard output sizes proposed and standardised for Sponge functions. Our scheme is CCA2 secure for any trapdoor one-way permutation in the ideal permutation model for arbitrary length messages. Our scheme utilises the versatile Sponge function to enhance the capability and efficiency of the OAEP framework. Prior to this work, the only scheme proven secure in the ideal permutation model was OAEP-3R. However this scheme is not efficient in practice as it utilises a full domain permutation which is hard to find and construct efficiently in practice. Therefore, the author of OAEP-3R provided another version of OAEP-3R but in random oracle model. Our scheme SpAEP utilises the ideal permutation model in a novel manner which makes SpAEP efficient and practical to construct a public key encryption. We also propose a key encapsulation mechanism for hybrid encryption using SpAEP with any trapdoor one-way permutation.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129473995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prover-Efficient Commit-and-Prove Zero-Knowledge SNARKs 证明高效的提交-证明零知识陷阱
Pub Date : 2016-04-13 DOI: 10.1007/978-3-319-31517-1_10
H. Lipmaa
{"title":"Prover-Efficient Commit-and-Prove Zero-Knowledge SNARKs","authors":"H. Lipmaa","doi":"10.1007/978-3-319-31517-1_10","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_10","url":null,"abstract":"","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114041284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
期刊
Int. J. Appl. Cryptogr.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1