{"title":"面向物联网环境的防泄漏证书加密方案","authors":"Yuh-Min Tseng, Jui-Di Wu, Ruo-Wei Hung, H. Chien","doi":"10.1109/ICAWST.2018.8517196","DOIUrl":null,"url":null,"abstract":"Now, Internet of Things (IoT) brings people innovative experiences and applications through connectivity of numerous computing devices. In these applications, computing devices generate and exchange a large number of critical and sensitive data. Typically, these computing devices are putted on some unprotected environments that make them to be attractive attack targets while easily suffering from a new kind of threat, called “side-channel attacks By side-channel attacks, an adversary could obtain partial information of secret values (or internal states) stored in these devices by observing execution timing or energy consumption. However, most adversary models of previous cryptographic schemes/protocols do not concern with such side-channel attacks. Indeed, leakage-resilient cryptography is a flexible solution for resisting to side-channel attacks. So far, little work focuses on the design of leakage-resilient certificate-based encryption (LR-CBE) schemes. In the article, we propose the first LR-CBE scheme resilient to continuous key leakage of user's private keys, system secret key and random values. In the generic bilinear group model, security analysis is given to show that the proposed LR-CBE scheme is provably secure against chosen cipher-text attacks under the continual leakage model. Performance evaluation is made to demonstrate that our scheme is suitable for embedded devices.","PeriodicalId":277939,"journal":{"name":"2018 9th International Conference on Awareness Science and Technology (iCAST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments\",\"authors\":\"Yuh-Min Tseng, Jui-Di Wu, Ruo-Wei Hung, H. Chien\",\"doi\":\"10.1109/ICAWST.2018.8517196\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Now, Internet of Things (IoT) brings people innovative experiences and applications through connectivity of numerous computing devices. In these applications, computing devices generate and exchange a large number of critical and sensitive data. Typically, these computing devices are putted on some unprotected environments that make them to be attractive attack targets while easily suffering from a new kind of threat, called “side-channel attacks By side-channel attacks, an adversary could obtain partial information of secret values (or internal states) stored in these devices by observing execution timing or energy consumption. However, most adversary models of previous cryptographic schemes/protocols do not concern with such side-channel attacks. Indeed, leakage-resilient cryptography is a flexible solution for resisting to side-channel attacks. So far, little work focuses on the design of leakage-resilient certificate-based encryption (LR-CBE) schemes. In the article, we propose the first LR-CBE scheme resilient to continuous key leakage of user's private keys, system secret key and random values. In the generic bilinear group model, security analysis is given to show that the proposed LR-CBE scheme is provably secure against chosen cipher-text attacks under the continual leakage model. Performance evaluation is made to demonstrate that our scheme is suitable for embedded devices.\",\"PeriodicalId\":277939,\"journal\":{\"name\":\"2018 9th International Conference on Awareness Science and Technology (iCAST)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 9th International Conference on Awareness Science and Technology (iCAST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAWST.2018.8517196\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 9th International Conference on Awareness Science and Technology (iCAST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAWST.2018.8517196","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
摘要
如今,物联网(Internet of Things, IoT)通过连接众多计算设备,为人们带来创新的体验和应用。在这些应用程序中,计算设备生成并交换大量关键和敏感数据。通常,这些计算设备被放置在一些未受保护的环境中,使它们成为有吸引力的攻击目标,同时容易遭受一种新的威胁,称为“侧信道攻击”。通过侧信道攻击,攻击者可以通过观察执行时间或能量消耗来获取存储在这些设备中的秘密值(或内部状态)的部分信息。然而,以前的加密方案/协议的大多数对手模型都不关心这种侧信道攻击。事实上,防泄漏加密技术是一种抵抗侧信道攻击的灵活解决方案。到目前为止,很少有人关注基于证书的防泄漏加密(LR-CBE)方案的设计。本文提出了首个抗用户私钥、系统私钥和随机值连续密钥泄露的LR-CBE方案。在一般双线性群模型下,对所提出的LR-CBE方案进行了安全性分析,证明了该方案在连续泄漏模型下对所选密文攻击的安全性。性能评估表明,该方案适用于嵌入式设备。
Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments
Now, Internet of Things (IoT) brings people innovative experiences and applications through connectivity of numerous computing devices. In these applications, computing devices generate and exchange a large number of critical and sensitive data. Typically, these computing devices are putted on some unprotected environments that make them to be attractive attack targets while easily suffering from a new kind of threat, called “side-channel attacks By side-channel attacks, an adversary could obtain partial information of secret values (or internal states) stored in these devices by observing execution timing or energy consumption. However, most adversary models of previous cryptographic schemes/protocols do not concern with such side-channel attacks. Indeed, leakage-resilient cryptography is a flexible solution for resisting to side-channel attacks. So far, little work focuses on the design of leakage-resilient certificate-based encryption (LR-CBE) schemes. In the article, we propose the first LR-CBE scheme resilient to continuous key leakage of user's private keys, system secret key and random values. In the generic bilinear group model, security analysis is given to show that the proposed LR-CBE scheme is provably secure against chosen cipher-text attacks under the continual leakage model. Performance evaluation is made to demonstrate that our scheme is suitable for embedded devices.