当前位置: X-MOL 学术Theor. Comput. Sci. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing
Theoretical Computer Science ( IF 1.1 ) Pub Date : 2021-01-21 , DOI: 10.1016/j.tcs.2021.01.024
Yanwei Zhou , Yuan Xu , Zirui Qiao , Bo Yang , Mingwu Zhang

Leakage of private information, e.g. the secret keys, has become a serious threat to the security of computing systems. It has become a common requirement that real-world security applications should withstand various leakage attacks, such as side-channel attacks, cold-boot attacks, etc. For example, the above leakage attacks are very common in cloud computing nowadays. Hence, we need a novel method to protect the security of data storage and authorization even if a certain amount of leakage information with respect to the secret state can be obtained by any adversary. In order to achieve the above goal, in this paper, we introduce a continuous leakage-resilient certificate-based signcryption (CBS) scheme, and we prove that our proposed scheme achieves the chosen-ciphertext attacks (CCA) security based on the discrete logarithm assumption and the decisional Diffie-Hellman assumption. Our proposed scheme not only has the ability to resist the continuous leakage attacks, but also enjoys very low computational overheads. Moreover, two concrete continuous leakage-resilient data storage and authorization protocols are generated from the above continuous leakage-resilient CBS scheme: one has a single key generation center and the other generates the keys in a distributed form. Therefore, our protocols with continuous leakage resilience are particularly suitable for data storage and authorization in cloud computing system.



中文翻译:

基于连续泄漏-弹性证书的签密方案及其在云计算中的应用

私人信息(例如秘密密钥)的泄漏已成为对计算系统安全性的严重威胁。现实世界中的安全应用程序应承受各种泄漏攻击,例如边信道攻击,冷启动攻击等,已成为普遍要求。例如,上述泄漏攻击在当今的云计算中非常普遍。因此,我们需要一种新颖的方法来保护数据存储和授权的安全性,即使任何对手都能获得有关秘密状态的一定量的泄漏信息。为了实现上述目标,在本文中,我们介绍了一种基于连续防泄漏,基于弹性证书的签密(CBS)方案,并且我们证明了我们提出的方案基于离散对数假设和决策Diffie-Hellman假设实现了选择密文攻击(CCA)安全性。我们提出的方案不仅具有抵抗连续泄漏攻击的能力,而且具有非常低的计算开销。此外,从上述连续防漏弹性CBS方案生成了两个具体的连续防漏弹性数据存储和授权协议:一个具有单个密钥生成中心,另一个具有分布式形式的密钥。因此,我们具有连续泄漏恢复能力的协议特别适用于云计算系统中的数据存储和授权。但计算开销也很低。此外,从上述连续防漏弹性CBS方案生成了两个具体的连续防漏弹性数据存储和授权协议:一个具有单个密钥生成中心,另一个具有分布式形式的密钥。因此,我们具有连续泄漏恢复能力的协议特别适用于云计算系统中的数据存储和授权。但计算开销也很低。此外,从上述连续防漏弹性CBS方案生成了两个具体的连续防漏弹性数据存储和授权协议:一个具有单个密钥生成中心,另一个具有分布式形式的密钥。因此,我们具有连续回弹性的协议特别适用于云计算系统中的数据存储和授权。

更新日期:2021-02-18
down
wechat
bug