Paper 2013/323

Encryption Schemes with Post-Challenge Auxiliary Inputs

Tsz Hon Yuen, Ye Zhang, and Siu-Ming Yiu

Abstract

In this paper, we tackle the open problem of proposing a leakage-resilience encryption model that can capture leakage from both the secret key owner and the encryptor, in the auxiliary input model. Existing models usually do not allow adversaries to query more leakage information after seeing the challenge ciphertext of the security games. On one hand, side-channel attacks on the random factor (selected by the encryptor) are already shown to be feasible. Leakage from the encryptor should not be overlooked. On the other hand, the technical challenge for allowing queries from the adversary after he sees the ciphertext is to avoid a trivial attack to the system since he can then embed the decryption function as the leakage function (note that we consider the auxiliary input model in which the leakage is modeled as computationally hard-to-invert functions). We solve this problem by defining the post-challenge auxiliary input model in which the family of leakage functions must be defined before the adversary is given the public key. Thus the adversary cannot embed the decryption function as a leakage function after seeing the challenge ciphertext while is allowed to make challenge-dependent queries. This model is able to capture a wider class of real-world side-channel attacks. To realize our model, we propose a generic transformation from the auxiliary input model to our new post-challenge auxiliary input model for both public key encryption (PKE) and identity-based encryption (IBE). Furthermore, we extend Canetti et al.'s technique, that converts CPA-secure IBE to CCA-secure PKE, into the leakage-resilient setting. More precisely, we construct a CCA-secure PKE in the post-challenge auxiliary input model, by using strong one-time signatures and strong extractor with hard-to-invert auxiliary inputs, together with a CPA-secure IBE in the auxiliary input model. Moreover, we extend our results to signatures, to obtain fully leakage-resilient signatures with auxiliary inputs using standard signatures and strong extractor with hard-to-invert auxiliary inputs. It is more efficient than the existing fully leakage-resilient signature schemes.

Metadata
Available format(s)
PDF PS
Category
Public-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
leakage-resilientauxiliary inputsrandomness
Contact author(s)
thyuen @ cs hku hk
History
2013-06-02: received
Short URL
https://ia.cr/2013/323
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2013/323,
      author = {Tsz Hon Yuen and Ye Zhang and Siu-Ming Yiu},
      title = {Encryption Schemes with Post-Challenge Auxiliary Inputs},
      howpublished = {Cryptology ePrint Archive, Paper 2013/323},
      year = {2013},
      note = {\url{https://eprint.iacr.org/2013/323}},
      url = {https://eprint.iacr.org/2013/323}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.