Loading...
Please wait, while we are loading the content...
A CCA-PKE Secure-Cryptosystem Resilient to Randomness Reset and Secret-Key Leakage
| Content Provider | MDPI |
|---|---|
| Author | Labao, Alfonso Adorna, Henry |
| Copyright Year | 2022 |
| Abstract | In recent years, several new notions of security have begun receiving consideration for public-key cryptosystems, beyond the standard of security against adaptive chosen ciphertext attack (CCA2). Among these are security against randomness reset attacks, in which the randomness used in encryption is forcibly set to some previous value, and against constant secret-key leakage attacks, wherein the constant factor of a secret key’s bits is leaked. In terms of formal security definitions, cast as attack games between a challenger and an adversary, a joint combination of these attacks means that the adversary has access to additional encryption queries under a randomness of his own choosing along with secret-key leakage queries. This implies that both the encryption and decryption processes of a cryptosystem are being tampered under this security notion. In this paper, we attempt to address this problem of a joint combination of randomness and secret-key leakage attacks through two cryptosystems that incorporate hash proof system and randomness extractor primitives. The first cryptosystem relies on the random oracle model and is secure against a class of adversaries, called non-reversing adversaries. We remove the random oracle oracle assumption and the non-reversing adversary requirement in our second cryptosystem, which is a standard model that relies on a proposed primitive called |
| Starting Page | 2 |
| e-ISSN | 2410387X |
| DOI | 10.3390/cryptography6010002 |
| Journal | Cryptography |
| Issue Number | 1 |
| Volume Number | 6 |
| Language | English |
| Publisher | MDPI |
| Publisher Date | 2022-01-04 |
| Access Restriction | Open |
| Subject Keyword | Cryptography Hardware and Architecturee Public-key Encryption Chosen Ciphertext Attack Randomness Attack Secret-key Leakage Attack |
| Content Type | Text |
| Resource Type | Article |