Abstract
Although a large number of provably secure cryptographic primitives have been proposed in the literature, many of these schemes might be broken in practice because of various leakage attacks. Therefore, the leakage resilience property should be considered in designing these primitives. However, in identity-based cryptography, most of the existing leakage-resilient identity-based encryption (IBE) schemes suffer some limitations: they either resist the leakage attacks in the selective identity security model or achieve the chosen-ciphertext attack (CCA) security based on a non-static assumption. To further solve the above problems, in this paper, an IBE scheme with adaptive leakage-resilient chosen-plaintext attacks (CPA) security is proposed, and its security is rigorously proved in the random oracle model under a classic static assumption, e.g., decisional bilinear Diffie-Hellman (DBDH) assumption. In addition, the leakage-resilient CCA security can be obtained from the above CPA secure IBE scheme. That is, a generic method created leakage-resilient CCA secure public-key encryption is proposed, and the leakage-resilient CCA secure IBE scheme can also be created. Therefore, we propose a noval method to create leakage-resilient IBE scheme with CCA security from static complexity assumption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Tseng, Y.-M., Tsai, T.-T., Huang, S.-S., Ho, T.-C.: Leakage-resilient anonymous heterogeneous multi-receiver hybrid encryption in heterogeneous public-key system settings. IEEE Access 12, 28155–28168 (2024)
Chakraborty, S., Alawatugoda, J., Rangan, C.P.: New approach to practical leakage-resilient public-key cryptography. J. Math. Cryptol. 14(1), 172–201 (2020)
Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: CRYPTO 2009, CA, USA, August 16-20, 2009, pp. 18–35 (2009)
Liu, S., Weng, J., Zhao, Y.: Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks. In: CT-RSA 2013, San Francisco,CA, USA, February 25-March 1, 2013, pp. 84–100 (2013)
Li, J., Guo, Y., Qihong, Yu., Yang, L., Zhang, Y.: Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage. Sec. Commun. Netw. 9(10), 1016–1024 (2016)
Li, J., Teng, M., Zhang, Y., Qihong, Yu.: A leakage-resilient cca-secure identity-based encryption scheme. Comput. J. 59(7), 1066–1075 (2016)
Zhou, Y., Yang, B., Qiao, Z., Xia, Z., Zhang, M., Yi, M.: Leakage-resilient identity-based cryptography from minimal assumptions. Des. Codes Crypt. 91(11), 3757–3801 (2023)
Cai, C., Qin, X., Yuen, T.H., Yiu, S.-M.: Tight leakage-resilient identity-based encryption under multi-challenge setting. In: Suga, Y., Sakurai, K., Ding, X., Sako, K., (eds.) ASIA CCS ’22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022, pp. 42–53. ACM (2022)
Zhang, Y., Yang, M., Zheng, D., Zhang, T., Guo, R., Ren, F.: Leakage-resilient hierarchical identity-based encryption with recipient anonymity. Int. J. Found. Comput. Sci. 30(4), 665–681 (2019)
Huang, J., Huang, Q., Susilo, W.: Leakage-resilient ring signature schemes. Theoret. Comput. Sci. 759, 1–13 (2019)
Xiong, H., Yuen, T.H., Zhang, C., Yiu, S.-M., He, Y.J.: Leakage-resilient certificateless public key encryption. In: Chen, K., Xie, Q., Qiu, W., Xu, S., Zhao, Y., (eds.) Proceedings of the first ACM workshop on Asia public-key cryptography, AsiaPKC’13, Hangzhou, China, May 8, 2013, pp. 13–22. ACM (2013)
Guo, Y., Li, J., Yang, L., Zhang, Y., Zhang, F.: Provably secure certificate-based encryption with leakage resilience. Theoret. Comput. Sci. 711, 1–10 (2018)
Jui-Di, W., Tseng, Y.-M., Huang, S.-S., Tsai, T.-T.: Leakage-resilient certificate-based key encapsulation scheme resistant to continual leakage. IEEE Open J. Comput. Soc. 1, 131–144 (2020)
Tsai, T.-T., Tseng, Y.-M., Huang, S.-S.: Leakage-resilient anonymous multi-receiver certificate-based key encapsulation scheme. IEEE Access (2023)
Wang, Z., Cao, C., Yang, N., Chang, V.: ABE with improved auxiliary input for big data security. J. Comput. Syst. Sci. 89, 41–50 (2017)
Zhang, Y., Ling, Y., Chen, J., Wang, L.: Leakage-resilient attribute-based encryption with attribute-hiding. In: International Conference on Information Security and Cryptology, pp. 113–132. Springer, 2023
Li, S., Zhang, F.: Leakage-resilient identity-based encryption scheme. Int. J. Grid Util. Comput. 4(2/3), 187–196 (2013)
Yuen, T.H., Chow, S.S.M., Zhang, Y., Yiu, S.-M.: Identity-based encryption resilient to continual auxiliary leakage. In: Advances in Cryptology - EUROCRYPT 2012, Cambridge, UK, April 15-19, 2012. Proceedings, pp. 117–134 (2012)
Lewko, A.B., Rouselakis, Y., Waters, B.: Achieving leakage resilience through dual system encryption. In: TCC 2011, Providence, RI, USA, March 28–30, pp. 70–88 (2011)
Sun, S., Gu, D., Liu, S.: Efficient leakage-resilient identity-based encryption with CCA security. In: Pairing-Based Cryptography - Pairing 2013 - 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers, pp. 149–167 (2013)
Sun, S., Dawu, G., Huang, Z.: Fully secure wicked identity-based encryption against key leakage attacks. Comput. J. 58(10), 2520–2536 (2015)
Zhou, Y., Yang, B., Yi, M.: Continuous leakage-resilient identity-based encryption without random oracles. Comput. J. 61(4), 586–600 (2018)
Zhou, Y., Yang, B., Hou, H., Zhang, L., Wang, T., Mingxiao, H.: Continuous leakage-resilient identity-based encryption with tight security. Comput. J. 62(8), 1092–1105 (2019)
Tomita, T., Ogata, W., Kurosawa, K.: Cca-secure leakage-resilient identity-based key-encapsulation from simple (not \(\texttt{q}\) -type) assumptions. In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 3–22 (2019)
Hou, H., Yang, B., Zhang, M., Zhou, Y., Huang, M.: Fully secure wicked identity-based encryption resilient to continual auxiliary-inputs leakage. J. Inf. Sec. Appl. 53, 102521 (2020)
Boneh, D., Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. SIAM J. Comput. 36(5), 1301–1328 (2007)
Dodis, Y., Reyzin, L., Smith, A.D.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: EUROCRYPT 2004, Interlaken, Switzerland, May 2-6, 2004, pp. 523–540 (2004)
Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. IACR Cryptology ePrint Archive 2004, 332 (2004)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: CRYPTO 1984, Santa Barbara, California, USA, August 19-22, 1984, pp. 47–53 (1984)
Chow, S.S.M., Dodis, Y., Rouselakis, Y., Waters, B.: Practical leakage-resilient identity-based encryption from simple assumptions. In: CCS 2010, Chicago, Illinois, USA, October 4-8, 2010, pp. 152–161 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Qiao, Z., Xu, R., Lu, Y., Zhou, Y., Yang, B. (2025). A New Construction of Leakage-Resilient Identity-Based Encryption Scheme. In: Xia, Z., Chen, J. (eds) Information Security Practice and Experience. ISPEC 2024. Lecture Notes in Computer Science, vol 15053. Springer, Singapore. https://doi.org/10.1007/978-981-97-9053-1_8
Download citation
DOI: https://doi.org/10.1007/978-981-97-9053-1_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-9052-4
Online ISBN: 978-981-97-9053-1
eBook Packages: Computer ScienceComputer Science (R0)