A New Construction of Leakage-Resilient Identity-Based Encryption Scheme | SpringerLink
Skip to main content

A New Construction of Leakage-Resilient Identity-Based Encryption Scheme

  • Conference paper
  • First Online:
Information Security Practice and Experience (ISPEC 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 15053))

  • 50 Accesses

Abstract

Although a large number of provably secure cryptographic primitives have been proposed in the literature, many of these schemes might be broken in practice because of various leakage attacks. Therefore, the leakage resilience property should be considered in designing these primitives. However, in identity-based cryptography, most of the existing leakage-resilient identity-based encryption (IBE) schemes suffer some limitations: they either resist the leakage attacks in the selective identity security model or achieve the chosen-ciphertext attack (CCA) security based on a non-static assumption. To further solve the above problems, in this paper, an IBE scheme with adaptive leakage-resilient chosen-plaintext attacks (CPA) security is proposed, and its security is rigorously proved in the random oracle model under a classic static assumption, e.g., decisional bilinear Diffie-Hellman (DBDH) assumption. In addition, the leakage-resilient CCA security can be obtained from the above CPA secure IBE scheme. That is, a generic method created leakage-resilient CCA secure public-key encryption is proposed, and the leakage-resilient CCA secure IBE scheme can also be created. Therefore, we propose a noval method to create leakage-resilient IBE scheme with CCA security from static complexity assumption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 7550
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 9437
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Tseng, Y.-M., Tsai, T.-T., Huang, S.-S., Ho, T.-C.: Leakage-resilient anonymous heterogeneous multi-receiver hybrid encryption in heterogeneous public-key system settings. IEEE Access 12, 28155–28168 (2024)

    Article  Google Scholar 

  2. Chakraborty, S., Alawatugoda, J., Rangan, C.P.: New approach to practical leakage-resilient public-key cryptography. J. Math. Cryptol. 14(1), 172–201 (2020)

    Google Scholar 

  3. Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: CRYPTO 2009, CA, USA, August 16-20, 2009, pp. 18–35 (2009)

    Google Scholar 

  4. Liu, S., Weng, J., Zhao, Y.: Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks. In: CT-RSA 2013, San Francisco,CA, USA, February 25-March 1, 2013, pp. 84–100 (2013)

    Google Scholar 

  5. Li, J., Guo, Y., Qihong, Yu., Yang, L., Zhang, Y.: Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage. Sec. Commun. Netw. 9(10), 1016–1024 (2016)

    Article  Google Scholar 

  6. Li, J., Teng, M., Zhang, Y., Qihong, Yu.: A leakage-resilient cca-secure identity-based encryption scheme. Comput. J. 59(7), 1066–1075 (2016)

    Article  MathSciNet  Google Scholar 

  7. Zhou, Y., Yang, B., Qiao, Z., Xia, Z., Zhang, M., Yi, M.: Leakage-resilient identity-based cryptography from minimal assumptions. Des. Codes Crypt. 91(11), 3757–3801 (2023)

    Article  MathSciNet  Google Scholar 

  8. Cai, C., Qin, X., Yuen, T.H., Yiu, S.-M.: Tight leakage-resilient identity-based encryption under multi-challenge setting. In: Suga, Y., Sakurai, K., Ding, X., Sako, K., (eds.) ASIA CCS ’22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022, pp. 42–53. ACM (2022)

    Google Scholar 

  9. Zhang, Y., Yang, M., Zheng, D., Zhang, T., Guo, R., Ren, F.: Leakage-resilient hierarchical identity-based encryption with recipient anonymity. Int. J. Found. Comput. Sci. 30(4), 665–681 (2019)

    Article  MathSciNet  Google Scholar 

  10. Huang, J., Huang, Q., Susilo, W.: Leakage-resilient ring signature schemes. Theoret. Comput. Sci. 759, 1–13 (2019)

    Article  MathSciNet  Google Scholar 

  11. Xiong, H., Yuen, T.H., Zhang, C., Yiu, S.-M., He, Y.J.: Leakage-resilient certificateless public key encryption. In: Chen, K., Xie, Q., Qiu, W., Xu, S., Zhao, Y., (eds.) Proceedings of the first ACM workshop on Asia public-key cryptography, AsiaPKC’13, Hangzhou, China, May 8, 2013, pp. 13–22. ACM (2013)

    Google Scholar 

  12. Guo, Y., Li, J., Yang, L., Zhang, Y., Zhang, F.: Provably secure certificate-based encryption with leakage resilience. Theoret. Comput. Sci. 711, 1–10 (2018)

    Article  MathSciNet  Google Scholar 

  13. Jui-Di, W., Tseng, Y.-M., Huang, S.-S., Tsai, T.-T.: Leakage-resilient certificate-based key encapsulation scheme resistant to continual leakage. IEEE Open J. Comput. Soc. 1, 131–144 (2020)

    Article  Google Scholar 

  14. Tsai, T.-T., Tseng, Y.-M., Huang, S.-S.: Leakage-resilient anonymous multi-receiver certificate-based key encapsulation scheme. IEEE Access (2023)

    Google Scholar 

  15. Wang, Z., Cao, C., Yang, N., Chang, V.: ABE with improved auxiliary input for big data security. J. Comput. Syst. Sci. 89, 41–50 (2017)

    Article  MathSciNet  Google Scholar 

  16. Zhang, Y., Ling, Y., Chen, J., Wang, L.: Leakage-resilient attribute-based encryption with attribute-hiding. In: International Conference on Information Security and Cryptology, pp. 113–132. Springer, 2023

    Google Scholar 

  17. Li, S., Zhang, F.: Leakage-resilient identity-based encryption scheme. Int. J. Grid Util. Comput. 4(2/3), 187–196 (2013)

    Article  Google Scholar 

  18. Yuen, T.H., Chow, S.S.M., Zhang, Y., Yiu, S.-M.: Identity-based encryption resilient to continual auxiliary leakage. In: Advances in Cryptology - EUROCRYPT 2012, Cambridge, UK, April 15-19, 2012. Proceedings, pp. 117–134 (2012)

    Google Scholar 

  19. Lewko, A.B., Rouselakis, Y., Waters, B.: Achieving leakage resilience through dual system encryption. In: TCC 2011, Providence, RI, USA, March 28–30, pp. 70–88 (2011)

    Google Scholar 

  20. Sun, S., Gu, D., Liu, S.: Efficient leakage-resilient identity-based encryption with CCA security. In: Pairing-Based Cryptography - Pairing 2013 - 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers, pp. 149–167 (2013)

    Google Scholar 

  21. Sun, S., Dawu, G., Huang, Z.: Fully secure wicked identity-based encryption against key leakage attacks. Comput. J. 58(10), 2520–2536 (2015)

    Article  Google Scholar 

  22. Zhou, Y., Yang, B., Yi, M.: Continuous leakage-resilient identity-based encryption without random oracles. Comput. J. 61(4), 586–600 (2018)

    Article  MathSciNet  Google Scholar 

  23. Zhou, Y., Yang, B., Hou, H., Zhang, L., Wang, T., Mingxiao, H.: Continuous leakage-resilient identity-based encryption with tight security. Comput. J. 62(8), 1092–1105 (2019)

    Article  MathSciNet  Google Scholar 

  24. Tomita, T., Ogata, W., Kurosawa, K.: Cca-secure leakage-resilient identity-based key-encapsulation from simple (not \(\texttt{q}\) -type) assumptions. In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 3–22 (2019)

    Google Scholar 

  25. Hou, H., Yang, B., Zhang, M., Zhou, Y., Huang, M.: Fully secure wicked identity-based encryption resilient to continual auxiliary-inputs leakage. J. Inf. Sec. Appl. 53, 102521 (2020)

    Google Scholar 

  26. Boneh, D., Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. SIAM J. Comput. 36(5), 1301–1328 (2007)

    Article  MathSciNet  Google Scholar 

  27. Dodis, Y., Reyzin, L., Smith, A.D.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: EUROCRYPT 2004, Interlaken, Switzerland, May 2-6, 2004, pp. 523–540 (2004)

    Google Scholar 

  28. Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. IACR Cryptology ePrint Archive 2004, 332 (2004)

    Google Scholar 

  29. Shamir, A.: Identity-based cryptosystems and signature schemes. In: CRYPTO 1984, Santa Barbara, California, USA, August 19-22, 1984, pp. 47–53 (1984)

    Google Scholar 

  30. Chow, S.S.M., Dodis, Y., Rouselakis, Y., Waters, B.: Practical leakage-resilient identity-based encryption from simple assumptions. In: CCS 2010, Chicago, Illinois, USA, October 4-8, 2010, pp. 152–161 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yanwei Zhou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Qiao, Z., Xu, R., Lu, Y., Zhou, Y., Yang, B. (2025). A New Construction of Leakage-Resilient Identity-Based Encryption Scheme. In: Xia, Z., Chen, J. (eds) Information Security Practice and Experience. ISPEC 2024. Lecture Notes in Computer Science, vol 15053. Springer, Singapore. https://doi.org/10.1007/978-981-97-9053-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-9053-1_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-9052-4

  • Online ISBN: 978-981-97-9053-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics