{"title":"A continuous leakage-amplified IBE scheme with perfect key update","authors":"Zirui Qiao , Yong Yu , Yanwei Zhou , Dong Zheng","doi":"10.1016/j.tcs.2025.115545","DOIUrl":null,"url":null,"abstract":"<div><div>In the practical deployment of cryptographic solutions, diverse applications pose unique challenges in terms of leakage resilience. The one-size-fits-all approach of traditional cryptographic primitives and fixed leakage-resilient ability often fails to satisfy the nuanced security demands of different scenarios. Recognizing this, the concept of a continuous Identity-based Encryption (IBE) scheme has been introduced. This innovative approach allows for the dynamic adjustment of private key lengths to tailor the system’s resistance to various leakage attacks, based on the specific needs of an application. Despite the strides made, the existing implementations of this scheme exhibit limitations, particularly in the aspect of key updates. The current method for key updates is incomplete, only updating some elements of the key. This process relies on a trapdoor mechanism, which results in suboptimal storage efficiency. This paper introduces a new continuous leakage amplified IBE scheme to address these shortcomings. This improved model features a comprehensive key update mechanism that enables users to refresh every element of the private key without utilizing a trapdoor. Our analysis confirms that this enhanced IBE scheme stands out for its security, efficiency, and practicality. Moreover, in pursuit of optimizing performance, we present a novel general construction. This construction illustrates that it is feasible to construct an IBE scheme resilient against chosen-ciphertext attacks, equipped with an impeccable update function, by building upon any semantically secure IBE scheme.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1055 ","pages":"Article 115545"},"PeriodicalIF":1.0000,"publicationDate":"2025-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Theoretical Computer Science","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0304397525004839","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
Abstract
In the practical deployment of cryptographic solutions, diverse applications pose unique challenges in terms of leakage resilience. The one-size-fits-all approach of traditional cryptographic primitives and fixed leakage-resilient ability often fails to satisfy the nuanced security demands of different scenarios. Recognizing this, the concept of a continuous Identity-based Encryption (IBE) scheme has been introduced. This innovative approach allows for the dynamic adjustment of private key lengths to tailor the system’s resistance to various leakage attacks, based on the specific needs of an application. Despite the strides made, the existing implementations of this scheme exhibit limitations, particularly in the aspect of key updates. The current method for key updates is incomplete, only updating some elements of the key. This process relies on a trapdoor mechanism, which results in suboptimal storage efficiency. This paper introduces a new continuous leakage amplified IBE scheme to address these shortcomings. This improved model features a comprehensive key update mechanism that enables users to refresh every element of the private key without utilizing a trapdoor. Our analysis confirms that this enhanced IBE scheme stands out for its security, efficiency, and practicality. Moreover, in pursuit of optimizing performance, we present a novel general construction. This construction illustrates that it is feasible to construct an IBE scheme resilient against chosen-ciphertext attacks, equipped with an impeccable update function, by building upon any semantically secure IBE scheme.
期刊介绍:
Theoretical Computer Science is mathematical and abstract in spirit, but it derives its motivation from practical and everyday computation. Its aim is to understand the nature of computation and, as a consequence of this understanding, provide more efficient methodologies. All papers introducing or studying mathematical, logic and formal concepts and methods are welcome, provided that their motivation is clearly drawn from the field of computing.