A continuous leakage-amplified IBE scheme with perfect key update

IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS
Zirui Qiao , Yong Yu , Yanwei Zhou , Dong Zheng
{"title":"A continuous leakage-amplified IBE scheme with perfect key update","authors":"Zirui Qiao ,&nbsp;Yong Yu ,&nbsp;Yanwei Zhou ,&nbsp;Dong Zheng","doi":"10.1016/j.tcs.2025.115545","DOIUrl":null,"url":null,"abstract":"<div><div>In the practical deployment of cryptographic solutions, diverse applications pose unique challenges in terms of leakage resilience. The one-size-fits-all approach of traditional cryptographic primitives and fixed leakage-resilient ability often fails to satisfy the nuanced security demands of different scenarios. Recognizing this, the concept of a continuous Identity-based Encryption (IBE) scheme has been introduced. This innovative approach allows for the dynamic adjustment of private key lengths to tailor the system’s resistance to various leakage attacks, based on the specific needs of an application. Despite the strides made, the existing implementations of this scheme exhibit limitations, particularly in the aspect of key updates. The current method for key updates is incomplete, only updating some elements of the key. This process relies on a trapdoor mechanism, which results in suboptimal storage efficiency. This paper introduces a new continuous leakage amplified IBE scheme to address these shortcomings. This improved model features a comprehensive key update mechanism that enables users to refresh every element of the private key without utilizing a trapdoor. Our analysis confirms that this enhanced IBE scheme stands out for its security, efficiency, and practicality. Moreover, in pursuit of optimizing performance, we present a novel general construction. This construction illustrates that it is feasible to construct an IBE scheme resilient against chosen-ciphertext attacks, equipped with an impeccable update function, by building upon any semantically secure IBE scheme.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1055 ","pages":"Article 115545"},"PeriodicalIF":1.0000,"publicationDate":"2025-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Theoretical Computer Science","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0304397525004839","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

Abstract

In the practical deployment of cryptographic solutions, diverse applications pose unique challenges in terms of leakage resilience. The one-size-fits-all approach of traditional cryptographic primitives and fixed leakage-resilient ability often fails to satisfy the nuanced security demands of different scenarios. Recognizing this, the concept of a continuous Identity-based Encryption (IBE) scheme has been introduced. This innovative approach allows for the dynamic adjustment of private key lengths to tailor the system’s resistance to various leakage attacks, based on the specific needs of an application. Despite the strides made, the existing implementations of this scheme exhibit limitations, particularly in the aspect of key updates. The current method for key updates is incomplete, only updating some elements of the key. This process relies on a trapdoor mechanism, which results in suboptimal storage efficiency. This paper introduces a new continuous leakage amplified IBE scheme to address these shortcomings. This improved model features a comprehensive key update mechanism that enables users to refresh every element of the private key without utilizing a trapdoor. Our analysis confirms that this enhanced IBE scheme stands out for its security, efficiency, and practicality. Moreover, in pursuit of optimizing performance, we present a novel general construction. This construction illustrates that it is feasible to construct an IBE scheme resilient against chosen-ciphertext attacks, equipped with an impeccable update function, by building upon any semantically secure IBE scheme.
具有完美密钥更新的连续泄漏放大IBE方案
在加密解决方案的实际部署中,不同的应用程序在泄漏弹性方面提出了独特的挑战。传统密码原语的一刀切方法和固定的防泄漏能力往往不能满足不同场景的细微安全需求。认识到这一点,引入了连续基于身份的加密(IBE)方案的概念。这种创新的方法允许动态调整私钥长度,以根据应用程序的特定需求定制系统对各种泄漏攻击的抵抗力。尽管取得了进步,但该方案的现有实现仍然存在局限性,特别是在密钥更新方面。当前用于键更新的方法是不完整的,仅更新键的某些元素。这个过程依赖于一个活板门机制,这导致了次优的存储效率。本文介绍了一种新的连续泄漏放大IBE方案来解决这些缺点。这种改进的模型具有全面的密钥更新机制,使用户可以在不使用活板门的情况下刷新私钥的每个元素。我们的分析证实,这种增强的IBE方案以其安全性、效率和实用性脱颖而出。此外,为了优化性能,我们提出了一种新的通用结构。这种构造说明,通过构建任何语义安全的IBE方案,可以构造具有抗选择密文攻击弹性的IBE方案,并配备无可挑剔的更新功能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Theoretical Computer Science
Theoretical Computer Science 工程技术-计算机:理论方法
CiteScore
2.60
自引率
18.20%
发文量
471
审稿时长
12.6 months
期刊介绍: Theoretical Computer Science is mathematical and abstract in spirit, but it derives its motivation from practical and everyday computation. Its aim is to understand the nature of computation and, as a consequence of this understanding, provide more efficient methodologies. All papers introducing or studying mathematical, logic and formal concepts and methods are welcome, provided that their motivation is clearly drawn from the field of computing.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信