{"title":"具有抗侧信道攻击的相等性测试的防泄漏无证书公钥加密","authors":"Tung-Tso Tsai, Jung-Hao Yang","doi":"10.1016/j.comnet.2025.111485","DOIUrl":null,"url":null,"abstract":"<div><div>Public key encryption (PKE) has revolutionized modern cryptography, providing robust security for communication and data protection. However, traditional PKE schemes rely heavily on certificates, resulting in complex and inefficient certificates management problem. To address this problem, certificateless public key encryption (CL-PKE) was introduced to offer a more flexible and efficient approach for key distribution and management. While CL-PKE provides advancements in key management, it is unable to carry out equality tests on ciphertexts, which is essential for tasks such as verification of encrypted data (ciphertexts). To tackle this limitation, the integration of an equality test into CL-PKE, namely certificateless public key encryption with equality test (CL-PKEET), has been proposed. Recent discoveries have highlighted the insecurity of public-key systems due to side-channel attacks. To the best of our knowledge, no CL-PKEET scheme has been proposed to withstand such attacks. Hence, our objective is to present the <em>first</em> CL-PKEET scheme capable of withstanding side-channel attacks, which we call the leakage-resilient CL-PKEET (LR-CL-PKEET) scheme. The proposed scheme offers IND-CCA security and OW-CCA security. Furthermore, the scheme ensures robust security even in the presence of side-channel attacks.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"270 ","pages":"Article 111485"},"PeriodicalIF":4.6000,"publicationDate":"2025-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Leakage-resilient certificateless public key encryption with equality test resistant to side-channel attacks\",\"authors\":\"Tung-Tso Tsai, Jung-Hao Yang\",\"doi\":\"10.1016/j.comnet.2025.111485\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Public key encryption (PKE) has revolutionized modern cryptography, providing robust security for communication and data protection. However, traditional PKE schemes rely heavily on certificates, resulting in complex and inefficient certificates management problem. To address this problem, certificateless public key encryption (CL-PKE) was introduced to offer a more flexible and efficient approach for key distribution and management. While CL-PKE provides advancements in key management, it is unable to carry out equality tests on ciphertexts, which is essential for tasks such as verification of encrypted data (ciphertexts). To tackle this limitation, the integration of an equality test into CL-PKE, namely certificateless public key encryption with equality test (CL-PKEET), has been proposed. Recent discoveries have highlighted the insecurity of public-key systems due to side-channel attacks. To the best of our knowledge, no CL-PKEET scheme has been proposed to withstand such attacks. Hence, our objective is to present the <em>first</em> CL-PKEET scheme capable of withstanding side-channel attacks, which we call the leakage-resilient CL-PKEET (LR-CL-PKEET) scheme. The proposed scheme offers IND-CCA security and OW-CCA security. Furthermore, the scheme ensures robust security even in the presence of side-channel attacks.</div></div>\",\"PeriodicalId\":50637,\"journal\":{\"name\":\"Computer Networks\",\"volume\":\"270 \",\"pages\":\"Article 111485\"},\"PeriodicalIF\":4.6000,\"publicationDate\":\"2025-06-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1389128625004529\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625004529","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
Leakage-resilient certificateless public key encryption with equality test resistant to side-channel attacks
Public key encryption (PKE) has revolutionized modern cryptography, providing robust security for communication and data protection. However, traditional PKE schemes rely heavily on certificates, resulting in complex and inefficient certificates management problem. To address this problem, certificateless public key encryption (CL-PKE) was introduced to offer a more flexible and efficient approach for key distribution and management. While CL-PKE provides advancements in key management, it is unable to carry out equality tests on ciphertexts, which is essential for tasks such as verification of encrypted data (ciphertexts). To tackle this limitation, the integration of an equality test into CL-PKE, namely certificateless public key encryption with equality test (CL-PKEET), has been proposed. Recent discoveries have highlighted the insecurity of public-key systems due to side-channel attacks. To the best of our knowledge, no CL-PKEET scheme has been proposed to withstand such attacks. Hence, our objective is to present the first CL-PKEET scheme capable of withstanding side-channel attacks, which we call the leakage-resilient CL-PKEET (LR-CL-PKEET) scheme. The proposed scheme offers IND-CCA security and OW-CCA security. Furthermore, the scheme ensures robust security even in the presence of side-channel attacks.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.