http://scholars.ntou.edu.tw/handle/123456789/25194
標題: | Leakage-Resilient Anonymous Heterogeneous Multi-Receiver Hybrid Encryption in Heterogeneous Public-Key System Settings | 作者: | Tseng, Yuh-Min Tsai, Tung-Tso Huang, Sen-Shan Ho, Ting-Chieh |
關鍵字: | Public key;Receivers;Encryption;Games;Symbols;Side-channel attacks;Resilience;Multichip modules;Heterogeneous networks;Leakage currents;Multi-receiver;hybrid encryption;heterogeneous public-key environment;anonymity;leakage-r | 公開日期: | 2024 | 出版社: | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | 卷: | 12 | 起(迄)頁: | 28155-28168 | 來源出版物: | IEEE ACCESS | 摘要: | By side-channel attacks, a fraction part of secret keys used in cryptographic schemes could be leaked to adversaries. Recently, adversaries have realized practical side-channel attacks so that these existing cryptographic schemes could be broken. Indeed, researchers have invested and proposed a good approach to withstand such attacks, called as leakage-resilient cryptography. Very recently, several leakage-resilient anonymous multi-receiver encryption (LR-AMRE) schemes based on various public-key systems were also proposed. However, these LR-AMRE schemes are not suitable for a heterogeneous public-key environment under which an authorized receiver group includes heterogeneous receivers under various PKS settings and these receivers have various types of secret/public key pairs. In this article, we propose the $first$ leakage-resilient anonymous heterogeneous multi-receiver hybrid encryption (LR-AHMR-HE) scheme for the heterogeneous public-key system settings. A new framework and associated adversary games of the LR-AHMR-HE scheme are defined. In the adversary games, adversaries are admitted to continuously intercept a fraction part of secret keys. Under the adversary games, formal security proofs are provided to show that the proposed scheme is secure against two types of adversaries (illegitimate user and malicious authority). Comparisons with several related previous schemes are demonstrated to present the merits of our scheme. |
URI: | http://scholars.ntou.edu.tw/handle/123456789/25194 | ISSN: | 2169-3536 | DOI: | 10.1109/ACCESS.2024.3368442 |
顯示於: | 資訊工程學系 |
在 IR 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。