Don’t Tamper with Dual System Encryption: Beyond Polynomial Related-Key Security of IBE

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In related-key attacks (RKA), an attacker modifies a secret key stored in a device by tampering or fault injection and observes the evaluation output of the cryptographic algorithm based on this related key. In this work, we show that the dual system encryption methodology of Waters (Crypto 2009) fits well with RKA security. We apply simple modifications to a regularly-secure identity-based encryption (IBE) scheme (TCC 2010) constructed through dual system to achieve RKA security for rational functions, which is beyond the polynomial barrier of Bellare et al. ’s framework (Asiacrypt 2012). We achieve security by pushing the complexity of RKA directly down to the underlying intractability assumption. We also discuss how to extend it to a hierarchical IBE scheme that remains secure against RKA over identity-based secret keys beyond the master secret, albeit under some structural constraints.

Cite

CITATION STYLE

APA

Yuen, T. H., Zhang, C., & Chow, S. S. M. (2022). Don’t Tamper with Dual System Encryption: Beyond Polynomial Related-Key Security of IBE. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 13269 LNCS, pp. 419–439). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-09234-3_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free