Due to the popularity of mobile communication, many computing devices are exposed to remote environments without physical protection so that these devices easily suffer from leakage attacks (e.g., side-channel attacks). Under such leakage attacks, when a computing device performs some cryptographic algorithm, an adversary may acquire partial bits of secret keys participated in this cryptographic algorithm. To resist leakage attacks, researchers offer leakage-resilient cryptography as a solution. A signcryption scheme combines signing and encrypting processes to simultaneously provide both authentication and confidentiality, which is an important cryptographic primitive. Indeed, many leakage-resilient signcryption schemes under various public key system (PKS) settings were proposed. Unfortunately, these schemes still have two shortcomings, namely, bounded leakage resilience and conditionally continuous leakage resilience. In this paper, a “fully” continuous leakage-resilient certificate-based signcryption (FCLR-CBSC) scheme is proposed. Security analysis is formally proved to show that our scheme possesses both authentication and confidentiality against two types of adversaries in the certificate-based PKS setting. Performance analysis and simulation experience show that our scheme is suited to run on both a PC and a mobile device.
In the traditional public key system (PKS) setting (Rivest et al., 1978), a public-key infrastructure (PKI) needs to be established to create and manage each member’s certificate, which is used to validate the member’s public key. To lighten the PKI establishment cost, Boneh and Franklin (2001) presented a practical identity-based PKS (ID-PKS) setting with bilinear pairings, in which a member’s identity is regarded as the member’s public key and no certificate is needed. However, the ID-PKS setting suffers from a constitutional key escrow problem. In 2003, the certificateless PKS (CL-PKS) (Al-Riyami and Paterson, 2003) and the certificate-based PKS (CB-PKS) (Gentry, 2003) settings were constructed respectively to clear up the key escrow problem. Afterwards, the research of various cryptographic mechanisms under the CB-PKS and the CL-PKS settings have been thoroughly studied.
Typically, the security of these cryptographic mechanisms under these PKS settings mentioned above is dependent on the security of secret keys participated in these cryptographic mechanisms, and so these secret keys must be entirely concealed to adversaries. However, due to the popularity of mobile communication, many computing devices are exposed to remote environments without physical protection so that these devices easily suffer from leakage attacks (e.g. side-channel attacks) (Kocher et al., 1999; Brumley and Boneh, 2005; Biham et al., 2008). By leakage attacks, when a computing device performs some cryptographic algorithm, an adversary may acquire partial bits of secret keys participated in this algorithm. To resist such leakage attacks, researchers offer leakage-resilient cryptography as a solution. In the past, numerous leakage-resilient signature (LRS) schemes (Galindo and Virek, 2013; Wu et al., 2019; Tseng et al., 2020; Wu et al., 2020b), leakage-resilient encryption (LRE) schemes (Kiltz and Pietrzak, 2010; Galindo et al., 2016; Wu et al., 2018, 2020a; Tseng et al., 2022), and leakage-resilient authenticated key agreement protocols (Tseng et al., 2021; Peng et al., 2021; Tsai et al., 2022) under various PKS settings have been published in the literature.
For reducing communication and computation costs, a signcryption scheme (Zheng, 1997) combines signing and encrypting processes in a mechanism to simultaneously provide both authentication and confidentiality, which is an important cryptographic primitive. In the past, some signcryption schemes under various PKS settings have been proposed that include PKI-based signcryption (PKI-SC) schemes (Ullah et al., 2020; Ali et al., 2020), certificateless signcryption (CLSC) schemes (Khan et al., 2020; Wu et al., 2022) and certificate-based signcryption (CBSC) schemes (Ullah et al., 2019; Hussain et al., 2020). Nevertheless, these signcryption schemes mentioned above are unable to resist leakage attacks. Indeed, several leakage-resilient (LR) signcryption schemes under the CL-PKS and the CB-PKS settings have been proposed. However, these LR signcryption schemes still have two shortcomings, that is, bounded leakage resilience and conditionally continuous leakage resilience, which will be discussed later. Hence, in this paper, we aim to propose a “fully” continuous leakage-resilient certificate-based signcryption (FCLR-CBSC) scheme to remove the shortcomings of the previously proposed schemes.
Related Work
Here, let’s introduce two types of leakage attack models, that is, bounded and continuous (i.e. unbounded). The bounded leakage attack model has an impractical property that entire leaked bits of a secret key are bounded in a fractional proportion of the secret key during the usage life of an LR algorithm (Alwen et al., 2009; Katz and Vaikuntanathan, 2009). In such a case, when the leaked bit number of the secret key exceeds the proportion, the secret key can no longer be used. Contrarily, the continuous leakage attack model allows adversaries to continuously obtain a secret key’s partial bits in each usage of the secret key during the usage life of the associated LR algorithm. Therefore, an LR cryptographic scheme against continuous leakage attacks has the unbounded leakage property and is more suitable for real practical environments (Kiltz and Pietrzak, 2010; Galindo and Virek, 2013).
As mentioned earlier, several LR signcryption schemes under the CL-PKS and the CB-PKS settings have been proposed to remove the key escrow problem. Here, let’s review these LR certificateless signcryption (LR-CLSC) (Zhou et al., 2016; Yang et al., 2019) and LR certificate-based signcryption (LR-CBSC) (Zhou et al., 2021) schemes. Zhou et al. (2016) adopted a non-interactive zero-knowledge mechanism to propose an LR-CLSC scheme. As we know, the usage of the non-interactive zero-knowledge mechanism is very time-consuming so that Zhou et al.’s scheme is unsuitable for mobile devices. Subsequently, Yang et al. (2019) presented an improvement on Zhou et al.’s scheme to remove the usage of the non-interactive zero-knowledge mechanism to achieve better performance. However, both schemes (Zhou et al., 2016; Yang et al., 2019) are only secure against bounded leakage attacks and cannot resist the attacks of adversaries with continuous leakage abilities.
To achieve continuous leakage-resilient property, Zhou et al. (2021) first presented a bounded LR-CBSC scheme and adopted the secret key update method proposed by Dodis et al. (2010) to obtain a “conditionally” continuous LR-CBSC (CCLR-CBSC) scheme. That is, by Dodis et al.’s secret key update method, a continuous version is constructed from the associated bounded LR cryptographic scheme. However, Kiltz and Pietrzak (2010) have previously shown that Dodis et al.’s secret key update method has a shortcoming in the sense that the key update process itself does not allow adversaries to leak any bits of the secret key even if the secret key actually participates in the computation of the key update method. Therefore, Zhou et al.’s scheme only possesses the “conditionally” continuous leakage-resilient property.
Contributions
As mentioned earlier, the LR-CLSC schemes in Zhou et al. (2016), Yang et al. (2019) are only secure against bounded leakage attacks and the CCLR-CBSC scheme in Zhou et al. (2021) only possesses the “conditionally” continuous leakage-resilient property. In this paper, a “fully” CLR-CBSC (FCLR-CBSC) scheme is proposed. In our FCLR-CBSC scheme, there are two roles, namely, a trusted certificate authority (CA) and members. A member sets the associated member secret key . The CA uses its own secret key to compute the member’s certificate using the member ’s identity information and public key, and returns it back to the member . By combining the adversary models of both the LR certificate-based signature (LR-CBS) scheme (Wu et al., 2019) and the LR certificate-based encryption (LR-CBE) scheme (Wu et al., 2020a), we define the adversary model of the FCLR-CBSC scheme. In this adversary model, there are two types of adversaries that include an uncertified member and the honest-but-curious CA.
Comparisons between the related schemes and our scheme.
Scheme
Zhou et al.’s LR-CLSC scheme (2016)
Yang et al.’s LR-CLSC scheme (2019)
Zhou et al.’s CCLR-CBSC scheme (2021)
Our proposed FCLR-CBSC scheme
PKS setting
CL-PKS
CL-PKS
CB-PKS
CB-PKS
Leakage of a member’s secret key
Allowed
Allowed
Allowed
Allowed
Leakage of the system’s secret key
Not allowed
Not allowed
Allowed
Allowed
Leakage model
Bounded
Bounded
Conditionally continuous
Fully continuous
To realize the “fully” continuous leakage-resilient property, our scheme adopts the key update method proposed by Kiltz and Pietrzak (2010) to update the member ’s secret key and certificate participated in both the signcryption and the unsigncryption algorithms, and the CA’s secret key participated in the certificate generation algorithm. In the process of the key update method, these secret keys or certificates are allowed to be leaked by an adversary so that our scheme has the fully continuous leakage-resilient property. Table 1 lists the comparisons between the LR-CLSC schemes in Zhou et al. (2016), Yang et al. (2019), the CCLR-CBSC scheme in Zhou et al. (2021) and our FCLR-CBSC scheme in terms of PKS setting, leakage of a member’s secret key, leakage of the system’s secret key and leakage model. It is obvious that only our scheme achieves the fully continuous leakage-resilient property and tolerates the leakages of both the system’s secret key and a member’s secret key. Finally, we employ the security proving method of the generic bilinear group (GBG) model (Boneh et al., 2005) to show that our scheme possesses both authentication and confidentiality against two types of adversaries in the CB-PKS setting. Also, performance analysis and simulation experience demonstrate that our scheme is suited to run on both a PC and a mobile device.
Paper Structure
The remainder of this paper comprises six parts. Four preliminaries are introduced in Section 2. We define a new framework and security model of FCLR-CBSC schemes in Section 3. In Section 4, our FCLR-CBSC scheme is demonstrated. The security analysis of our scheme is given in Section 5. Performance analysis and conclusions are given in Sections 6 and 7, respectively.
Preliminaries
Bilinear Pairing Set
Let be a bilinear pairing set. The reader can refer to Boneh and Franklin (2001) for the parameter selections of the bilinear pairing set. and are, respectively, generators of the multiplicative groups and with the same prime order p. The bilinear pairing function satisfies three properties as presented below:
Bilinear property: , for any .
Non-degenerate property: .
Computable property: can be effectively computed for any .
Security Assumptions
Our proposed FCLR-CBSC scheme is based on two security assumptions as presented below:
Strong-collision-resistant hash (SCRH) assumption: Let a hash function , l is a large integer, be strong-collision-resistant. Namely, it is difficult to get two different strings such that .
Discrete logarithm (DL) assumption: In the bilinear pairing set presented earlier, it is difficult to compute for given or .
Generic Bilinear Group Model
The generic bilinear group (GBG) model (Boneh et al., 2005) is a security proving technique of cryptographic schemes. This GBG model is combined into the security game of a cryptographic scheme. In the security game played by an adversary and a challenger, the challenger first creates a bilinear pairing set . When the adversary performs operations in the bilinear pairing set, it must request the associated queries to the challenger that include the multiplicative query of , the multiplicative query of and the bilinear pairing query . Additionally, the challenger sets two injective random mappings to respectively encode every element of and to a distinct bit string, namely, and that satisfy and . The behaviours of three associated queries , and , for , are defined as follows:
.
.
.
Note that and equal and , respectively. Finally, the adversary would answer the DL problem on if it found any collision on after finishing the security game.
Entropy Evaluation of Secret Keys
Later, we will employ the entropy evaluation of secret keys with partial leakage to establish the security theorems of the proposed scheme. Here, we first introduce two previous consequences. In 2008, Dodis et al. (2008) presented a result (Lemma 1 below) about the entropy evaluation of a secret key K under the leakage function , where and ω is the leakage bit size. Moreover, Galindo and Virek (2013) discussed the entropy evaluation of multiple secret keys to obtain the other result (Lemma 2 below).
Let K be a secret key andbe its associated leakage function, where ω is the leakage bit size. Under the leakage function F, we have, whereanddenote the min-entropy and the average conditional min-entropy, respectively.
Letbe multiple secret keys participated in a computation formula. Letdenote a multiple-variable polynomial that has the degree d. Assume thatdenotes the probability distribution ofunder a leakage functionwith the leakage bit size ω. Thus, we have, for. When allare mutually independent, we have, which is negligible if, where ε is a positive fraction.
Notations, Framework and Adversary Model
An FCLR-CBSC scheme composes of two roles, namely, a trusted certificate authority (CA) and members. A member (a sender or a receiver ) first sets the member’s secret key and first public key , and transmits (, ) to the CA. The CA uses a secret key to compute and return the member’s certificate and second public key to the member via a secure channel. By taking as input a message and the public key pair of the receiver , the sender uses her/his certificate and secret key to compute a ciphertext and send (, ) to the receiver . By taking as input a ciphertext and the public key pair () of the sender , the receiver returns if is “Valid”; otherwise returns “Invalid”. The system model of the FCLR-CBSC scheme is depicted in Fig. 1.
The system model of an FCLR-CBSC scheme.
To achieve fully continuous leakage-resilient property (Kiltz and Pietrzak, 2010; Galindo and Virek, 2013), every secret key or certificate in the system is partitioned into two parts, which must be updated before being participated in each computation round. Assume that the CA’s secret key is initially partitioned into the beginning secret key pair (, ). Additionally, let the CA’s current secret key pair be (), which must be updated to when it participates in the i-th invocation of the certificate generation algorithm. Note that we have . For the same reason, the member ’s secret key and certificate are initially partitioned into the beginning secret key pair (, ) and the certificate pair (, ), respectively. Let the member ’s current secret key and certificate pairs be, respectively, and , which must be updated to and when they participate in the j-th invocation of the signcryption or unsigncryption algorithm. Note that we have and .
In the following, we first present some symbols and notations used in the proposed FCLR-CBSC scheme. Subsequently, a new framework and adversary model of FCLR-CBSC schemes are defined.
Symbols and Notations
For reference, the symbols and notations used in the proposed scheme are summarized in Table 2.
Symbols and notations.
Symbols/notations
Meanings
a public parameter set
the CA’s public key
the CA’s secret key
the CA’s beginning secret key pair
the CA’s i-th secret key pair
the identity of a member (a sender or a receiver )
the public key pair of
the certificate of
the beginning secret key pair of
the j-th secret key pair of
the certificate of
the beginning certificate pair of
the j-th certificate pair of
a hash function
symmetric-key encryption/decryption functions
the identity of a sender (it is also a member)
the identity of a receiver (it is also a member)
a message
a ciphertext
Framework
Based on the frameworks of both the LR-CBS (Wu et al., 2019) and the LR-CBE (Wu et al., 2020a) schemes, a new framework of FCLR-CBSC schemes is defined as follows.
An FCLR-CBSC scheme comprises five algorithms as presented below:
Initialization: The CA runs this algorithm to compute the CA’s secret key and system public key while generating and publishing a public parameter set . Additionally, the CA also partitions to set the beginning secret key pair .
Member secret key generation: A member (a sender or a receiver ) runs this algorithm to compute her/his secret key and first public key . Additionally, the member partitions to set the beginning secret key pair (). Finally, the member sends () to the CA.
Certificate generation: Assume that the CA’s current secret key pair is (). The CA first obtains a new current secret key pair () by updating (). Upon receiving (, ) from the member , the CA creates and returns the certificate and second public key to the member . Upon receiving (, ), the member sets her/his beginning certificate pair (, ) and public key pair (, ).
Signcryption: Assume that the sender ’s current certificate and secret key pairs are, respectively, (, ) and (, ). The sender first obtains a new current certificate pair (, ) and secret key pair (, ) by updating (, ) and (, ), respectively. By taking as input a message and the public key pair () of the receiver , the sender runs this algorithm to return a ciphertext .
Unsigncryption: Assume that the receiver ’s current certificate and secret key pairs are, respectively, (, ) and (, ). The receiver first obtains a new current certificate pair (, ) and secret key pair (, ) by updating (, ) and (, ), respectively. By taking as input a ciphertext and the public key pair () of the sender , the receiver returns if is “Valid”; otherwise returns “Invalid”.
Adversary Model
Here, six continuous leakage functions , , , , and are used to simulate the leakage abilities of adversaries. In the i-th invocation of the Certificate generation algorithm, an adversary could obtain partial bits of the CA’s current secret key pair () by and . In the j-th invocation of the Signcryption algorithm, an adversary could obtain partial bits of the sender ’s current certificate pair (, ) and secret key pair (, ) by and . In the k-th invocation of the Unsigncryption algorithm, an adversary could obtain partial bits of the receiver ’s current certificate pair (, ) and secret key pair (, ) by and . Let ω be the maximal leakage bit length for each leakage function. Let , , , , and , respectively, denote their outputs of the six leakage functions. Therefore, we have , , , , , and their inputs/outputs are presented as follows:
.
.
.
.
.
.
Based on the adversary models of both the LR-CBS (Wu et al., 2019) and the LR-CBE (Wu et al., 2020a) schemes, we define a new adversary model of FCLR-CBSC schemes. In the new adversary model, there are two types of adversaries ( and ) as presented below:
: simulates an “uncertified member” who can set any member ’s secret key and first public key , but can obtain neither ’s certificate nor second public key . Indeed, can get partial bits of the CA’s current secret key pair (, ) in the i-th invocation of the Certificate generation algorithm. Also, could obtain partial bits of the sender ’s current certificate pair (, ) in the j-th invocation of the Signcryption algorithm. In the k-th invocation of the Unsigncryption algorithm, could obtain partial bits of the receiver ’s current certificate pair .
: simulates an “honest-but-curious CA” who has the CA’s secret key and produces any member ’s certificate and second public key , but can obtain neither the member ’s secret key nor first public key . Also, could obtain partial bits of the sender ’s current secret key pair in the j-th invocation of the Signcryption algorithm. In the k-th invocation of the Unsigncryption algorithm, could obtain partial bits of the receiver ’s current secret key pair (, ).
An FCLR-CBSC scheme must possess two security properties, namely, authentication of signing process and confidentiality of encrypting process, that are modelled by two security games as defined below.
().
The authentication property is modelled by the security game that is played by an adversary A ( or ) and a challenger B. We say that an FCLR-CBSC scheme has existential unforgeability against both continuous leakage and adaptive chosen-message attacks (EXUF-CLRACMA) if no probabilistic polynomial time (PPT) adversary A has a non-negligible advantage to win the following game .
Setup. The challenger B runs the Initialization algorithm in Definition 1 to get the CA’s secret key and public key while generating and publishing a public parameter set . Also, B partitions to set the beginning secret key pair (, ). Additionally, if A is of type , B sends to .
Queries. A may adaptively request the following queries to B at most η times.
Member key generation query (): B produces and returns the member ’s secret key and first public key .
Member secret key query (): B returns the member ’s secret key .
Certificate generation query (, ): B returns the member ’s certificate and second public key .
Certificate generation leak query (i, , ): A may request this query only once. B returns and .
Public key retrieve query (): B returns the member ’s public key pair (, ).
Public key replace query (, (, )): B records the replacement.
Signcryption query (, , ): The sender first obtains a new current certificate pair (, ) and secret key pair (, ) by updating (, ) and (, ), respectively. B returns a ciphertext .
Signcryption leak query (, j, , ): A may request this query only once. B returns and .
Unsigncryption query (, ): The receiver first obtains a new current certificate pair (, ) and secret key pair (, ) by updating (, ) and (, ), respectively. B returns the message .
Unsigncryption leak query (, k, , ): A may request this query only once. B returns and .
Forgery. A creates a tuple (, , )). It is said that A wins if the following four conditions hold.
For , the Unsigncryption algorithm returns “Valid”.
The Signcryption query has never been requested.
If A is of type , the Certificate generation query has never been requested.
If A is of type , neither the Member secret key query (), nor the Public key replace query have never been requested.
().
The confidentiality property is modelled by the security game that is played by an adversary A ( or ) and a challenger B. We say that an FCLR-CBSC scheme has indistinguishability of encryptions against both continuous leakage and chosen-ciphertext attacks (INDEN-CLCCA) if no PPT adversary A has a non-negligible advantage to win the following game .
Setup. It is identical to the Setup in Definition 2.
Queries. It is identical to the Queries in Definition 2.
Challenge. A sends a receiver’s identity and a message pair (, ) to B. Then B randomly chooses a bit and runs the Signcryption algorithm with (, , ) to create and return a ciphertext to A. Additionally, the following two conditions must hold.
If A is of type , the Certificate generation query (, ) has never been requested.
If A is of type , neither the Member secret key query (), nor the Public key replace query (, (, )) have been requested.
Guess. A returns a bit . If , we say that A wins and its advantage is defined as .
The Proposed FCLR-CBSC Scheme
By the framework defined in Section 3, a fully continuous leakage-resilient certificate-based signcryption (FCLR-CBSC) scheme is proposed below that comprises five algorithms.
Initialization: The CA first create a bilinear pairing set described in Section 2. By running the following procedure, the CA computes her/his secret key and public key while generating and publishing a public parameter set .
Choose a random value , and compute the CA’s secret key and public key .
Choose a random value , and set the CA’s beginning secret key pair , where and the public key is kept unchanged.
Choose four random values , and compute , , and .
Pick symmetric-key encryption and decryption functions, denoted by and .
Pick a hash function H: , where l is a large integer.
Publish .
Member secret key generation: A member (a sender or a receiver ) first chooses a random value , and computes the member’s secret key and first public key . The member chooses a random value and computes the member ’s beginning secret key pair , where . Meanwhile, the member sends (, ) to the CA.
Certificate generation: Assume that the CA’s current secret key pair is . Upon receiving from the member , the CA runs the following procedure.
Choose a random value , and update the CA’s current secret key pair as , where and the public key is kept unchanged.
Choose a random value , compute the member ’s second public key and set the member ’s public key pair (, ).
Set , and compute a temporary value and the member ’s certificate .
Return to the member via a secure channel.
Upon receiving , the member chooses a random value and sets her/his beginning certificate pair .
Signcryption: Assume that the sender ’s current certificate and secret key pairs are, respectively, (, ) and (, ). The sender would like to signcrypt a message to the receiver with public key pair (, ) by running the following procedure.
Choose a random value , and update the two pairs above as and , where and . Note that the member ’s public key pair () is kept unchanged.
Set , select a random value , and compute and .
Set an encryption key , and compute and .
Compute a temporary value .
Compute a signature .
Produce a ciphertext .
Unsigncryption: Assume that the receiver ’s current certificate and secret key pairs are, respectively, (, ) and (, ). Given , the receiver unsigncrypts to obtain the message and verify the signature σ by running the following procedure.
Choose a random value , and update the two pairs above as and , where and . Note that the member ’s public key pair () is kept unchanged.
Compute two temporary values and .
Compute and .
Set , and decrypt the message .
Compute , and set .
Verify the equality . If the equality holds, return and “Valid”; otherwise return “Invalid”.
We can arrive at and by the following equalities.
.
.
.
Security Analysis
An FCLR-CBSC scheme must possess two security properties, namely, authentication of signing process and confidentiality of encrypting process, that are modelled by two security games and defined in Section 3.3. Both games are played by an adversary A ( or ) and a challenger B. Theorems 1 and 2 below show that our FCLR-CBSC scheme is EXUF-CLRACMA-secure against and in , respectively. Also, Theorems 3 and 4 show that the FCLR-CBSC scheme is INDEN-CLCCA-secure against and in , respectively.
Under the SCRH and DL assumptions in the GBG model, our FCLR-CBSC scheme is EXUF-CLRACMA-secure againstin.
and B play that comprises three phases as presented below.
Setup. B runs the Initialization algorithm of the FCLR-CBSC scheme to create the CA’s secret key and public key while setting the public parameter set . B also establishes six lists , , , , and as defined below.
is used to record all elements (, ) of , where and denote a multivariate polynomial and its associated bit string, respectively. The indices a, b, c mean the query-type a, b-th query and c-th element, respectively. Initially, six elements (, ), (, ), (, ), (, ), (, ) and (, ) are put in .
is used to record all elements (, ) of , where and denote a multivariate polynomial and the associated bit string, respectively. The indices a, b, c have the identical meanings as in . Initially, two elements (, ) and (, ) are put in .
Note that can apply the following two rules to make converting between a bit string and a multivariate polynomial .
Converting-1 (): B returns if is found in . Otherwise, B chooses a distinct bit string and puts in .
Converting-2 (): B returns if is found in . Otherwise, B terminates the game.
is used to record a member ’s secret key and her/his first public key by (, , , replace), for . Initially, B sets to indicate that the member’s public key has never been replaced by the adversary.
is used to record a member ’s certificate and her/his second public key by (, , , replace), for . Also, B sets .
is used to record the content of running the Signcryption algorithm by .
is used to record the input/output of the hash function H by .
Query: may issue the following queries to B at most η times.
query: For the k-th , B runs the following procedure.
Convert (, ) to (, ) in .
Set if ORER = “×”, and if ORER = “/”.
Convert in to return .
query (, , ): For the k-th , B runs the following procedure.
Convert (, ) to (, ) in .
Set if , and if ORER = “/”.
Convert in to return .
query (, ): For the k-th , B runs the following procedure.
Convert (, ) to (, ) in .
Set .
Convert in to return .
Member key generation query (): B produces the member ’s secret key and first public key . B then puts (, , , 0) in . Also, B converts (, ) in to return (, ).
Member secret key query (): If (, , , 0) in is found, B converts in to return . Otherwise, B issues the Member key generation query () to return .
Certificate generation query (, ): Assume that the CA has the i-th secret key pair (, ). B runs the following procedure.
Pick a new variate in as the second public key of the member .
Pick a new variate in and put (, ) in .
Set and put (, , , 0) in .
Convert (, ) in to return (, ).
Certificate generation leak query (i, , ): can issue this query only once for the CA’s i-th secret key pair (, ). B returns and .
Public key retrieve query (): B finds ’s public key pair (, ) by searching (, , , 0) in and (, , , 0) in . B converts (, ) in to return (, ).
Public key replace query (, (, )): B converts (, ) to (, ). B modifies in and in .
Signcryption query (, , ): Assume that the sender has the j-th certificate pair (, ) and secret key pair (, ). B runs the following procedure.
Use to find (, , , replace) in and (, , , replace) in , and convert (, ) in to (, ).
Set and convert in to .
Choose a new variate in , and set and .
Convert both and in , and in to obtain , and .
Set and .
Choose a new variate in , and set , and put (, ) in .
Set and convert in to .
Put in .
Return .
Signcryption leak query (, j, , ): can issue this query only once for the member ’s j-th certificate pair (, ) and secret key pair (, ). B returns and .
Unsigncryption query (, ): Assume that the receiver has the k-th certificate pair (, ) and secret key pair (, ). B runs the following procedure.
Use to find (, , , replace) in and (, , , replace) in , and convert (, ) in to (, ).
Convert and in to and , respectively.
Set and .
Set and convert in to .
Use , , , , , , C and to find in . If it is found, return and “Valid”.
Unsigncryption leak query (, k, , ): can issue this query only once for the member ’s k-th certificate pair (, ) and secret key pair (, ). B returns and , .
Forgery. produces a pair . Note that the Signcryption query (, , ) and the Certificate generation query (, ) have never been requested. If the Unsigncryption algorithm with returns and “Valid”, we say that wins .
As mentioned in Section 2.2, if an adversary found any collision of , it would solve the discrete logarithm problem on . In such a case, we first compute the sum amount of elements in and , termed as . By counting the added elements in both the Setup and Query phases, we have the inequality because can request different queries to B η times and at most 6 elements are increased in after issuing a query. Additionally, for evaluating the entropy of secret keys with partial leakage, we must compute the maximal degrees of elements in and , in which and have the maximal degrees 3 and 6, respectively.
Subsequently, let us compute the advantage that wins without issuing leak queries. The advantage comprises two probabilities as discussed below.
Let be the probability that finds a collision in or . Assume that there are r different variates in , which are denoted by r random values for . Let and be two distinct elements in and set . If , there exists a collision in . Because has pairs of (, ) and the maximal polynomial degree is 3, the probability that finds a collision in is by Lemma 2. For the same reason, the probability that finds a collision in is . Because of , we have the following inequality .
Let be the probability that forges a valid pair (, = (, , , , )). The valid pair satisfies in the Unsigncryption algorithm, namely, . Let . Since has degree 3, the probability of is by Lemma 2 so that we have .
By above, we have which is negligible if .
Here, we compute the advantage that wins when permitted to issue three types of leak queries, namely, Certificate generation leak query, Signcryption leak query and Unsigncryption leak query.
By the Certificate generation leak query (i, , ), gets partial bits of the CA’s i-th secret key pair (, ), namely, and with . According to the key update process (Kiltz and Pietrzak, 2010; Galindo and Virek, 2013), the CA’s i-th secret key pair satisfies the relations . Meanwhile, the leakage bits of (, ) and (, ) are mutually independent, so that gets at most bits of .
By the Signcryption leak query (, j, , ), gets partial bits of the ’s j-th certificate pair (, ), namely, and with . According to the key update procedure, the ’s j-th certificate pair satisfies the relations . Thus, gets at most bits of .
By the Unsigncryption leak query (, k, , ), gets partial bits of the ’s k-th certificate pair (, ), namely, and with , . According to the key update procedure, the ’s k-th certificate pair satisfies the relations . Thus, gets at most bits of .
Due to the discussions above, we define three events as follows:
Let EVCSK indicate the event that obtains by and . Meanwhile, means EVCSK’s complement.
Let EVCTF indicate the event that gets (i.e. or ) by , , and . Meanwhile, means EVCTF’s complement.
Let ESFV indicate the event that successfully forges a valid pair .
Hence, has the inequality
By the Certificate generation leak query, gets bits of . Also, by the Signcryption leak query or Unsigncryption leak query, gets bits of (i.e. or ). By Lemma 2, we have because of . Since denotes that gets no information of both and , we have . Therefore, Finally, is negligible if , by Lemma 2. □
Under the SCRH and DL assumptions in the GBG model, our FCLR-CBSC scheme is EXUF-CLRACMA-secure againstin.
and B play that comprises three phases as presented below.
Setup. It is identical to the Setup in Theorem 1. Because the adversary is of , B sends to .
Queries. It is identical to the Queries in Theorem 1. Additionally, since possesses the CA’s secret key , so that it can create any member ’s certificate and second public key . Thus, has no need to request the Certificate generation query and Certificate generation leak query.
Forgery. produces a pair . Note that the Signcryption query (, , ), the Member secret key query () and the Public key replace query (, (, )) have never been requested. If the Unsigncryption algorithm with returns and “Valid”, we say that wins .
Here, let’s compute the advantage that wins without issuing leak queries. By and defined in Theorem 1, we have which is negligible if . Next, we compute the advantage that wins when permitted to issue two types of leak queries, namely, Signcryption leak query and Unsigncryption leak query.
By the Signcryption leak query (, j, , ), gets partial bits of the ’s j-th secret key pair (, ), namely, and with , . According to the key update procedure, the ’s j-th secret key pair satisfies the relations . Thus, gets at most bits of .
By the Unsigncryption leak query (, k, , ), gets partial bits of the ’s k-th secret key pair (, ), namely, and with , . According to the key update procedure, the ’s k-th secret key pair satisfies the relations . Thus, gets at most bits of .
Due to the discussions above, we define two events as follows:
Let indicate the event that obtains (i.e. or ) by , , and . Meanwhile, denotes ’s complement.
Let ESFV indicate the event that successfully forges a valid tuple .
Hence, has the inequality By the Signcryption leak query or Unsigncryption leak query, gets bits of (i.e. or ). By Lemma 2, we have . Since denotes that gets no information of , we have . Therefore, Finally, is negligible if , by Lemma 2. □
Under the SCRH and DL assumptions in the GBG model, our FCLR-CBSC scheme is INDEN-CLCCA-secure againstin.
and B play that comprises four phases as presented below:
Queries. It is identical to the Queries in Theorem 1.
Challenge. sends a receiver’s identity and a message pair (, ) to B. Note that the Certificate generation query (, ) has never been requested. B randomly chooses a bit and runs the Signcryption algorithm with (, , ) to produce and return a ciphertext to .
Guess. returns a bit . We say that wins if . The advantage is defined as .
Let us compute the advantage that wins without issuing leak queries. The advantage comprises two probabilities as discussed below:
Let be the probability that finds a collision in or , which is the same with the probability in Theorem 1. Thus, we have the inequality .
Let be the probability that with no useful information outputs a correct bit b. Thus, we have .
Hence, we have the following inequality. Here, let’s compute the advantage that wins when permitted to issue three types of leak queries, namely, Certificate generation leak query, Signcryption leak query and Unsigncryption leak query. As in the proof of Theorem 1, by the Certificate generation leak query, gets bits of . Also, by the Signcryption leak query or the Unsigncryption leak query, gets bits of (i.e. or ). By Lemma 2, we have , which is negligible if . □
Under the SCRH and DL assumptions in the GBG model, our FCLR-CBSC scheme is INDEN-CLCCA-secure againstin.
and B play that comprises four phases as presented below:
Queries. It is identical to the Queries in Theorem 2.
Challenge. sends a receiver’s identity and a message pair (, ) to B. Note that neither the Member secret key query () nor the Public key replace query (, (, )) has been requested. B randomly chooses a bit and runs the Signcryption algorithm with (, , ) to produce and return a ciphertext to .
Guess. returns a bit . We say that wins if . The advantage is defined as .
Here, let’s compute that wins without request leak queries. By using and Pr[Guess] in the proof of Theorem 3, we get that is negligible if . Subsequently, let us compute the advantage that wins when permitted to issue two types of leak queries, namely, Signcryption leak query and Unsigncryption leak query. As in the proof of Theorem 2, gets bits of (i.e. or ). By Lemma 2, we obtain ) that is negligible if . □
Performance Comparisons
Here, let’s evaluate the computation time of our FCLR-CBSC scheme in terms of Initialization, Member secret key generation, Certificate generation, Signcryption and Unsigncryption algorithms. By the simulation results in Xiong and Qin (2015), the notations (i.e. and ) for two time-consuming computations and their running time are presented in Table 3. Additionally, the running time of the multiplication in or is negligible since it is more slighter than and . The simulation results in Xiong and Qin (2015) are evaluated under a PC with an Intel 1.80-GHz i7 CPU and a mobile device with an Intel 624-MHz PXA270 CPU. Meanwhile, the order p of both and is a 512-bit prime security level. The computation costs and the running time of five algorithms in our FCLR-CBSC scheme are listed in Table 4. By Table 4, it is obvious that our scheme performs efficiently on both a PC and a mobile device.
Notationsand running time of two time-consuming operations.
Operations
Notations
Running time on a PC
Running time on a mobile device
Bilinear pairing function
≈20 ms
≈96 ms
Exponentiation in or
≈7 ms
≈31 ms
Computation costs and running time of five algorithms.
Algorithms
Computation costs
Running time on a PC
Running time on a mobile device
Initialization
69 ms
313 ms
Member secret key generation
41 ms
189 ms
Certificate generation
49 ms
217 ms
Signcryption
76 ms
344 ms
Unsigncryption
168 ms
796 ms
Conclusions
A practical FCLR-CBSC scheme was proposed in the paper. As compared with the previously proposed LR-CLSC and CLR-CBSC schemes, our scheme possesses the fully continuous leakage-resilient property. In our scheme, by the key update method participated in the Certificate generation, Signcryption and Unsigncryption algorithms of our scheme, respectively, an adversary is permitted to obtain partial bits of the CA’s secret key, and a sender/receiver’s certificate and secret key. Based on the SCRH and DL assumptions in the GBG model, four security theorems were formally shown that our scheme is EXUF-CLRACMA-secure and INDEN-CLCCA-secure against two types of adversaries ( and ) in the CB-PKS setting so that our scheme possesses both authentication of and confidentiality. Finally, performance analysis demonstrated that our scheme is performs efficiently on both a PC and a mobile device.
References
1.
AliI.LawrenceT.OmalaA.LiF. (2020). An efficient hybrid signcryption scheme with conditional privacy-preservation for heterogeneous vehicular communication in VANETs. IEEE Transactions on Vehicular Technology, 69(10), 11266–11280.
2.
Al-RiyamiS.PatersonK. (2003). Certificateless public key cryptography. In: ASIACRYPT’03, LNCS, Vol. 2894, pp. 452–473.
3.
AlwenJ.DodisY.WichsD. (2009). Leakage-resilient public-key cryptography in the bounded-retrieval model. In: Crypto’09, LNCS, Vol. 5677, pp. 36–54.
DodisY.OstrovskyR.ReyzinL.SmithA. (2008). Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing, 38(1), 97–139.
9.
DodisY.HaralambievK.Lopez-AltA.WichsD. (2010). Cryptography resilient to continual memory leakage. In: 51st Annual IEEE Symposium on Foundations of Computer Science, pp. 501–510.
10.
GalindoD.VirekS. (2013). A practical leakage-resilient signature scheme in the generic group model. In: SAC’12, LNCS, Vol. 7707, pp. 50–65.
11.
GalindoD.GrobschadlJ.LiuZ.VadnalaP.VivekS. (2016). Implementation of a leakage-resilient ElGamal key encapsulation mechanism. Journal of Cryptographic Engineering, 6(3), 229–238.
12.
GentryC. (2003). Certificate-based encryption and the certificate revocation problem. In: EUROCRYPT’03, LNCS, Vol. 2656, pp. 272–293.
13.
HussainS.UllahI.KhattakH.AdnanM.KumariS.UllahS.KhanM.KhattakS. (2020). A lightweight and formally secure certificate based signcryption with proxy re-encryption (CBSRE) for internet of things enabled smart grid. IEEE Access, 8, 93230–93248.
14.
KatzJ.VaikuntanathanV. (2009). Signature schemes with bounded leakage resilience. In: Asiacrypt’09, LNCS, Vol. 5912, pp. 703–720.
15.
KhanM.UllahI.NisarS.NoorF.QureshiI.KhanzadaF.AminN. (2020). An efficient and provably secure certificateless key-encapsulated signcryption scheme for flying ad-hoc network. IEEE Access, 8, 36807–36828.
KocherP.JaffeJ.JunB. (1999). Differential power analysis. In: Crypto’99, LNCS, Vol. 1666, pp. 388–397.
18.
PengA.-L.TsengY.-M.HuangS.-S. (2021). An efficient leakage-resilient authenticated key exchange protocol suitable for IoT devices. IEEE Systems Journal, 15(4), 5343–5354.
19.
RivestR.ShamirA.AdlemanL. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.
20.
TsaiT.-T.HuangS.-S.TsengY.-M.ChuangY.-H.HungY.-H. (2022). Leakage-resilient certificate-based authenticated key exchange protocol. IEEE Open Journal of the Computer Society, 3, 137–148.
21.
TsengY.-M.WuJ.-D.HuangS.-S.TsaiT.-T. (2020). Leakage-resilient outsourced revocable certificateless signature with a cloud revocation server. Information Technology and Control, 49(4), 464–481.
22.
TsengY.-M.ChenJ.-L.HuangS.-S. (2021). A lightweight leakage-resilient identity-based mutual authentication and key exchange protocol for resource-limited devices. Computer Networks, 196, 108246.
23.
TsengY.-M.HuangS.-S.TsaiT.-T.ChuangY.-H.HungY.-H. (2022). Leakage-resilient revocable certificateless encryption with an outsourced revocation authority. Informatica, 33(1), 151–179.
24.
UllahI.AlomariA.AminN.KhanM.KhattakH. (2019). An energy efficient and formally secured certificate-based signcryption for wireless body area networks with the internet of things. Electronics, 8(10), 1171.
25.
UllahS.LiX.LanZ. (2020). A novel trusted third party based signcryption scheme. Multimedia Tools and Applications, 79, 22749–22769.
26.
WuY.GongB.ZhangY. (2022). An improved efficient certificateless hybrid signcryption scheme for internet of things. Wireless Communications and Mobile Computing, 2022, 6945004.
WuJ.-D.TsengY.-M.HuangS.-S.TsaiT.-T. (2020a). Leakage-resilient certificate-based key encapsulation scheme resistant to continual leakage. IEEE Open Journal of the Computer Society, 1, 131–144.
XiongH.QinZ. (2015). Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Transactions on Information Forensics and Security, 10(7), 1442–1455.
ZhengY. (1997). Digital signcryption or how to achieve cost (signature & encryption) cost (signature)+ cost (encryption). In: Annual International Cryptology Conference, LNCS, Vol. 1294, pp. 165–179.
34.
ZhouY.YangB.ZhangW. (2016). Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing. Discrete Applied Mathematics, 204, 185–202.
35.
ZhouY.XuY.QiaoZ.YangB.ZhangM. (2021). Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing. Theoretical Computer Science, 860, 1–22.