Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks

  • Tsz Hon Yuen
  • Ye Zhang
  • Siu Ming Yiu
  • Joseph K. Liu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8712)


Identity-based encryption (IBE) is useful for providing end-to-end access control and data protection in many scenarios such as cloud applications and wireless sensor networks However, there are some practical threats for the data owner or the sensor, who encrypts raw data; and the data user or the control centre, who decrypts the ciphertext and recovers the raw data.

In this paper, we tackle the open problem of proposing a leakage-resilience encryption model that can capture leakage from both the secret key owner (the data user or control centre) and the encryptor (the data owner or sensor), in the auxiliary input model. Existing models only allow the leakage of the secret key and do not allow adversaries to query more leakage information after seeing the challenge ciphertext of the security games. We solve this problem by defining the post-challenge auxiliary input model in which the family of leakage functions must be defined before the adversary is given the public key. The post-challenge query will return the leakage of the encryption randomness used by the encryptor. This model is able to capture a wider class of real-world attacks.

To realize our model, we propose a generic transformation from the auxiliary input model to our new post-challenge auxiliary input model for both public key encryption (PKE) and IBE. Furthermore, we extend Canetti et al.’s technique, that converts CPA-secure IBE to CCA-secure PKE, into the leakage-resilient setting.


IBE leakage-resilient auxiliary inputs randomness 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Franke, C., Robinson, P.: Autonomic provisioning of hosted applications with level of isolation terms. In: 2010 Seventh IEEE International Conference and Workshops on Engineering of Autonomic and Autonomous Systems, pp. 131–142 (2008)Google Scholar
  2. 2.
    Cloud Security Alliance: Expanded top ten big data security and privacy challenges (2013)Google Scholar
  3. 3.
    Hough, A.: Google engineer fired for privacy breach after “staking and harassing teenagers”. The Telegraph (September 15, 2010)Google Scholar
  4. 4.
    Argyros, G., Kiayias, A.: I forgot your password: randomness attacks against php applications. In: USENIX Security 2012, p. 6. USENIX Association (2012)Google Scholar
  5. 5.
    Lenstra, A.K., Hughes, J.P., Augier, M., Bos, J.W., Kleinjung, T., Wachter, C.: Public keys. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 626–642. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  6. 6.
    Michaelis, K., Meyer, C., Schwenk, J.: Randomly failed! the state of randomness in current java implementations. In: Dawson, E. (ed.) CT-RSA 2013. LNCS, vol. 7779, pp. 129–144. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  7. 7.
    Shumow, D., Ferguson, N.: On the possiblity of a back door in the NIST SP800-90 dual ec prng,
  8. 8.
    Perlroth, N., Larson, J., Shane, S.: N.S.A. able to foil basic safeguards of privacy on web New York Times (September 5, 2013),
  9. 9.
    Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474–495. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  10. 10.
    Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 18–35. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  11. 11.
    Dodis, Y., Kalai, Y.T., Lovett, S.: On cryptography with auxiliary input. In: Mitzenmacher, M. (ed.) STOC 2009, pp. 621–630. ACM (2009)Google Scholar
  12. 12.
    Yuen, T.H., Yiu, S.M., Hui, L.C.K.: Fully leakage-resilient signatures with auxiliary inputs. In: Susilo, W., Mu, Y., Seberry, J. (eds.) ACISP 2012. LNCS, vol. 7372, pp. 294–307. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  13. 13.
    Bellare, M., Brakerski, Z., Naor, M., Ristenpart, T., Segev, G., Shacham, H., Yilek, S.: Hedged public-key encryption: How to protect against bad randomness. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 232–249. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  14. 14.
    Namiki, H., Tanaka, K., Yasunaga, K.: Randomness leakage in the kem/dem framework. In: Boyen, X., Chen, X. (eds.) ProvSec 2011. LNCS, vol. 6980, pp. 309–323. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  15. 15.
    Dodis, Y., Goldwasser, S., Kalai, Y.T., Peikert, C., Vaikuntanathan, V.: Public-key encryption schemes with auxiliary inputs. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 361–381. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  16. 16.
    Yuen, T.H., Chow, S.S.M., Zhang, Y., Yiu, S.M.: Identity-based encryption resilient to continual auxiliary leakage. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 117–134. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  17. 17.
    Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207–222. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  18. 18.
    Faust, S., Hazay, C., Nielsen, J.B., Nordholt, P.S., Zottarel, A.: Signature schemes secure against hard-to-invert leakage. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 98–115. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  19. 19.
    Halevi, S., Lin, H.: After-the-fact leakage in public-key encryption. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 107–124. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  20. 20.
    Bitansky, N., Canetti, R., Halevi, S.: Leakage-tolerant interactive protocols. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 266–284. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  21. 21.
    Yuen, T.H., Zhang, Y., Yiu, S.M., Liu, J.K.: Encryption schemes with post-challenge auxiliary inputs. Cryptology ePrint Archive, Report 2013/323 (2013),

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Tsz Hon Yuen
    • 1
  • Ye Zhang
    • 3
  • Siu Ming Yiu
    • 2
  • Joseph K. Liu
    • 4
  1. 1.HuaweiSingapore
  2. 2.The University of Hong KongHong Kong
  3. 3.Pennsylvania State UniversityUSA
  4. 4.Infocomm Security Department, Institute for Infocomm ResearchSingapore

Personalised recommendations