Forward Secure Asynchronous Messaging from Puncturable Encryption
@article{Green2015ForwardSA, title={Forward Secure Asynchronous Messaging from Puncturable Encryption}, author={Matthew Green and Ian Miers}, journal={2015 IEEE Symposium on Security and Privacy}, year={2015}, pages={305-320} }
In this paper we investigate new mechanisms for achieving forward secure encryption in store and forward messaging systems such as email and SMS. In a forward secure encryption scheme, a user periodically updates her secret key so that past messages remain confidential in the event that her key is compromised. A primary contribution of our work is to introduce a new form of encryption that we name puncturable encryption. Using a puncturable encryption scheme, recipients may repeatedly update…
81 Citations
Puncturable Proxy Re-Encryption Supporting to Group Messaging Service
- Computer ScienceESORICS
- 2019
A forward secure PPRE in the group messaging service is presented, inspired by unidirectional proxy re-encryption (UPRE), which achieves forward secrecy through fine-grained revocation of decryption capability by integrating the PE scheme.
A Generic Construction of Puncturable Encryption
- Computer Science, Mathematics2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
- 2019
This paper presents a generic construction that converts any existing chosen-ciphertext secure identity-based encryption scheme into a puncturable encryption scheme, and presents an instantiation of the proposed generic construction.
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security
- Computer ScienceAsiaCCS
- 2022
A new primitive called hierarchical identity-based puncturable encryption (HIBPE) is introduced that enhances the concept of PE by allowing more general key delegation and flexible key puncture and provides quantum-safe protection for secret keys from exposure in multi-level encrypted data sharing by evolving the keys with time.
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption
- Computer Science, MathematicsCCS
- 2018
This paper introduces a new form of symmetric encryption, named symmetric puncturable encryption (SPE), and construct a generic primitive from simple cryptographic tools, and presents a backward-secure SSE scheme that can revoke a server's searching ability on deleted data.
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2020
Basing on the framework, the first post-quantum secure PE instantiation that is based on the learning with errors problem, selective secure under chosen plaintext attacks (CPA) in the standard model is obtained.
Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications
- Computer Science, MathematicsFinancial Cryptography
- 2021
DFPE significantly enhances and generalizes previous variants of PE by allowing an interleaved application of allowand deny-list operations, and presents a construction of DFPE in prime-order bilinear groups.
Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2020
This paper defines decentralized continuous group key agreement (DCGKA), a new cryptographic primitive encompassing the core of a decentralized secure group messaging protocol, and gives a practical construction of a DCGKA protocol and proves its security; and describes how to construct a full messaging protocol from DCGka.
Forward Secure Delay-Tolerant Networking ∗ Signe Rüsch
- Computer Science, Mathematics
- 2018
This work applies the Puncturable Encryption construction designed by Green and Miers, integrates it into the Bundle Security Protocol and adapt its parameters for different highly asynchronous scenarios, and proposes the first forward secure protocol for Delay-Tolerant Networking.
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2018
Bloom filter encryption (BFE), which is derived from the probabilistic Bloom filter data structure, is introduced and different constructions of BFE schemes are described and it is shown how these yield new puncturable encryption mechanisms with extremely efficient puncturing.
Public-Key Puncturable Encryption: Modular and Compact Constructions
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2020
A generic construction of puncturable key encapsulation mechanism from the former by merging the idea of distributed key-distribution and revocable encryption is proposed, which gets a comparable scheme proven secure under the standard DBDH assumption, which enjoys both faster encryption and decryption than previous works based on the same assumption.
References
SHOWING 1-10 OF 46 REFERENCES
Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Computer Science, MathematicsEUROCRYPT
- 2005
A Hierarchical Identity Based Encryption system where the ciphertext consists of just three group elements and decryption requires only two bilinear map computations, regardless of the hierarchy depth, which is proved to be as efficient as in other HIBE systems.
Secure E-mail protocols providing perfect forward secrecy
- Computer Science, MathematicsIEEE Communications Letters
- 2005
Two new E-mail protocols providing perfect forward secrecy are proposed in this work and will help to protect the short-term key using a public-key cryptosystem with the receiver's public key.
Identity-based encryption with efficient revocation
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2012
This work proposes an IBE scheme that significantly improves key-update efficiency on the side of the trusted party (from linear to logarithmic in the number of users), while staying efficient for the users.
Attribute-based encryption for fine-grained access control of encrypted data
- Computer ScienceCCS '06
- 2006
This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Computer Science, MathematicsEUROCRYPT
- 2010
We present two fully secure functional encryption schemes: a fully secure attribute-based encryption (ABE) scheme and a fully secure (attribute-hiding) predicate encryption (PE) scheme for…
Secure Integration of Asymmetric and Symmetric Encryption Schemes
- Computer Science, MathematicsJournal of Cryptology
- 2011
This conversion is the first generic transformation from an arbitrary one-way asymmetricryption scheme to a chosen-ciphertext secure asymmetric encryption scheme in the random oracle model.
Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2004
Two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model are constructed.
Off-the-record communication, or, why not to use PGP
- Computer ScienceWPES '04
- 2004
This paper presents a protocol for secure online communication, called "off-the-record messaging", which has properties better-suited for casual conversation than do systems like PGP or S/MIME.
An improved e-mail security protocol
- Computer Science, MathematicsProceedings 13th Annual Computer Security Applications Conference
- 1997
This paper uses short-term private-key/public-key key pairs to reduce the magnitude of this vulnerability in e-mail security systems.
Attribute based data sharing with attribute revocation
- Computer ScienceASIACCS '10
- 2010
This paper uniquely integrates the technique of proxy re-encryption with CP-ABE, and enables the authority to delegate most of laborious tasks to proxy servers, and shows that the proposed scheme is provably secure against chosen ciphertext attacks.