{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T21:23:06Z","timestamp":1768771386773,"version":"3.49.0"},"reference-count":40,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2022,3,1]]},"DOI":"10.1587\/transfun.2021cip0003","type":"journal-article","created":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T22:09:16Z","timestamp":1631830156000},"page":"143-159","source":"Crossref","is-referenced-by-count":2,"title":["Boosting CPA to CCA2 for Leakage-Resilient Attribute-Based Encryption by Using New QA-NIZK"],"prefix":"10.1587","volume":"E105.A","author":[{"given":"Toi","family":"TOMITA","sequence":"first","affiliation":[{"name":"Tokyo Institute of Technology"},{"name":"National Institute of Advanced Industrial Science and Technology (AIST)"}]},{"given":"Wakaha","family":"OGATA","sequence":"additional","affiliation":[{"name":"Tokyo Institute of Technology"}]},{"given":"Kaoru","family":"KUROSAWA","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology (AIST)"},{"name":"Chuo University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] P.C. Kocher, J. Jaffe, and B. Jun, \u201cDifferential power analysis,\u201d CRYPTO&apos;99, M.J. Wiener, ed., LNCS, vol.1666, pp.388-397, Springer, Heidelberg, Aug. 1999. 10.1007\/3-540-48405-1_25","DOI":"10.1007\/3-540-48405-1_25"},{"key":"2","unstructured":"[2] J.A. Halderman, S.D. Schoen, N. Heninger, W. Clarkson, W. Paul, J.A. Calandrino, A.J. Feldman, J. Appelbaum, and E.W. Felten, \u201cLest we remember: Cold boot attacks on encryption keys,\u201d USENIX Security 2008, P.C. van Oorschot, ed., pp.45-60, USENIX Association, July\/Aug. 2008."},{"key":"3","doi-asserted-by":"crossref","unstructured":"[4] M. Naor and G. Segev, \u201cPublic-key cryptosystems resilient to key leakage,\u201d CRYPTO 2009, S. Halevi, ed., LNCS, vol.5677, pp.18-35, Springer, Heidelberg, Aug. 2009. 10.1007\/978-3-642-03356-8_2","DOI":"10.1007\/978-3-642-03356-8_2"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[5] Z. Brakerski, Y.T. Kalai, J. Katz, and V. Vaikuntanathan, \u201cOvercoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage,\u201d 51st FOCS, pp.501-510, IEEE Computer Society Press, Oct. 2010. 10.1109\/focs.2010.55","DOI":"10.1109\/FOCS.2010.55"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[6] Y. Dodis, K. Haralambiev, A. L\u00f3pez-Alt, and D. Wichs, \u201cCryptography against continuous memory attacks,\u201d 51st FOCS, pp.511-520, IEEE Computer Society Press, Oct. 2010. 10.1109\/focs.2010.56","DOI":"10.1109\/FOCS.2010.56"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[7] A.B. Lewko, Y. Rouselakis, and B. Waters, \u201cAchieving leakage resilience through dual system encryption,\u201d TCC 2011, Y. Ishai, ed., LNCS, vol.6597, pp.70-88, Springer, Heidelberg, March 2011. 10.1007\/978-3-642-19571-6_6","DOI":"10.1007\/978-3-642-19571-6_6"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[8] S.S.M. Chow, Y. Dodis, Y. Rouselakis, and B. Waters, \u201cPractical leakage-resilient identity-based encryption from simple assumptions,\u201d ACM CCS 2010, E. Al-Shaer, A.D. Keromytis, and V. Shmatikov, eds., pp.152-161, ACM Press, Oct. 2010. 10.1145\/1866307.1866325","DOI":"10.1145\/1866307.1866325"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[9] K. Kurosawa and L.T. Phong, \u201cLeakage resilient IBE and IPE under the DLIN assumption,\u201d ACNS 13, M.J. Jacobson, Jr., M.E. Locasto, P. Mohassel, and R. Safavi-Naini, ed., LNCS, vol.7954, pp.487-501, Springer, Heidelberg, June 2013. 10.1007\/978-3-642-38980-1_31","DOI":"10.1007\/978-3-642-38980-1_31"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[10] Z. Yu, M.H. Au, Q. Xu, R. Yang, and J. Han, \u201cLeakage-resilient functional encryption via pair encodings,\u201d ACISP 16, J.K. Liu and R. Steinfeld, ed., LNCS, vol.9722, pp.443-460, Springer, Heidelberg, July 2016. 10.1007\/978-3-319-40253-6_27","DOI":"10.1007\/978-3-319-40253-6_27"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[11] J. Zhang, J. Chen, J. Gong, A. Ge, and C. Ma, \u201cLeakage-resilient attribute based encryption in prime-order groups via predicate encodings,\u201d Des. Codes Cryptogr., vol.86, no.6, pp.1339-1366, 2018. 10.1007\/s10623-017-0399-4","DOI":"10.1007\/s10623-017-0399-4"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[12] M. Naor and M. Yung, \u201cPublic-key cryptosystems provably secure against chosen ciphertext attacks,\u201d 22nd ACM STOC, pp.427-437, ACM Press, May 1990. 10.1145\/100216.100273","DOI":"10.1145\/100216.100273"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[13] J. Alwen, Y. Dodis, M. Naor, G. Segev, S. Walfish, and D. Wichs, \u201cPublic-key encryption in the bounded-retrieval model,\u201d EUROCRYPT 2010, H. Gilbert, ed., LNCS, vol.6110, pp.113-134, Springer, Heidelberg, May\/June 2010. 10.1007\/978-3-642-13190-5_6","DOI":"10.1007\/978-3-642-13190-5_6"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[14] Y. Dodis, K. Haralambiev, A. L\u00f3pez-Alt, and D. Wichs, \u201cEfficient public-key cryptography in the presence of key leakage,\u201d ASIACRYPT 2010, M. Abe, ed., LNCS, vol.6477, pp.613-631, Springer, Heidelberg, Dec. 2010. 10.1007\/978-3-642-17373-8_35","DOI":"10.1007\/978-3-642-17373-8_35"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[15] D. Hofheinz, D. Jia, and J. Pan, \u201cIdentity-based encryption tightly secure under chosen-ciphertext attacks,\u201d ASIACRYPT 2018, T. Peyrin and S. Galbraith, ed., LNCS, vol.11273, pp.190-220, Springer, Heidelberg, Dec. 2018. 10.1007\/978-3-030-03329-3_7","DOI":"10.1007\/978-3-030-03329-3_7"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[16] C.S. Jutla and A. Roy, \u201cShorter quasi-adaptive NIZK proofs for linear subspaces,\u201d ASIACRYPT 2013, K. Sako and P. Sarkar, eds., LNCS, vol.8269, pp.1-20, Springer, Heidelberg, Dec. 2013. 10.1007\/978-3-642-42033-7_1","DOI":"10.1007\/978-3-642-42033-7_1"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[17] S. Sun, D. Gu, and S. Liu, \u201cEfficient leakage-resilient identity-based encryption with CCA security,\u201d PAIRING 2013, Z. Cao and F. Zhang, ed., LNCS, vol.8365, pp.149-167, Springer, Heidelberg, Nov. 2014. 10.1007\/978-3-319-04873-4_9","DOI":"10.1007\/978-3-319-04873-4_9"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[18] Y. Chen, B. Qin, and H. Xue, \u201cRegularly lossy functions and applications,\u201d CT-RSA 2018, N.P. Smart, ed., LNCS, vol.10808, pp.491-511, Springer, Heidelberg, April 2018. 10.1007\/978-3-319-76953-0_26","DOI":"10.1007\/978-3-319-76953-0_26"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[19] T. Tomita, W. Ogata, and K. Kurosawa, \u201cCCA-secure leakage-resilient identity-based key-encapsulation from simple (not <i>q<\/i>-type) assumptions,\u201d IWSEC 19, N. Attrapadung and T. Yagi, eds., LNCS, vol.11689, pp.3-22, Springer, Heidelberg, Aug. 2019. 10.1007\/978-3-030-26834-3_1","DOI":"10.1007\/978-3-030-26834-3_1"},{"key":"19","doi-asserted-by":"publisher","unstructured":"[20] T. Tomita, W. Ogata, K. Kurosawa, and R. Kuwayama, \u201cCca-secure leakage-resilient identity-based encryption without q-type assumptions,\u201d IEICE Trans. Fundamentals, vol.E103-A, no.10, pp.1157-1166, Oct. 2020. 10.1587\/transfun.2019dmp0013","DOI":"10.1587\/transfun.2019DMP0013"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[21] Y. Zhou, B. Yang, Z. Xia, M. Zhang, and Y. Mu, \u201cIdentity-based encryption with leakage-amplified chosen-ciphertext attacks security,\u201d Theor. Comput. Sci., vol.809, pp.277-295, 2020. 10.1016\/j.tcs.2019.12.018","DOI":"10.1016\/j.tcs.2019.12.018"},{"key":"21","doi-asserted-by":"publisher","unstructured":"[22] A. Escala, G. Herold, E. Kiltz, C. R\u00e0fols, and J. Villar, \u201cAn algebraic framework for Diffie-Hellman assumptions,\u201d CRYPTO 2013, R. Canetti and J.A. Garay, ed., LNCS, vol.8043, pp.129-147, Springer, Heidelberg, Aug. 2013. 10.1007\/978-3-642-40084-1_8","DOI":"10.1007\/978-3-642-40084-1_8"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[23] E. Kiltz and H. Wee, \u201cQuasi-adaptive NIZK for linear subspaces revisited,\u201d EUROCRYPT 2015, E. Oswald and M. Fischlin, ed., LNCS, vol.9057, pp.101-128, Springer, Heidelberg, April 2015. 10.1007\/978-3-662-46803-6_4","DOI":"10.1007\/978-3-662-46803-6_4"},{"key":"23","doi-asserted-by":"publisher","unstructured":"[24] C.S. Jutla and A. Roy, \u201cSwitching lemma for bilinear tests and constant-size NIZK proofs for linear subspaces,\u201d CRYPTO 2014, J.A. Garay and R. Gennaro, ed., LNCS, vol.8617, pp.295-312, Springer, Heidelberg, Aug. 2014. 10.1007\/978-3-662-44381-1_17","DOI":"10.1007\/978-3-662-44381-1_17"},{"key":"24","doi-asserted-by":"publisher","unstructured":"[25] B. Libert, T. Peters, M. Joye, and M. Yung, \u201cNon-malleability from malleability: Simulation-sound quasi-adaptive NIZK proofs and CCA2-secure encryption from homomorphic signatures,\u201d EUROCRYPT 2014, P.Q. Nguyen and E. Oswald, ed., LNCS, vol.8441, pp.514-532, Springer, Heidelberg, May 2014. 10.1007\/978-3-642-55220-5_29","DOI":"10.1007\/978-3-642-55220-5_29"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[26] B. Libert, T. Peters, M. Joye, and M. Yung, \u201cCompactly hiding linear spans \u2014 Tightly secure constant-size simulation-sound QA-NIZK proofs and applications,\u201d ASIACRYPT 2015, T. Iwata and J.H. Cheon, eds., LNCS, vol.9452, pp.681-707, Springer, Heidelberg, Nov.\/Dec. 2015. 10.1007\/978-3-662-48797-6_28","DOI":"10.1007\/978-3-662-48797-6_28"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[27] R. Langrehr and J. Pan, \u201cHierarchical identity-based encryption with tight multi-challenge security,\u201d PKC 2020, LNCS, vol.12110, pp.153-183, Springer, Heidelberg, 2020. 10.1007\/978-3-030-45374-9_6","DOI":"10.1007\/978-3-030-45374-9_6"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[28] R. Langrehr and J. Pan, \u201cUnbounded HIBE with tight security,\u201d ASIACRYPT 2020, LNCS, vol.12492, pp.129-159, Springer, Heidelberg, Dec. 2020. 10.1007\/978-3-030-64834-3_5","DOI":"10.1007\/978-3-030-64834-3_5"},{"key":"28","doi-asserted-by":"publisher","unstructured":"[29] O. Blazy, E. Kiltz, and J. Pan, \u201c(Hierarchical) identity-based encryption from affine message authentication,\u201d CRYPTO 2014, J.A. Garay and R. Gennaro, ed., LNCS, vol.8616, pp.408-425, Springer, Heidelberg, Aug. 2014. 10.1007\/978-3-662-44371-2_23","DOI":"10.1007\/978-3-662-44371-2_23"},{"key":"29","doi-asserted-by":"crossref","unstructured":"[30] J. Chen and J. Gong, \u201cABE with tag made easy \u2014 Concise framework and new instantiations in prime-order groups,\u201d ASIACRYPT 2017, T. Takagi and T. Peyrin, ed., LNCS, vol.10625, pp.35-65, Springer, Heidelberg, Dec. 2017. 10.1007\/978-3-319-70697-9_2","DOI":"10.1007\/978-3-319-70697-9_2"},{"key":"30","doi-asserted-by":"crossref","unstructured":"[31] P. Morillo, C. R\u00e0fols, and J.L. Villar, \u201cThe kernel matrix Diffie-Hellman assumption,\u201d ASIACRYPT 2016, J.H. Cheon and T. Takagi, ed., LNCS, vol.10031, pp.729-758, Springer, Heidelberg, Dec. 2016. 10.1007\/978-3-662-53887-6_27","DOI":"10.1007\/978-3-662-53887-6_27"},{"key":"31","doi-asserted-by":"crossref","unstructured":"[32] M. Abe, M. Chase, B. David, M. Kohlweiss, R. Nishimaki, and M. Ohkubo, \u201cConstant-size structure-preserving signatures: Generic constructions and simple assumptions,\u201d ASIACRYPT 2012, X. Wang and K. Sako, ed., LNCS, vol.7658, pp.4-24, Springer, Heidelberg, Dec. 2012. 10.1007\/978-3-642-34961-4_3","DOI":"10.1007\/978-3-642-34961-4_3"},{"key":"32","doi-asserted-by":"crossref","unstructured":"[33] M. Abe, C.S. Jutla, M. Ohkubo, J. Pan, A. Roy, and Y. Wang, \u201cShorter QA-NIZK and SPS with tighter security,\u201d ASIACRYPT 2019, S.D. Galbraith and S. Moriai, ed., LNCS, vol.11923, pp.669-699, Springer, Heidelberg, Dec. 2019. 10.1007\/978-3-030-34618-8_23","DOI":"10.1007\/978-3-030-34618-8_23"},{"key":"33","doi-asserted-by":"crossref","unstructured":"[34] R. Gay, D. Hofheinz, E. Kiltz, and H. Wee, \u201cTightly CCA-secure encryption without pairings,\u201d EUROCRYPT 2016, M. Fischlin and J.S. Coron, ed., LNCS, vol.9665, pp.1-27, Springer, Heidelberg, May 2016. 10.1007\/978-3-662-49890-3_1","DOI":"10.1007\/978-3-662-49890-3_1"},{"key":"34","doi-asserted-by":"crossref","unstructured":"[35] M. Abe, C.S. Jutla, M. Ohkubo, and A. Roy, \u201cImproved (almost) tightly-secure simulation-sound QA-NIZK with applications,\u201d ASIACRYPT 2018, T. Peyrin and S. Galbraith, ed., LNCS, vol.11272, pp.627-656, Springer, Heidelberg, Dec. 2018. 10.1007\/978-3-030-03326-2_21","DOI":"10.1007\/978-3-030-03326-2_21"},{"key":"35","doi-asserted-by":"publisher","unstructured":"[36] B. Qin, S. Liu, and K. Chen, \u201cEfficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience,\u201d IET Information Security, vol.9, no.1, pp.32-42, 2014. 10.1049\/iet-ifs.2013.0173","DOI":"10.1049\/iet-ifs.2013.0173"},{"key":"36","doi-asserted-by":"crossref","unstructured":"[37] B. Waters, \u201cDual system encryption: Realizing fully secure IBE and HIBE under simple assumptions,\u201d CRYPTO 2009, S. Halevi, ed., LNCS, vol.5677, pp.619-636, Springer, Heidelberg, Aug. 2009. 10.1007\/978-3-642-03356-8_36","DOI":"10.1007\/978-3-642-03356-8_36"},{"key":"37","doi-asserted-by":"publisher","unstructured":"[38] R. Cramer and V. Shoup, \u201cUniversal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption,\u201d EUROCRYPT 2002, L.R. Knudsen, ed., LNCS, vol.2332, pp.45-64, Springer, Heidelberg, April\/May 2002. 10.1007\/3-540-46035-7_4","DOI":"10.1007\/3-540-46035-7_4"},{"key":"38","doi-asserted-by":"publisher","unstructured":"[39] J. Katz, A. Sahai, and B. Waters, \u201cPredicate encryption supporting disjunctions, polynomial equations, and inner products,\u201d EUROCRYPT 2008, N.P. Smart, ed., LNCS, vol.4965, pp.146-162, Springer, Heidelberg, April 2008. 10.1007\/978-3-540-78967-3_9","DOI":"10.1007\/978-3-540-78967-3_9"},{"key":"39","doi-asserted-by":"crossref","unstructured":"[40] Y. Ishai and H. Wee, \u201cPartial garbling schemes and their applications,\u201d ICALP 2014, Part I, J. Esparza, P. Fraigniaud, T. Husfeldt, and E. Koutsoupias, eds., LNCS, vol.8572, pp.650-662, Springer, Heidelberg, July 2014. 10.1007\/978-3-662-43948-7_54","DOI":"10.1007\/978-3-662-43948-7_54"},{"key":"40","doi-asserted-by":"publisher","unstructured":"[41] Y. Dodis, L. Reyzin, and A. Smith, \u201cFuzzy extractors: How to generate strong keys from biometrics and other noisy data,\u201d EUROCRYPT 2004, C. Cachin and J. Camenisch, eds., LNCS, vol.3027, pp.523-540, Springer, Heidelberg, May 2004. 10.1007\/978-3-540-24676-3_31","DOI":"10.1007\/978-3-540-24676-3_31"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E105.A\/3\/E105.A_2021CIP0003\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,9]],"date-time":"2024-05-09T05:29:05Z","timestamp":1715232545000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E105.A\/3\/E105.A_2021CIP0003\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,1]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2021cip0003","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,1]]},"article-number":"2021CIP0003"}}