Fully Leakage-Resilient Signatures

被引:0
|
作者
Boyle, Elette [1 ]
Segev, Gil [2 ]
Wichs, Daniel [3 ]
机构
[1] MIT, 77 Massachusetts Ave, Cambridge, MA 02139 USA
[2] Microsoft Res, Mountain View, CA 94043 USA
[3] NYU, New York, NY 10012 USA
来源
关键词
IDENTITY-BASED ENCRYPTION; PUBLIC-KEY ENCRYPTION; SECURE; CRYPTOGRAPHY; CIRCUITS; SCHEMES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A signature scheme is fully leakage resilient (Katz and Vaikuntanathan, ASIACRYPT '09) if it is existentially unforgeable under an adaptive chosen-message attack even in a setting where an adversary may obtain bounded (yet arbitrary) leakage information on all intermediate values that are used throughout the lifetime of the system. This is a strong and meaningful notion of security that captures a wide range of side-channel attacks. One of the main challenges in constructing fully leakage-resilient signature schemes is dealing with leakage that may depend on the random bits used by the signing algorithm, and constructions of such schemes are known only in the random-oracle model. Moreover, even in the random-oracle model, known schemes are only resilient to leakage of less than half the length of their signing key. In this paper we construct fully leakage-resilient signature schemes without random oracles. We present a scheme that is resilient to any leakage of length (1 - o(1))L bits, where L is the length of the signing key. Our approach relies on generic cryptographic primitives, and at the same time admits rather efficient instantiations based on specific number-theoretic assumptions. In addition, we show that our approach extends to the continual-leakage model, recently introduced by Dodis, Haralambiev, Lopez-Alt and Wichs (FOCS '10), and by Brakerski, Tauman Kalai, Katz and Vaikuntanathan (FOCS '10). In this model the signing key is allowed to be refreshed, while its corresponding verification key remains fixed, and the amount of leakage is assumed to be bounded only in between any two successive key refreshes.
引用
收藏
页码:89 / +
页数:4
相关论文
共 50 条
  • [21] Indistinguishable Leakage-Resilient Circuit Compiler
    Xu, Shiyou
    Wang, Jian
    Wang, Liangliang
    COMPUTER JOURNAL, 2023, 66 (07): : 1717 - 1732
  • [22] Leakage-resilient Certificateless Signcryption Scheme
    Yang, Qiliang
    Thou, Yanwei
    Yu, Yong
    2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
  • [23] Limits of a conjecture on a leakage-resilient cryptosystem
    Galindo, David
    Vivek, Srinivas
    INFORMATION PROCESSING LETTERS, 2014, 114 (04) : 192 - 196
  • [24] New Developments in Leakage-Resilient Cryptography
    Vaikuntanathan, Vinod
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 283 - 283
  • [25] Practical Leakage-Resilient Symmetric Cryptography
    Faust, Sebastian
    Pietrzak, Krzysztof
    Schipper, Joachim
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 213 - 232
  • [26] Practical Leakage-Resilient Pseudorandom Generators
    Yu, Yu
    Standaert, Francois-Xavier
    Pereira, Olivier
    Yung, Moti
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 141 - 151
  • [27] A new construction of leakage-resilient signature
    Wang, Zhiwei
    Zhang, Wei
    Journal of Computational Information Systems, 2010, 6 (02): : 387 - 394
  • [28] Leakage-resilient ring signature schemes
    Huang, Jianye
    Huang, Qiong
    Susilo, Willy
    THEORETICAL COMPUTER SCIENCE, 2019, 759 : 1 - 13
  • [29] Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    Huang, Sen-Shan
    INFORMATICA, 2023, 34 (01) : 199 - 222
  • [30] Leakage-Resilient Cryptography from Minimal Assumptions
    Carmit Hazay
    Adriana López-Alt
    Hoeteck Wee
    Daniel Wichs
    Journal of Cryptology, 2016, 29 : 514 - 551