Leakage-Resilient Signatures

被引:0
|
作者
Faust, Sebastian [1 ]
Kiltz, Eike [2 ]
Pietrzak, Krzysztof [2 ]
Rothblum, Guy N. [3 ]
机构
[1] KU Leuven ESAT COSIC IBBT, Louvain, Belgium
[2] CWI, Amsterdam, Netherlands
[3] MIT, Boston, MA USA
来源
基金
美国国家科学基金会;
关键词
CRYPTOGRAPHY; SECURE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insufficient due to "side-channel attacks" which exploit leakage of information about the secret internal state. In this work we put forward the notion of "leakage-resilient signatures," which strengthens the standard security notion by giving the adversary the additional power to learn a bounded amount of arbitrary information about the secret state that was accessed during every signature generation. This notion naturally implies security against all side-channel attacks as long as the amount of information leaked on each invocation is bounded and "only computation leaks information." The main result of this paper is a construction which gives a (tree-based; stateful) leakage-resilient signature scheme based on any 3-time signature scheme. The amount of information that our scheme can safely leak per signature generation is 1/3 of the information the underlying 3-time signature scheme can leak in total. Signature schemes that remain secure even if a bounded total amount of information is leaked were recently constructed, hence instantiating our construction with these schemes gives the first constructions of provably secure leakage-resilient signature schemes. The above construction assumes that the signing algorithm can sample truly random bits, and thus an implementation would need some special hardware (randomness gates). Simply generating this randomness using a leakage-resilient stream-cipher will in general not work. Our second contribution is a sound general principle to replace uniform random bits in any leakage-resilient construction with pseudorandom ones: run two leakage-resilient stream-ciphers (with independent keys) in parallel and then apply a two-source extractor to their outputs.
引用
收藏
页码:343 / +
页数:3
相关论文
共 50 条
  • [21] Limits of a conjecture on a leakage-resilient cryptosystem
    Galindo, David
    Vivek, Srinivas
    INFORMATION PROCESSING LETTERS, 2014, 114 (04) : 192 - 196
  • [22] New Developments in Leakage-Resilient Cryptography
    Vaikuntanathan, Vinod
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 283 - 283
  • [23] Practical Leakage-Resilient Symmetric Cryptography
    Faust, Sebastian
    Pietrzak, Krzysztof
    Schipper, Joachim
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 213 - 232
  • [24] Practical Leakage-Resilient Pseudorandom Generators
    Yu, Yu
    Standaert, Francois-Xavier
    Pereira, Olivier
    Yung, Moti
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 141 - 151
  • [25] A new construction of leakage-resilient signature
    Wang, Zhiwei
    Zhang, Wei
    Journal of Computational Information Systems, 2010, 6 (02): : 387 - 394
  • [26] Leakage-resilient ring signature schemes
    Huang, Jianye
    Huang, Qiong
    Susilo, Willy
    THEORETICAL COMPUTER SCIENCE, 2019, 759 : 1 - 13
  • [27] Fully leakage-resilient signatures revisited: Graceful degradation, noisy leakage, and construction in the bounded-retrieval model
    Faonio, Antonio
    Nielsen, Jesper Buus
    Venturi, Daniele
    THEORETICAL COMPUTER SCIENCE, 2017, 660 : 23 - 56
  • [28] Leakage-Resilient Cryptography from Minimal Assumptions
    Carmit Hazay
    Adriana López-Alt
    Hoeteck Wee
    Daniel Wichs
    Journal of Cryptology, 2016, 29 : 514 - 551
  • [29] Leakage-resilient authenticated key establishment protocols
    Shin, SH
    Kobara, K
    Imai, H
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 155 - 172
  • [30] Leakage-Resilient Certificateless Key Encapsulation Scheme
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Chou, Wei-Chieh
    INFORMATICA, 2018, 29 (01) : 125 - 155