Leakage-Resilient Signatures

被引:0
作者
Faust, Sebastian [1 ]
Kiltz, Eike [2 ]
Pietrzak, Krzysztof [2 ]
Rothblum, Guy N. [3 ]
机构
[1] KU Leuven ESAT COSIC IBBT, Louvain, Belgium
[2] CWI, Amsterdam, Netherlands
[3] MIT, Boston, MA USA
来源
THEORY OF CRYPTOGRAPHY, PROCEEDINGS | 2010年 / 5978卷
基金
美国国家科学基金会;
关键词
CRYPTOGRAPHY; SECURE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insufficient due to "side-channel attacks" which exploit leakage of information about the secret internal state. In this work we put forward the notion of "leakage-resilient signatures," which strengthens the standard security notion by giving the adversary the additional power to learn a bounded amount of arbitrary information about the secret state that was accessed during every signature generation. This notion naturally implies security against all side-channel attacks as long as the amount of information leaked on each invocation is bounded and "only computation leaks information." The main result of this paper is a construction which gives a (tree-based; stateful) leakage-resilient signature scheme based on any 3-time signature scheme. The amount of information that our scheme can safely leak per signature generation is 1/3 of the information the underlying 3-time signature scheme can leak in total. Signature schemes that remain secure even if a bounded total amount of information is leaked were recently constructed, hence instantiating our construction with these schemes gives the first constructions of provably secure leakage-resilient signature schemes. The above construction assumes that the signing algorithm can sample truly random bits, and thus an implementation would need some special hardware (randomness gates). Simply generating this randomness using a leakage-resilient stream-cipher will in general not work. Our second contribution is a sound general principle to replace uniform random bits in any leakage-resilient construction with pseudorandom ones: run two leakage-resilient stream-ciphers (with independent keys) in parallel and then apply a two-source extractor to their outputs.
引用
收藏
页码:343 / +
页数:3
相关论文
共 50 条
  • [21] Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Tsai, Tung-Tso
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2020, 1 (01): : 131 - 144
  • [22] Leakage-Resilient IBE/ABE with Optimal Leakage Rates from Lattices
    Lai, Qiqi
    Liu, Feng-Hao
    Wang, Zhedong
    PUBLIC-KEY CRYPTOGRAPHY, PKC 2022, PT II, 2022, 13178 : 225 - 255
  • [23] Leakage-Resilient Certificateless Signcryption Scheme Under a Continual Leakage Model
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE ACCESS, 2023, 11 : 54448 - 54461
  • [24] Leakage-resilient IBE/ABE with optimal leakage rates from lattices
    Lai, Qiqi
    Liu, Feng-Hao
    Wang, Zhedong
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (06) : 1541 - 1597
  • [25] Leakage-Resilient Certificate-Based Authenticated Key Exchange Protocol
    Tsai, Tung-Tso
    Huang, Sen-Shan
    Tseng, Yuh-Min
    Chuang, Yun-Hsin
    Hung, Ying-Hao
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2022, 3 : 137 - 148
  • [26] Efficient leakage-resilient public key encryption from DDH assumption
    Li, Sujuan
    Zhang, Futai
    Sun, Yinxia
    Shen, Limin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 797 - 806
  • [27] Signatures Resilient to Uninvertible Leakage
    Wang, Yuyu
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Tanaka, Keisuke
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 2016, 9841 : 372 - 390
  • [28] High Speed ASIC Implementations of Leakage-Resilient Cryptography
    Schilling, Robert
    Unterluggauer, Thomas
    Mangard, Stefan
    Gurkaynak, Frank K.
    Muehlberghuber, Michael
    Benini, Luca
    PROCEEDINGS OF THE 2018 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2018, : 1259 - 1264
  • [29] LR-OT: Leakage-Resilient Oblivious Transfer
    Berti, Francesco
    Hazay, Carmit
    Levi, Itamar
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PT I, SCN 2024, 2024, 14973 : 182 - 204
  • [30] Leakage-Resilient Password-Based Authenticated Key Exchange
    Ruan, Ou
    Zhang, Mingwu
    Chen, Jing
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017, 2017, 10393 : 285 - 296