Leakage-Resilient Signatures

被引:0
|
作者
Faust, Sebastian [1 ]
Kiltz, Eike [2 ]
Pietrzak, Krzysztof [2 ]
Rothblum, Guy N. [3 ]
机构
[1] KU Leuven ESAT COSIC IBBT, Louvain, Belgium
[2] CWI, Amsterdam, Netherlands
[3] MIT, Boston, MA USA
来源
基金
美国国家科学基金会;
关键词
CRYPTOGRAPHY; SECURE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insufficient due to "side-channel attacks" which exploit leakage of information about the secret internal state. In this work we put forward the notion of "leakage-resilient signatures," which strengthens the standard security notion by giving the adversary the additional power to learn a bounded amount of arbitrary information about the secret state that was accessed during every signature generation. This notion naturally implies security against all side-channel attacks as long as the amount of information leaked on each invocation is bounded and "only computation leaks information." The main result of this paper is a construction which gives a (tree-based; stateful) leakage-resilient signature scheme based on any 3-time signature scheme. The amount of information that our scheme can safely leak per signature generation is 1/3 of the information the underlying 3-time signature scheme can leak in total. Signature schemes that remain secure even if a bounded total amount of information is leaked were recently constructed, hence instantiating our construction with these schemes gives the first constructions of provably secure leakage-resilient signature schemes. The above construction assumes that the signing algorithm can sample truly random bits, and thus an implementation would need some special hardware (randomness gates). Simply generating this randomness using a leakage-resilient stream-cipher will in general not work. Our second contribution is a sound general principle to replace uniform random bits in any leakage-resilient construction with pseudorandom ones: run two leakage-resilient stream-ciphers (with independent keys) in parallel and then apply a two-source extractor to their outputs.
引用
收藏
页码:343 / +
页数:3
相关论文
共 50 条
  • [31] Leakage-Resilient Incompressible Cryptography: Constructions and Barriers
    Bhushan, Kaartik
    Goyal, Rishab
    Koppula, Venkata
    Narayanan, Varun
    Prabhakaran, Manoj
    Rajasree, Mahesh Sreekumar
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT VII, 2025, 15490 : 201 - 234
  • [32] Leakage-Resilient Circuits without Computational Assumptions
    Dziembowski, Stefan
    Faust, Sebastian
    THEORY OF CRYPTOGRAPHY (TCC 2012), 2012, 7194 : 230 - 247
  • [33] Constructing Committing and Leakage-Resilient Authenticated Encryption
    Struck, Patrick
    Weishaeupl, Maximiliane
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 497 - 528
  • [34] Leakage-Resilient Cryptography from Minimal Assumptions
    Hazay, Carmit
    Lopez-Alt, Adriana
    Wee, Hoeteck
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 160 - 176
  • [35] Continuous leakage-resilient IBE in cloud computing
    Xiang, Xinyin
    Zhao, Xingwen
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (10)
  • [36] Memory leakage-resilient searchable symmetric encryption
    Dai, Shuguang
    Li, Huige
    Zhang, Fangguo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 76 - 84
  • [37] Leakage-Resilient Certificateless Signature Under Continual Leakage Model
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (02): : 363 - 386
  • [38] A New Leakage-Resilient IBE Scheme in the Relative Leakage Model
    Chen, Yu
    Luo, Song
    Chen, Zhong
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 263 - 270
  • [39] Lower Bounds for Leakage-Resilient Secret Sharing
    Nielsen, Jesper Buus
    Simkin, Mark
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 556 - 577
  • [40] Leakage-Resilient Layout Randomization for Mobile Devices
    Braden, Kjell
    Crane, Stephen
    Davi, Lucas
    Franz, Michael
    Larsen, Per
    Liebchen, Christopher
    Sadeghi, Ahmad-Reza
    23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,