Leakage-Resilient Signatures

被引:0
作者
Faust, Sebastian [1 ]
Kiltz, Eike [2 ]
Pietrzak, Krzysztof [2 ]
Rothblum, Guy N. [3 ]
机构
[1] KU Leuven ESAT COSIC IBBT, Louvain, Belgium
[2] CWI, Amsterdam, Netherlands
[3] MIT, Boston, MA USA
来源
THEORY OF CRYPTOGRAPHY, PROCEEDINGS | 2010年 / 5978卷
基金
美国国家科学基金会;
关键词
CRYPTOGRAPHY; SECURE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insufficient due to "side-channel attacks" which exploit leakage of information about the secret internal state. In this work we put forward the notion of "leakage-resilient signatures," which strengthens the standard security notion by giving the adversary the additional power to learn a bounded amount of arbitrary information about the secret state that was accessed during every signature generation. This notion naturally implies security against all side-channel attacks as long as the amount of information leaked on each invocation is bounded and "only computation leaks information." The main result of this paper is a construction which gives a (tree-based; stateful) leakage-resilient signature scheme based on any 3-time signature scheme. The amount of information that our scheme can safely leak per signature generation is 1/3 of the information the underlying 3-time signature scheme can leak in total. Signature schemes that remain secure even if a bounded total amount of information is leaked were recently constructed, hence instantiating our construction with these schemes gives the first constructions of provably secure leakage-resilient signature schemes. The above construction assumes that the signing algorithm can sample truly random bits, and thus an implementation would need some special hardware (randomness gates). Simply generating this randomness using a leakage-resilient stream-cipher will in general not work. Our second contribution is a sound general principle to replace uniform random bits in any leakage-resilient construction with pseudorandom ones: run two leakage-resilient stream-ciphers (with independent keys) in parallel and then apply a two-source extractor to their outputs.
引用
收藏
页码:343 / +
页数:3
相关论文
共 50 条
  • [31] Continuous After-the-Fact Leakage-Resilient Key Exchange
    Alawatugoda, Janaka
    Boyd, Colin
    Stebila, Douglas
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 258 - 273
  • [32] An Efficient Leakage-Resilient Authenticated Key Exchange Protocol Suitable for IoT Devices
    Peng, An-Li
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE SYSTEMS JOURNAL, 2021, 15 (04): : 5343 - 5354
  • [33] Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Tsai, Tung-Tso
    Chuang, Yun-Hsin
    Hung, Ying-Hao
    INFORMATICA, 2022, 33 (01) : 151 - 179
  • [34] Continuous leakage-resilient access control for wireless sensor networks
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    Xia, Zhe
    AD HOC NETWORKS, 2018, 80 : 41 - 53
  • [35] Leakage-Resilient Key Exchange and Two-Seed Extractors
    Li, Xin
    Ma, Fermi
    Quach, Willy
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I, 2020, 12170 : 401 - 429
  • [36] Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate
    Zhang, Mingwu
    Yang, Bo
    Takagi, Tsuyoshi
    COMPUTER JOURNAL, 2013, 56 (04) : 464 - 477
  • [37] Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
    Armknecht, Frederik
    Maes, Roel
    Sadeghi, Ahmad-Reza
    Sunar, Berk
    Tuyls, Pim
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 685 - +
  • [38] Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Xie, Jia-Yi
    Hung, Ying-Hao
    IEEE ACCESS, 2022, 10 : 104636 - 104648
  • [39] Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments
    Tseng, Yuh-Min
    Wu, Jui-Di
    Hung, Ruo-Wei
    Chien, Hung-Yu
    2018 9TH INTERNATIONAL CONFERENCE ON AWARENESS SCIENCE AND TECHNOLOGY (ICAST), 2018, : 251 - 256
  • [40] The generic construction of continuous leakage-resilient identity-based cryptosystems
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    THEORETICAL COMPUTER SCIENCE, 2019, 772 : 1 - 45