Leakage-Resilient Signatures

被引:0
作者
Faust, Sebastian [1 ]
Kiltz, Eike [2 ]
Pietrzak, Krzysztof [2 ]
Rothblum, Guy N. [3 ]
机构
[1] KU Leuven ESAT COSIC IBBT, Louvain, Belgium
[2] CWI, Amsterdam, Netherlands
[3] MIT, Boston, MA USA
来源
THEORY OF CRYPTOGRAPHY, PROCEEDINGS | 2010年 / 5978卷
基金
美国国家科学基金会;
关键词
CRYPTOGRAPHY; SECURE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insufficient due to "side-channel attacks" which exploit leakage of information about the secret internal state. In this work we put forward the notion of "leakage-resilient signatures," which strengthens the standard security notion by giving the adversary the additional power to learn a bounded amount of arbitrary information about the secret state that was accessed during every signature generation. This notion naturally implies security against all side-channel attacks as long as the amount of information leaked on each invocation is bounded and "only computation leaks information." The main result of this paper is a construction which gives a (tree-based; stateful) leakage-resilient signature scheme based on any 3-time signature scheme. The amount of information that our scheme can safely leak per signature generation is 1/3 of the information the underlying 3-time signature scheme can leak in total. Signature schemes that remain secure even if a bounded total amount of information is leaked were recently constructed, hence instantiating our construction with these schemes gives the first constructions of provably secure leakage-resilient signature schemes. The above construction assumes that the signing algorithm can sample truly random bits, and thus an implementation would need some special hardware (randomness gates). Simply generating this randomness using a leakage-resilient stream-cipher will in general not work. Our second contribution is a sound general principle to replace uniform random bits in any leakage-resilient construction with pseudorandom ones: run two leakage-resilient stream-ciphers (with independent keys) in parallel and then apply a two-source extractor to their outputs.
引用
收藏
页码:343 / +
页数:3
相关论文
共 50 条
  • [41] Leakage-resilient identity-based cryptography from minimal assumptions
    Zhou, Yanwei
    Yang, Bo
    Qiao, Zirui
    Xia, Zhe
    Zhang, Mingwu
    Mu, Yi
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (11) : 3757 - 3801
  • [42] On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages
    De Santis, Fabrizio
    Rass, Stefan
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014, 2015, 8895 : 127 - 145
  • [43] Leakage-Resilient Hybrid Signcryption in Heterogeneous Public-key Systems
    Ho, Ting-Chieh
    Tseng, Yuh-Min
    Huang, Sen-Shan
    INFORMATICA, 2024, 35 (01) : 131 - 154
  • [44] Leakage-Resilient Key-Dependent Message Secure Encryption Schemes
    Gupta, Dhairya
    Rajasree, Mahesh Sreekumar
    Swaminathan, Harihar
    PROGRESS IN CRYPTOLOGY-INDOCRYPT 2024, PT I, 2025, 15495 : 234 - 257
  • [45] Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity
    Zhang, Yinghui
    Yang, Menglei
    Zheng, Dong
    Zhang, Tiantian
    Guo, Rui
    Ren, Fang
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 665 - 681
  • [46] LRCoin: Leakage-Resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT
    Yu, Yong
    Ding, Yujie
    Zhao, Yanqi
    Li, Yannan
    Zhao, Yi
    Du, Xiaojiang
    Guizani, Mohsen
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) : 4702 - 4710
  • [47] Signatures Resilient to Continual Leakage on Memory and Computation
    Malkin, Tal
    Teranishi, Isamu
    Vahlis, Yevgeniy
    Yung, Moti
    THEORY OF CRYPTOGRAPHY, 2011, 6597 : 89 - 106
  • [48] A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks
    Hsieh, Tsung-Che
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE ACCESS, 2020, 8 (08): : 121795 - 121810
  • [49] Continuous Leakage-resilient and Hierarchical Identity-based Online/Offline Encryption
    Yu, Qihong
    Shen, Jian
    Lai, Jin-Feng
    Ji, Sai
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (06): : 1287 - 1296
  • [50] Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model
    Zhang, Leyou
    Wang, Zhuanning
    Wu, Qing
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 201 - 210