Fully Leakage-Resilient Signatures

被引:0
|
作者
Boyle, Elette [1 ]
Segev, Gil [2 ]
Wichs, Daniel [3 ]
机构
[1] MIT, 77 Massachusetts Ave, Cambridge, MA 02139 USA
[2] Microsoft Res, Mountain View, CA 94043 USA
[3] NYU, New York, NY 10012 USA
来源
关键词
IDENTITY-BASED ENCRYPTION; PUBLIC-KEY ENCRYPTION; SECURE; CRYPTOGRAPHY; CIRCUITS; SCHEMES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A signature scheme is fully leakage resilient (Katz and Vaikuntanathan, ASIACRYPT '09) if it is existentially unforgeable under an adaptive chosen-message attack even in a setting where an adversary may obtain bounded (yet arbitrary) leakage information on all intermediate values that are used throughout the lifetime of the system. This is a strong and meaningful notion of security that captures a wide range of side-channel attacks. One of the main challenges in constructing fully leakage-resilient signature schemes is dealing with leakage that may depend on the random bits used by the signing algorithm, and constructions of such schemes are known only in the random-oracle model. Moreover, even in the random-oracle model, known schemes are only resilient to leakage of less than half the length of their signing key. In this paper we construct fully leakage-resilient signature schemes without random oracles. We present a scheme that is resilient to any leakage of length (1 - o(1))L bits, where L is the length of the signing key. Our approach relies on generic cryptographic primitives, and at the same time admits rather efficient instantiations based on specific number-theoretic assumptions. In addition, we show that our approach extends to the continual-leakage model, recently introduced by Dodis, Haralambiev, Lopez-Alt and Wichs (FOCS '10), and by Brakerski, Tauman Kalai, Katz and Vaikuntanathan (FOCS '10). In this model the signing key is allowed to be refreshed, while its corresponding verification key remains fixed, and the amount of leakage is assumed to be bounded only in between any two successive key refreshes.
引用
收藏
页码:89 / +
页数:4
相关论文
共 50 条
  • [31] Leakage-resilient authenticated key establishment protocols
    Shin, SH
    Kobara, K
    Imai, H
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 155 - 172
  • [32] Leakage-Resilient Incompressible Cryptography: Constructions and Barriers
    Bhushan, Kaartik
    Goyal, Rishab
    Koppula, Venkata
    Narayanan, Varun
    Prabhakaran, Manoj
    Rajasree, Mahesh Sreekumar
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT VII, 2025, 15490 : 201 - 234
  • [33] Leakage-Resilient Circuits without Computational Assumptions
    Dziembowski, Stefan
    Faust, Sebastian
    THEORY OF CRYPTOGRAPHY (TCC 2012), 2012, 7194 : 230 - 247
  • [34] Leakage-Resilient Certificateless Key Encapsulation Scheme
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Chou, Wei-Chieh
    INFORMATICA, 2018, 29 (01) : 125 - 155
  • [35] Constructing Committing and Leakage-Resilient Authenticated Encryption
    Struck, Patrick
    Weishaeupl, Maximiliane
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 497 - 528
  • [36] Leakage-Resilient Cryptography from Minimal Assumptions
    Hazay, Carmit
    Lopez-Alt, Adriana
    Wee, Hoeteck
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 160 - 176
  • [37] Continuous leakage-resilient IBE in cloud computing
    Xiang, Xinyin
    Zhao, Xingwen
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (10)
  • [38] Memory leakage-resilient searchable symmetric encryption
    Dai, Shuguang
    Li, Huige
    Zhang, Fangguo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 76 - 84
  • [39] Leakage-Resilient Certificateless Signature Under Continual Leakage Model
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (02): : 363 - 386
  • [40] A New Leakage-Resilient IBE Scheme in the Relative Leakage Model
    Chen, Yu
    Luo, Song
    Chen, Zhong
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 263 - 270