Fully Leakage-Resilient Signatures

被引:0
|
作者
Boyle, Elette [1 ]
Segev, Gil [2 ]
Wichs, Daniel [3 ]
机构
[1] MIT, 77 Massachusetts Ave, Cambridge, MA 02139 USA
[2] Microsoft Res, Mountain View, CA 94043 USA
[3] NYU, New York, NY 10012 USA
来源
关键词
IDENTITY-BASED ENCRYPTION; PUBLIC-KEY ENCRYPTION; SECURE; CRYPTOGRAPHY; CIRCUITS; SCHEMES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A signature scheme is fully leakage resilient (Katz and Vaikuntanathan, ASIACRYPT '09) if it is existentially unforgeable under an adaptive chosen-message attack even in a setting where an adversary may obtain bounded (yet arbitrary) leakage information on all intermediate values that are used throughout the lifetime of the system. This is a strong and meaningful notion of security that captures a wide range of side-channel attacks. One of the main challenges in constructing fully leakage-resilient signature schemes is dealing with leakage that may depend on the random bits used by the signing algorithm, and constructions of such schemes are known only in the random-oracle model. Moreover, even in the random-oracle model, known schemes are only resilient to leakage of less than half the length of their signing key. In this paper we construct fully leakage-resilient signature schemes without random oracles. We present a scheme that is resilient to any leakage of length (1 - o(1))L bits, where L is the length of the signing key. Our approach relies on generic cryptographic primitives, and at the same time admits rather efficient instantiations based on specific number-theoretic assumptions. In addition, we show that our approach extends to the continual-leakage model, recently introduced by Dodis, Haralambiev, Lopez-Alt and Wichs (FOCS '10), and by Brakerski, Tauman Kalai, Katz and Vaikuntanathan (FOCS '10). In this model the signing key is allowed to be refreshed, while its corresponding verification key remains fixed, and the amount of leakage is assumed to be bounded only in between any two successive key refreshes.
引用
收藏
页码:89 / +
页数:4
相关论文
共 50 条
  • [41] Lower Bounds for Leakage-Resilient Secret Sharing
    Nielsen, Jesper Buus
    Simkin, Mark
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 556 - 577
  • [42] Leakage-Resilient Non-malleable Codes
    Aggarwal, Divesh
    Dziembowski, Stefan
    Kazana, Tomasz
    Obremski, Maciej
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT I, 2015, 9014 : 398 - 426
  • [43] Leakage-Resilient Layout Randomization for Mobile Devices
    Braden, Kjell
    Crane, Stephen
    Davi, Lucas
    Franz, Michael
    Larsen, Per
    Liebchen, Christopher
    Sadeghi, Ahmad-Reza
    23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
  • [44] Leakage-resilient group signature: Definitions and constructions
    Huang, Jianye
    Huang, Qiong
    Susilo, Willy
    INFORMATION SCIENCES, 2020, 509 : 119 - 132
  • [45] Leakage-Resilient Storage Scheme for Cryptographic Applications
    Alawatugoda, Janaka
    Ragel, Roshan
    Eranga, Danushka
    Jayanath, Nalaka
    Somathilaka, Chinthaka
    2016 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION FOR SUSTAINABILITY (ICIAFS): INTEROPERABLE SUSTAINABLE SMART SYSTEMS FOR NEXT GENERATION, 2016,
  • [46] Strongly Leakage-Resilient Authenticated Key Exchange
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Susilo, Willy
    Guo, Fuchun
    TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 19 - 36
  • [47] Memory leakage-resilient secret sharing schemes
    DAI ShuGuang
    WEI JinFeng
    ZHANG FangGuo
    ScienceChina(InformationSciences), 2015, 58 (11) : 191 - 199
  • [48] A Note on Leakage-Resilient Authenticated Key Exchange
    Chun, Ji Young
    Hwang, Jung Yeon
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (05) : 2274 - 2279
  • [49] Leakage-resilient certificate-based encryption
    Yu, Qihong
    Li, Jiguo
    Zhang, Yichen
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3346 - 3355
  • [50] Leakage-resilient group signature: Definitions and constructions
    Huang, Jianye
    Huang, Qiong
    Susilo, Willy
    Information Sciences, 2020, 509 : 119 - 132