Continual leakage resilient SM2 signature scheme

被引:0
|
作者
Ding Yujie [1 ]
Zhang Yingnan [1 ]
Zhou Tanping [1 ]
机构
[1] Engn Univ PAP, Coll Cryptog Engn, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Digital Signature; SM2; Continual Leakage Resilient; Side-channels; SECURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital signature is a very important primitive in the area of public key cryptography. It guarantees the integrity and irreversibility of the electronic data. Such as the national cryptography SM2 digital signature scheme, which is denoted as SM2 concisely. As everyone knows, there are so many domestic organizations apply SM2 to guarantee the irreversibility and integrity of electronic data, such as Tencent, Ali and the variety of commercial banks. However since the emerging of side channel attacks which could steal the inner secret information of SM2 during its execution by analyzing running-time, electromagnetic radiation, power consumption, fault detection and many more, the traditional SM2 is no longer secure. For example, once the adversary obtain the secret information such as the secret key used to sign electronic data it can forge any data's signature. This means that the adversary could steal money and privacy of organizations by forge the corresponding signatures. This is a fatal disease. In this paper we give a continual leakage resilient version of SM2, which aims at achieving that although a part of secret key is continual leaked by side-channel attacks, the adversary couldn't forge signatures. And then we prove our scheme in the generic bilinear model. Finally, we implement our scheme and test the efficiency which demonstrates the validity and practicability of our scheme.
引用
收藏
页码:931 / 936
页数:6
相关论文
共 50 条
  • [1] Timing leakage to break SM2 signature algorithm
    Chen, Aidong
    Hong, Chen
    Shang, Xinna
    Jing, Hongyuan
    Xu, Sen
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67
  • [2] Adaptor Signature Scheme Based on the SM2 Digital Signature Algorithm
    Peng C.
    Luo M.
    He D.
    Huang X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2278 - 2286
  • [3] Leakage-Resilient Certificateless Signature Under Continual Leakage Model
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (02): : 363 - 386
  • [4] Provably secure multi-signature scheme based on the standard SM2 signature scheme
    Xiao, Yuchen
    Zhang, Lei
    Yang, Yafang
    Wu, Wei
    Ning, Jianting
    Huang, Xinyi
    COMPUTER STANDARDS & INTERFACES, 2024, 89
  • [5] Leakage-Resilient Certificateless Signcryption Scheme Under a Continual Leakage Model
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE ACCESS, 2023, 11 : 54448 - 54461
  • [6] Leakage-Resilient Signature Scheme Based on BLS Signature
    Wang Zhiwei
    CHINA COMMUNICATIONS, 2011, 8 (03) : 212 - 215
  • [7] Non-interactive SM2 threshold signature scheme with identifiable abort
    Liang, Huiqiang
    Chen, Jianhua
    FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (01)
  • [8] An Efficient Scheme for Implementation of SM2 Digital Signature over GF(p)
    Liu, Yanhua
    Guo, Wei
    Tan, Ya
    Wei, Jizeng
    Sun, Dazhi
    CONTEMPORARY RESEARCH ON E-BUSINESS TECHNOLOGY AND STRATEGY, 2012, 332 : 250 - 258
  • [9] Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks
    Zhang, Zhenfeng
    Yang, Kang
    Zhang, Jiang
    Chen, Cheng
    SECURITY STANDARDISATION RESEARCH, SSR 2015, 2015, 9497 : 140 - 153
  • [10] A SM2 Elliptic Curve Threshold Signature Scheme without a Trusted Center
    Yan Jie
    Lu Yu
    Chen Li-yun
    Nie Wei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (02): : 897 - 913