Continual leakage resilient SM2 signature scheme

被引:0
|
作者
Ding Yujie [1 ]
Zhang Yingnan [1 ]
Zhou Tanping [1 ]
机构
[1] Engn Univ PAP, Coll Cryptog Engn, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Digital Signature; SM2; Continual Leakage Resilient; Side-channels; SECURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital signature is a very important primitive in the area of public key cryptography. It guarantees the integrity and irreversibility of the electronic data. Such as the national cryptography SM2 digital signature scheme, which is denoted as SM2 concisely. As everyone knows, there are so many domestic organizations apply SM2 to guarantee the irreversibility and integrity of electronic data, such as Tencent, Ali and the variety of commercial banks. However since the emerging of side channel attacks which could steal the inner secret information of SM2 during its execution by analyzing running-time, electromagnetic radiation, power consumption, fault detection and many more, the traditional SM2 is no longer secure. For example, once the adversary obtain the secret information such as the secret key used to sign electronic data it can forge any data's signature. This means that the adversary could steal money and privacy of organizations by forge the corresponding signatures. This is a fatal disease. In this paper we give a continual leakage resilient version of SM2, which aims at achieving that although a part of secret key is continual leaked by side-channel attacks, the adversary couldn't forge signatures. And then we prove our scheme in the generic bilinear model. Finally, we implement our scheme and test the efficiency which demonstrates the validity and practicability of our scheme.
引用
收藏
页码:931 / 936
页数:6
相关论文
共 50 条
  • [31] Private Key Protected SM2 Scheme for Web3
    Zhang, Fu-Tai
    Zhang, Jie
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (12): : 5621 - 5635
  • [32] Identity-Based Encryption Resilient to Continual Auxiliary Leakage
    Yuen, Tsz Hon
    Chow, Sherman S. M.
    Zhang, Ye
    Yiu, Siu Ming
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 117 - 134
  • [33] A new construction of leakage-resilient signature
    Wang, Zhiwei
    Zhang, Wei
    Journal of Computational Information Systems, 2010, 6 (02): : 387 - 394
  • [34] Leakage-resilient ring signature schemes
    Huang, Jianye
    Huang, Qiong
    Susilo, Willy
    THEORETICAL COMPUTER SCIENCE, 2019, 759 : 1 - 13
  • [35] Secret Sharing based SM2 Digital Signature Generation using Homomorphic Encryption
    Long, Yihong
    Cheng, Minyang
    2019 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2019), 2019, : 252 - 256
  • [36] Leakage-resilient ID-based signature scheme in the generic bilinear group model
    Wu, Jui-Di
    Tseng, Yuh-Min
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 3987 - 4001
  • [37] Flush-reload cache timing attack on SM2 digital signature algorithm
    Zhou, Ping
    Wang, Tao
    Zhang, Fan
    Zhao, Xinjie
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2018, 46 (03): : 24 - 29
  • [38] A white-box cryptographic SM2 scheme based on space hardness
    Jiang, Xiong
    Luo, Tianyuan
    2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, : 1260 - 1264
  • [39] An Identity Authentication Scheme Based on SM2 Algorithm in UAV Communication Network
    Xia, Tao
    He, Jun
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [40] Continual Leakage-Resilient Hedged Public-Key Encryption
    Huang, Meijuan
    Yang, Bo
    Zhou, Yanwei
    Hu, Xuewei
    COMPUTER JOURNAL, 2022, 65 (06): : 1574 - 1585