Continual leakage resilient SM2 signature scheme

被引:0
|
作者
Ding Yujie [1 ]
Zhang Yingnan [1 ]
Zhou Tanping [1 ]
机构
[1] Engn Univ PAP, Coll Cryptog Engn, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Digital Signature; SM2; Continual Leakage Resilient; Side-channels; SECURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital signature is a very important primitive in the area of public key cryptography. It guarantees the integrity and irreversibility of the electronic data. Such as the national cryptography SM2 digital signature scheme, which is denoted as SM2 concisely. As everyone knows, there are so many domestic organizations apply SM2 to guarantee the irreversibility and integrity of electronic data, such as Tencent, Ali and the variety of commercial banks. However since the emerging of side channel attacks which could steal the inner secret information of SM2 during its execution by analyzing running-time, electromagnetic radiation, power consumption, fault detection and many more, the traditional SM2 is no longer secure. For example, once the adversary obtain the secret information such as the secret key used to sign electronic data it can forge any data's signature. This means that the adversary could steal money and privacy of organizations by forge the corresponding signatures. This is a fatal disease. In this paper we give a continual leakage resilient version of SM2, which aims at achieving that although a part of secret key is continual leaked by side-channel attacks, the adversary couldn't forge signatures. And then we prove our scheme in the generic bilinear model. Finally, we implement our scheme and test the efficiency which demonstrates the validity and practicability of our scheme.
引用
收藏
页码:931 / 936
页数:6
相关论文
共 50 条
  • [41] Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model
    Guo, Yuyan
    Li, Jiguo
    Jiang, Mingming
    Yu, Lei
    Wei, Shimin
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [42] Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Xie, Jia-Yi
    Hung, Ying-Hao
    IEEE ACCESS, 2022, 10 : 104636 - 104648
  • [43] Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE ACCESS, 2018, 6 : 17130 - 17142
  • [44] Leakage-resilient group signature: Definitions and constructions
    Huang, Jianye
    Huang, Qiong
    Susilo, Willy
    INFORMATION SCIENCES, 2020, 509 : 119 - 132
  • [45] 门限SM2签名方案
    唐张颖
    王志伟
    南京邮电大学学报(自然科学版), 2022, 42 (04) : 85 - 95
  • [46] Leakage-resilient group signature: Definitions and constructions
    Huang, Jianye
    Huang, Qiong
    Susilo, Willy
    Information Sciences, 2020, 509 : 119 - 132
  • [47] Leakage-resilient Certificateless Signcryption Scheme
    Yang, Qiliang
    Thou, Yanwei
    Yu, Yong
    2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
  • [48] Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
    Yang, Ang
    Nam, Junghyun
    Kim, Moonseong
    Choo, Kim-Kwang Raymond
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [49] Theory and Practice of a Leakage Resilient Masking Scheme
    Balasch, Josep
    Faust, Sebastian
    Gierlichs, Benedikt
    Verbauwhede, Ingrid
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012, 2012, 7658 : 758 - 775
  • [50] Is RCB a Leakage Resilient Authenticated Encryption Scheme?
    Abed, Farzaneh
    Berti, Francesco
    Lucks, Stefan
    SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 39 - 52