Signature Schemes Secure Against Hard-to-Invert Leakage

被引:0
|
作者
Sebastian Faust
Carmit Hazay
Jesper Buus Nielsen
Peter Sebastian Nordholt
Angela Zottarel
机构
[1] EPFL,Faculty of Engineering
[2] Bar-Ilan University,Department of Computer Science
[3] Aarhus University,undefined
[4] Alexandra Institute,undefined
来源
Journal of Cryptology | 2016年 / 29卷
关键词
Signature Scheme; Auxiliary Input Model; Random Message; Secret Key; Public Key;
D O I
暂无
中图分类号
学科分类号
摘要
Side-channel attacks allow the adversary to gain partial knowledge of the secret key when cryptographic protocols are implemented in real-world hardware. The goal of leakage resilient cryptography is to design cryptosystems that withstand such attacks. In the auxiliary input model, an adversary is allowed to see a computationally hard-to-invert function of the secret key. The auxiliary input model weakens the bounded leakage assumption commonly made in leakage resilient cryptography as the hard-to-invert function may information-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given any exponentially hard-to-invert function of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard-to-invert function (where both the challenge as well as the signatures seen prior to that are computed on random messages). Here, polynomial hardness is required even when given the entire public key. We further show that such signature schemes readily give us auxiliary input secure identification schemes.
引用
收藏
页码:422 / 455
页数:33
相关论文
共 50 条
  • [1] Signature Schemes Secure Against Hard-to-Invert Leakage
    Faust, Sebastian
    Hazay, Carmit
    Nielsen, Jesper Buus
    Zottarel, Angela
    Nordholt, Peter Sebastian
    [J]. JOURNAL OF CRYPTOLOGY, 2016, 29 (02) : 422 - 455
  • [2] Signature Schemes Secure against Hard-to-Invert Leakage
    Faust, Sebastian
    Hazay, Carmit
    Nielsen, Jesper Buus
    Nordholt, Peter Sebastian
    Zottarel, Angela
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012, 2012, 7658 : 98 - 115
  • [3] Functional Encryption Resilient to Hard-to-Invert Leakage
    Zhang, Mingwu
    Wang, Chunzhi
    Takagi, Tsuyoshi
    Mu, Yi
    [J]. COMPUTER JOURNAL, 2015, 58 (04): : 735 - 749
  • [4] Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions
    Ishizaka, Masahito
    Matsuura, Kanta
    [J]. INFORMATION SECURITY (ISC 2018), 2018, 11060 : 422 - 441
  • [5] On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages
    De Santis, Fabrizio
    Rass, Stefan
    [J]. PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014, 2015, 8895 : 127 - 145
  • [6] Continuous hard-to-invert functions and biometric authentication
    Grigoriev, Dima
    Nikolenko, Sergey
    [J]. GROUPS COMPLEXITY CRYPTOLOGY, 2012, 4 (01) : 19 - 32
  • [7] Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication
    Catalano, Dario
    Pointcheval, David
    Pornin, Thomas
    [J]. JOURNAL OF CRYPTOLOGY, 2007, 20 (01) : 115 - 149
  • [8] Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
    Dario Catalano
    David Pointcheval
    Thomas Pornin
    [J]. Journal of Cryptology, 2007, 20 : 115 - 149
  • [9] Confirmer signature schemes secure against adaptive adversaries
    Camenisch, J
    Michels, M
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 243 - 258
  • [10] Attacks against Two Provably Secure Certificateless Signature Schemes
    Hu Guozheng
    Hong Fan
    [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 246 - +