Signature Schemes Secure Against Hard-to-Invert Leakage

被引:0
|
作者
Sebastian Faust
Carmit Hazay
Jesper Buus Nielsen
Peter Sebastian Nordholt
Angela Zottarel
机构
[1] EPFL,Faculty of Engineering
[2] Bar-Ilan University,Department of Computer Science
[3] Aarhus University,undefined
[4] Alexandra Institute,undefined
来源
Journal of Cryptology | 2016年 / 29卷
关键词
Signature Scheme; Auxiliary Input Model; Random Message; Secret Key; Public Key;
D O I
暂无
中图分类号
学科分类号
摘要
Side-channel attacks allow the adversary to gain partial knowledge of the secret key when cryptographic protocols are implemented in real-world hardware. The goal of leakage resilient cryptography is to design cryptosystems that withstand such attacks. In the auxiliary input model, an adversary is allowed to see a computationally hard-to-invert function of the secret key. The auxiliary input model weakens the bounded leakage assumption commonly made in leakage resilient cryptography as the hard-to-invert function may information-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given any exponentially hard-to-invert function of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard-to-invert function (where both the challenge as well as the signatures seen prior to that are computed on random messages). Here, polynomial hardness is required even when given the entire public key. We further show that such signature schemes readily give us auxiliary input secure identification schemes.
引用
收藏
页码:422 / 455
页数:33
相关论文
共 50 条
  • [31] Some Aggregate Forward-Secure Signature Schemes
    Sunitha, N. R.
    Amberker, B. B.
    [J]. 2008 IEEE REGION 10 CONFERENCE: TENCON 2008, VOLS 1-4, 2008, : 1154 - +
  • [32] Forward-secure multisignature and blind signature schemes
    Chow, SSM
    Hui, LCK
    Yiu, SM
    Chow, KP
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (02) : 895 - 908
  • [33] Secure proxy signature schemes from the Weil pairing
    Chen, Bing-Chang
    Yeh, Her-Tyan
    [J]. JOURNAL OF SUPERCOMPUTING, 2013, 65 (02): : 496 - 506
  • [34] Tighter Reductions for Forward-Secure Signature Schemes
    Abdalla, Michel
    Ben Hamouda, Fabrice
    Pointcheval, David
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 292 - 311
  • [35] Secure Proxy Signature Schemes for Delegation of Signing Rights
    Boldyreva, Alexandra
    Palacio, Adriana
    Warinschi, Bogdan
    [J]. JOURNAL OF CRYPTOLOGY, 2012, 25 (01) : 57 - 115
  • [36] Generic constructions for secure and efficient confirmer signature schemes
    Michels, M
    Stadler, N
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 406 - 421
  • [37] Secure Proxy Signature Schemes for Delegation of Signing Rights
    Alexandra Boldyreva
    Adriana Palacio
    Bogdan Warinschi
    [J]. Journal of Cryptology, 2012, 25 : 57 - 115
  • [38] Design Principles of Secure Certificateless Signature and Aggregate Signature Schemes for IoT Environments
    Shim, Kyung-Ah
    [J]. IEEE ACCESS, 2022, 10 : 124848 - 124857
  • [39] Signature schemes based on two hard problems simultaneously
    Wang, CT
    Lin, CH
    Chang, CC
    [J]. AINA 2003: 17TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2003, : 557 - 560
  • [40] On the security of two signature schemes for secure communication in IoT environments
    Feihong Xu
    Hui Zeng
    [J]. Multimedia Tools and Applications, 2024, 83 : 43673 - 43683