Slides Fully Leakage Resilient Signature
AbstractIn practice, adversaries may be able to acquire a part of private state of cryptographic system via side-channel attacks, on account of unexpected physical defects of cryptosystem, which is a serious threat to traditional cryptosystem that does not consider physical issues. Leakage-resilient cryptography was proposed to prevent adversaries from doing so. Unfortunately, there are few literatures in leakage-resilient signature. In this paper, we extend the framework of Dual-Form Signatures (DFSs) proposed by Gerbush et al. To the leakage setting, which provides a new path towards obtaining proofs under weaker assumptions.
Slides Fully Leakage Resilient Signature Solutions
Applying this framework, we present a DFS scheme based on static assumptions with leakage bound ( n − 1 − 2 c ) log p 2 where n is a positive integer greater than or equal to 2 and c is a fixed positive constant, which can be easily extended to the continual leakage model as well. Combining this result and the framework proposed by Huang et al., we can obtain identity-based signature schemes and certificateless signature schemes sharing the same leakage bound ( n − 1 − 2 c ) log p 2.
Slides Fully Leakage Resilient Signature Chart
We construct the rst fully leakage-resilient signature schemes without random oracles. We rst present a scheme in the bounded-leakage model that is resilient to any leakage of (1 o(1))Lbits, where Lis the bit-length of the signing key. Our scheme is based on generic cryptographic primitives, and is inspired by the.