Paper 2010/488
Fully Leakage-Resilient Signatures
Elette Boyle, Gil Segev, and Daniel Wichs
Abstract
A signature scheme is {\em fully leakage resilient} (Katz and Vaikuntanathan, ASIACRYPT '09) if it is existentially unforgeable under an adaptive chosen-message attack even in a setting where an adversary may obtain bounded (yet arbitrary) leakage information on {\em all intermediate values that are used throughout the lifetime of the system}. This is a strong and meaningful notion of security that captures a significantly wide range of side-channel attacks.
One of the main challenges in constructing fully leakage-resilient signature schemes is dealing with leakage that may depend on the random bits used by the signing algorithm, and constructions of such schemes are known only in the random-oracle model. Moreover, even in the random-oracle model, known schemes are only resilient to leakage of less than half the length of their signing key.
In this paper we construct the first fully leakage-resilient signature schemes without random oracles. We present a scheme that is resilient to any leakage of length
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. EUROCRYPT '11, Journal of Cryptology.
- Keywords
- digital signaturesleakage resiliencepublic-key cryptography
- Contact author(s)
- eboyle @ mit edu
- History
- 2012-10-08: last of 3 revisions
- 2010-09-15: received
- See all versions
- Short URL
- https://ia.cr/2010/488
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2010/488, author = {Elette Boyle and Gil Segev and Daniel Wichs}, title = {Fully Leakage-Resilient Signatures}, howpublished = {Cryptology {ePrint} Archive, Paper 2010/488}, year = {2010}, url = {https://eprint.iacr.org/2010/488} }