Paper 2012/045

Signature Schemes Secure against Hard-to-Invert Leakage

Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, and Angela Zottarel

Abstract

Side-channel attacks allow the adversary to gain partial knowledge of the secret key when cryptographic protocols are implemented in real-world hardware. The goal of leakage resilient cryptography is to design crytosystems that withstand such attacks. In the auxiliary input model an adversary is allowed to see a computationally hard-to-invert function of the secret key. The auxiliary input model weakens the bounded leakage assumption commonly made in leakage resilient cryptography as the hard-to-invert function may information-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given any exponentially hard-to-invert function of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard-to-invert function (where both the challenge as well as the signatures seen prior to that are computed on random messages). Here, polynomial-hardness is required even when given the entire public-key. We further show that such signature schemes readily give us auxiliary input secure identification schemes.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Unknown status
Keywords
leakageauxiliary inputsignature
Contact author(s)
carmit hazay @ biu ac il
History
2015-01-28: last of 4 revisions
2012-02-01: received
See all versions
Short URL
https://ia.cr/2012/045
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/045,
      author = {Sebastian Faust and Carmit Hazay and Jesper Buus Nielsen and Peter Sebastian Nordholt and Angela Zottarel},
      title = {Signature Schemes Secure against Hard-to-Invert Leakage},
      howpublished = {Cryptology ePrint Archive, Paper 2012/045},
      year = {2012},
      note = {\url{https://eprint.iacr.org/2012/045}},
      url = {https://eprint.iacr.org/2012/045}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.