Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Journal articles
  4. Signature Schemes Secure Against Hard-to-Invert Leakage
 
research article

Signature Schemes Secure Against Hard-to-Invert Leakage

Faust, Sebastian  
•
Hazay, Carmit
•
Nielsen, Jesper Buus
Show more
2016
Journal Of Cryptology

Side-channel attacks allow the adversary to gain partial knowledge of the secret key when cryptographic protocols are implemented in real-world hardware. The goal of leakage resilient cryptography is to design cryptosystems that withstand such attacks. In the auxiliary input model, an adversary is allowed to see a computationally hard-to-invert function of the secret key. The auxiliary input model weakens the bounded leakage assumption commonly made in leakage resilient cryptography as the hard-to-invert function may information-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given any exponentially hard-to-invert function of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard-to-invert function (where both the challenge as well as the signatures seen prior to that are computed on random messages). Here, polynomial hardness is required even when given the entire public key. We further show that such signature schemes readily give us auxiliary input secure identification schemes.

  • Details
  • Metrics
Type
research article
DOI
10.1007/s00145-015-9197-1
Web of Science ID

WOS:000371077900005

Author(s)
Faust, Sebastian  
Hazay, Carmit
Nielsen, Jesper Buus
Zottarel, Angela
Nordholt, Peter Sebastian
Date Issued

2016

Publisher

Springer

Published in
Journal Of Cryptology
Volume

29

Issue

2

Start page

422

End page

455

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
IINFCOM  
Available on Infoscience
April 1, 2016
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/125234
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés