首页> 外文会议>IMA conference on cryptography and coding >A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme
【24h】

A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme

机译:基于泄漏弹性配对的Schnorr签名方案

获取原文

摘要

Leakage-resilient cryptography aims at capturing side-channel attacks within the provable security framework. Currently there exists a plethora of schemes with provably secure guarantees against a variety of side-channel attacks. However, meeting the strongest security levels (resilience against continual leakage attacks) under the weakest assumptions leads currently to costly schemes. Additionally, recent results show the impossibility to achieve the strongest leakage-resilient security levels for cryptosystems whose secret key is uniquely determined by its public key. The above justifies the use of stronger assumptions to achieve simpler, more efficient schemes, since most deployed and practical cryptosystems satisfy the above-mentioned uniqueness of the secret key property. In particular, the Schnorr-based leakage-resilient digital signature schemes proposed up to now are built by gluing together ℓ-copies of the basic signature scheme, resulting in a public key that admits exponentially-many secret keys. Furthermore, the space needed to store the secret key material is proportional to the leakage tolerated by these schemes. We aim at designing a leakage-resilient variant of the Schnorr signature scheme whose secret key's storage space is constant, independently of the amount of leakage that it can tolerate. We assume that at any given time only the parts of the memory in use leak (split-state/only computation leaks information model); we ease the problem of exhibiting a security reduction by relying on generic groups (generic bilinear group model). We proceed by first proposing a pairing analogue of the Schnorr signature scheme, that we next transform to include split signing key updates. We give a leakage-resilience lower bound in generic bilinear groups against continual leakage attacks for the new scheme.
机译:防泄漏加密技术旨在在可证明的安全框架内捕获侧通道攻击。当前,存在许多方案,它们具有针对各种侧信道攻击的可证明的安全保证。但是,在最弱的假设下达到最强的安全级别(抵御连续泄漏攻击的能力)目前导致成本很高的方案。另外,最近的结果表明,对于秘密密钥由其公钥唯一确定的密码系统,不可能实现最强的防泄漏安全级别。以上证明了使用更强的假设来实现更简单,更有效的方案是合理的,因为大多数已部署且实用的密码系统都满足了上述秘密密钥属性的唯一性。尤其是,到目前为止提出的基于Schnorr的防泄漏的数字签名方案是通过将基本签名方案的1/3副本粘合在一起而构建的,从而产生了一个公钥,该公钥可以接纳数量成倍的秘密密钥。此外,存储密钥材料所需的空间与这些方案所容许的泄漏成比例。我们旨在设计一种Schnorr签名方案的防泄漏变体,其秘密密钥的存储空间是恒定的,而与它可以容忍的泄漏量无关。我们假设在任何给定时间,只有部分正在使用的内存泄漏(分裂状态/仅计算泄漏信息模型);我们通过依靠通用组(通用双线性组模型)缓解了降低安全性的问题。我们首先提出Schnorr签名方案的配对类似物,然后将其转换为包含拆分签名密钥更新的形式。对于新方案,我们针对连续泄漏攻击在通用双线性组中给出了泄漏弹性下限。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号