Skip to main content

2018 | OriginalPaper | Buchkapitel

How to Strengthen the Security of Signature Schemes in the Leakage Models: A Survey

verfasst von : Yuyu Wang, Keisuke Tanaka

Erschienen in: Mathematical Modelling for Next-Generation Cryptography

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We give a survey on generic transformations that strengthen the security of signature schemes, which are exploited in most cryptographic protocols, in the leakage models. In ProvSec 2014, Wang and Tanaka proposed a transformation which converts weakly existentially unforgeable signature schemes into strongly existentially unforgeable ones in the bounded leakage model. To obtain the construction, they combined a leakage resilient chameleon hash function with the Generalized Boneh–Shen–Waters (GBSW) transformation proposed by Steinfeld, Pieprzyk, and Wang. In ACISP 2015, Wang and Tanaka proposed another transformation in the continual leakage model. To achieve the goal, they defined a continuous leakage resilient (CLR) chameleon hash function and constructed it based on the CLR signature scheme proposed by Malkin, Teranishi, Vahlis, and Yung. Then they improved the GBSW transformation by making use of the Groth–Sahai proof system and then combine it with CLR chameleon hash functions. In Security and Communication Networks, Wang and Tanaka additionally gave an instantiation of (restricted) fully leakage resilient strong one-time signature based on leakage resilient chameleon hash functions, following the construction of strong one-time signature by Mohassel. They also proved that by combining a (restricted) fully leakage resilient strong one-time signature scheme with the transformation proposed by Huang, Wong, and Zhao, another transformation that can strengthen the security of fully leakage resilient signature schemes without changing signing keys can be obtained.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat A. Akavia, S. Goldwasser, V. Vaikuntanathan, Simultaneous hardcore bits and cryptography against memory attacks, in Theory of Cryptography, ed. by O. Reingold. Lecture Notes in Computer Science, vol. 5444 (Springer, Berlin, 2009), pp. 474–495 A. Akavia, S. Goldwasser, V. Vaikuntanathan, Simultaneous hardcore bits and cryptography against memory attacks, in Theory of Cryptography, ed. by O. Reingold. Lecture Notes in Computer Science, vol. 5444 (Springer, Berlin, 2009), pp. 474–495
2.
Zurück zum Zitat J. Alwen, Y. Dodis, D. Wichs, Leakage-resilient public-key cryptography in the bounded-retrieval model, in Advances in Cryptology CRYPTO 2009, ed. by S. Halevi. Lecture Notes in Computer Science, vol. 5677 (Springer, Berlin, 2009), pp. 36–54 J. Alwen, Y. Dodis, D. Wichs, Leakage-resilient public-key cryptography in the bounded-retrieval model, in Advances in Cryptology CRYPTO 2009, ed. by S. Halevi. Lecture Notes in Computer Science, vol. 5677 (Springer, Berlin, 2009), pp. 36–54
3.
Zurück zum Zitat J. Alwen, Y. Dodis, M. Naor, G. Segev, S. Walfish, D. Wichs, Public-key encryption in the bounded-retrieval model, in Advances in Cryptology EUROCRYPT 2010, ed. by H. Gilbert. Lecture Notes in Computer Science, vol. 6110 (Springer, Berlin, 2010), pp. 113–134 J. Alwen, Y. Dodis, M. Naor, G. Segev, S. Walfish, D. Wichs, Public-key encryption in the bounded-retrieval model, in Advances in Cryptology EUROCRYPT 2010, ed. by H. Gilbert. Lecture Notes in Computer Science, vol. 6110 (Springer, Berlin, 2010), pp. 113–134
4.
Zurück zum Zitat M. Bellare, S. Shoup, Two-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles, in Public Key Cryptography PKC 2007, ed. by T. Okamoto, X. Wang. Lecture Notes in Computer Science, vol. 4450 (Springer, Berlin, 2007), pp. 201–216 M. Bellare, S. Shoup, Two-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles, in Public Key Cryptography PKC 2007, ed. by T. Okamoto, X. Wang. Lecture Notes in Computer Science, vol. 4450 (Springer, Berlin, 2007), pp. 201–216
5.
Zurück zum Zitat D. Boneh, E. Shen, B. Waters, Strongly unforgeable signatures based on computational Diffie-Hellman, in Public Key Cryptography PKC 2006, ed. by M. Yung, Y. Dodis, A. Kiayias, T. Malkin. Lecture Notes in Computer Science, vol. 3958 (Springer, Berlin, 2006), pp. 229–240 D. Boneh, E. Shen, B. Waters, Strongly unforgeable signatures based on computational Diffie-Hellman, in Public Key Cryptography PKC 2006, ed. by M. Yung, Y. Dodis, A. Kiayias, T. Malkin. Lecture Notes in Computer Science, vol. 3958 (Springer, Berlin, 2006), pp. 229–240
6.
Zurück zum Zitat E. Boyle, G. Segev, D. Wichs, Fully leakage-resilient signatures, in Advances in Cryptology EUROCRYPT 2011, ed. by K.G. Paterson. Lecture Notes in Computer Science, vol. 6632 (Springer, Berlin, 2011), pp. 89–108 E. Boyle, G. Segev, D. Wichs, Fully leakage-resilient signatures, in Advances in Cryptology EUROCRYPT 2011, ed. by K.G. Paterson. Lecture Notes in Computer Science, vol. 6632 (Springer, Berlin, 2011), pp. 89–108
7.
Zurück zum Zitat Z. Brakerski, S. Goldwasser, Circular and leakage resilient public-key encryption under subgroup indistinguishability, in Advances in Cryptology CRYPTO 2010, ed. by T. Rabin. Lecture Notes in Computer Science, vol. 6223 (Springer, Berlin, 2010), pp. 1–20 Z. Brakerski, S. Goldwasser, Circular and leakage resilient public-key encryption under subgroup indistinguishability, in Advances in Cryptology CRYPTO 2010, ed. by T. Rabin. Lecture Notes in Computer Science, vol. 6223 (Springer, Berlin, 2010), pp. 1–20
8.
Zurück zum Zitat Z. Brakerski, Y. Kalai, J. Katz, V. Vaikuntanathan, Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage, in 2010 51st Annual IEEE Symposium on Foundations of Computer Science (FOCS) (2010), pp. 501–510 Z. Brakerski, Y. Kalai, J. Katz, V. Vaikuntanathan, Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage, in 2010 51st Annual IEEE Symposium on Foundations of Computer Science (FOCS) (2010), pp. 501–510
9.
Zurück zum Zitat Y. Dodis, K. Haralambiev, A. López-Alt, D. Wichs, Cryptography against continuous memory attacks, in Proceedings of the 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, FOCS’10, Washington, DC, USA (IEEE Computer Society, 2010), pp. 511–520 Y. Dodis, K. Haralambiev, A. López-Alt, D. Wichs, Cryptography against continuous memory attacks, in Proceedings of the 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, FOCS’10, Washington, DC, USA (IEEE Computer Society, 2010), pp. 511–520
10.
Zurück zum Zitat Y. Dodis, K. Haralambiev, A. López-Alt, D. Wichs, Efficient public-key cryptography in the presence of key leakage, in Advances in Cryptology ASIACRYPT 2010, ed. by M. Abe. Lecture Notes in Computer Science, vol. 6477 (Springer, Berlin, 2010), pp. 613–631 Y. Dodis, K. Haralambiev, A. López-Alt, D. Wichs, Efficient public-key cryptography in the presence of key leakage, in Advances in Cryptology ASIACRYPT 2010, ed. by M. Abe. Lecture Notes in Computer Science, vol. 6477 (Springer, Berlin, 2010), pp. 613–631
11.
Zurück zum Zitat Y. Dodis, A. Lewko, B. Waters, D. Wichs, Storing secrets on continually leaky devices, in 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science (FOCS) (2011), pp. 688–697 Y. Dodis, A. Lewko, B. Waters, D. Wichs, Storing secrets on continually leaky devices, in 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science (FOCS) (2011), pp. 688–697
12.
Zurück zum Zitat S. Garg, A. Jain, A. Sahai, Leakage-resilient zero knowledge, in Advances in Cryptology CRYPTO 2011, ed. by P. Rogaway. Lecture Notes in Computer Science, vol. 6841 (Springer, Berlin, 2011), pp. 297–315 S. Garg, A. Jain, A. Sahai, Leakage-resilient zero knowledge, in Advances in Cryptology CRYPTO 2011, ed. by P. Rogaway. Lecture Notes in Computer Science, vol. 6841 (Springer, Berlin, 2011), pp. 297–315
13.
14.
Zurück zum Zitat Q. Huang, D.S. Wong, Y. Zhao, Generic transformation to strongly unforgeable signatures, in Applied Cryptography and Network Security ACNS 2007, ed. by J. Katz, M. Yung. Lecture Notes in Computer Science, vol. 4521 (Springer, Berlin, 2007), pp. 1–17 Q. Huang, D.S. Wong, Y. Zhao, Generic transformation to strongly unforgeable signatures, in Applied Cryptography and Network Security ACNS 2007, ed. by J. Katz, M. Yung. Lecture Notes in Computer Science, vol. 4521 (Springer, Berlin, 2007), pp. 1–17
15.
Zurück zum Zitat J. Katz, V. Vaikuntanathan, Signature schemes with bounded leakage resilience, in Advances in Cryptology ASIACRYPT 2009, ed. by M. Matsui. Lecture Notes in Computer Science, vol. 5912 (Springer, Berlin, 2009), pp. 703–720 J. Katz, V. Vaikuntanathan, Signature schemes with bounded leakage resilience, in Advances in Cryptology ASIACRYPT 2009, ed. by M. Matsui. Lecture Notes in Computer Science, vol. 5912 (Springer, Berlin, 2009), pp. 703–720
16.
Zurück zum Zitat H. Krawczyk, T. Rabin, Chameleon signatures, in NDSS (The Internet Society, 2000) H. Krawczyk, T. Rabin, Chameleon signatures, in NDSS (The Internet Society, 2000)
17.
Zurück zum Zitat A. Lewko, M. Lewko, B. Waters, How to leak on key updates, in Proceedings of the Forty-Third Annual ACM Symposium on Theory of Computing, STOC’11, New York, NY, USA (ACM, 2011), pp. 725–734 A. Lewko, M. Lewko, B. Waters, How to leak on key updates, in Proceedings of the Forty-Third Annual ACM Symposium on Theory of Computing, STOC’11, New York, NY, USA (ACM, 2011), pp. 725–734
18.
Zurück zum Zitat V. Lyubashevsky, A. Palacio, G. Segev, Public-key cryptographic primitives provably as secure as subset sum, in Theory of Cryptography, ed. by D. Micciancio. Lecture Notes in Computer Science, vol. 5978 (Springer, Berlin, 2010), pp. 382–400 V. Lyubashevsky, A. Palacio, G. Segev, Public-key cryptographic primitives provably as secure as subset sum, in Theory of Cryptography, ed. by D. Micciancio. Lecture Notes in Computer Science, vol. 5978 (Springer, Berlin, 2010), pp. 382–400
19.
Zurück zum Zitat T. Malkin, I. Teranishi, Y. Vahlis, M. Yung, Signatures resilient to continual leakage on memory and computation, in Theory of Cryptography, ed. by Y. Ishai. Lecture Notes in Computer Science, vol. 6597 (Springer, Berlin, 2011), pp. 89–106 T. Malkin, I. Teranishi, Y. Vahlis, M. Yung, Signatures resilient to continual leakage on memory and computation, in Theory of Cryptography, ed. by Y. Ishai. Lecture Notes in Computer Science, vol. 6597 (Springer, Berlin, 2011), pp. 89–106
20.
Zurück zum Zitat P. Mohassel, One-time signatures and chameleon hash functions, in Selected Areas in Cryptography, ed. by A. Biryukov, G. Gong, D. Stinson. Lecture Notes in Computer Science, vol. 6544 (Springer, Berlin, 2011), pp. 302–319 P. Mohassel, One-time signatures and chameleon hash functions, in Selected Areas in Cryptography, ed. by A. Biryukov, G. Gong, D. Stinson. Lecture Notes in Computer Science, vol. 6544 (Springer, Berlin, 2011), pp. 302–319
21.
Zurück zum Zitat M. Naor, G. Segev, Public-key cryptosystems resilient to key leakage, in Advances in Cryptology CRYPTO 2009, ed. by S. Halevi. Lecture Notes in Computer Science, vol. 5677 (Springer, Berlin, 2009), pp. 18–35 M. Naor, G. Segev, Public-key cryptosystems resilient to key leakage, in Advances in Cryptology CRYPTO 2009, ed. by S. Halevi. Lecture Notes in Computer Science, vol. 5677 (Springer, Berlin, 2009), pp. 18–35
22.
Zurück zum Zitat T. Okamoto, Provably secure and practical identification schemes and corresponding signature schemes, in Advances in Cryptology CRYPTO’92, ed. by E. Brickell. Lecture Notes in Computer Science, vol. 740 (Springer, Berlin, 1993), pp. 31–53 T. Okamoto, Provably secure and practical identification schemes and corresponding signature schemes, in Advances in Cryptology CRYPTO’92, ed. by E. Brickell. Lecture Notes in Computer Science, vol. 740 (Springer, Berlin, 1993), pp. 31–53
23.
Zurück zum Zitat A. Shamir, Y. Tauman, Improved online/offline signature schemes, in Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, CRYPTO’01, London, UK (Springer, 2001), pp. 355–367 A. Shamir, Y. Tauman, Improved online/offline signature schemes, in Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, CRYPTO’01, London, UK (Springer, 2001), pp. 355–367
24.
Zurück zum Zitat R. Steinfeld, J. Pieprzyk, H. Wang, How to strengthen any weakly unforgeable signature into a strongly unforgeable signature, in Topics in Cryptology CT-RSA 2007, ed. by M. Abe. Lecture Notes in Computer Science, vol. 4377 (Springer, Berlin, 2006), pp. 357–371 R. Steinfeld, J. Pieprzyk, H. Wang, How to strengthen any weakly unforgeable signature into a strongly unforgeable signature, in Topics in Cryptology CT-RSA 2007, ed. by M. Abe. Lecture Notes in Computer Science, vol. 4377 (Springer, Berlin, 2006), pp. 357–371
25.
Zurück zum Zitat I. Teranishi, T. Oyama, W. Ogata, General conversion for obtaining strongly existentially unforgeable signatures, in Progress in Cryptology INDOCRYPT 2006, ed. by R. Barua, T. Lange. Lecture Notes in Computer Science, vol. 4329 (Springer, Berlin, 2006), pp. 191–205 I. Teranishi, T. Oyama, W. Ogata, General conversion for obtaining strongly existentially unforgeable signatures, in Progress in Cryptology INDOCRYPT 2006, ed. by R. Barua, T. Lange. Lecture Notes in Computer Science, vol. 4329 (Springer, Berlin, 2006), pp. 191–205
26.
Zurück zum Zitat Y. Wang, K. Tanaka, Generic transformation to strongly existentially unforgeable signature schemes with leakage resiliency, in Provable Security, ed. by S.S. Chow, J.K. Liu, L.C. Hui, S.M. Yiu. Lecture Notes in Computer Science, vol. 8782 (Springer International Publishing, New York, 2014), pp. 117–129 Y. Wang, K. Tanaka, Generic transformation to strongly existentially unforgeable signature schemes with leakage resiliency, in Provable Security, ed. by S.S. Chow, J.K. Liu, L.C. Hui, S.M. Yiu. Lecture Notes in Computer Science, vol. 8782 (Springer International Publishing, New York, 2014), pp. 117–129
27.
Zurück zum Zitat Y. Wang, K. Tanaka, Strongly simulation-extractable leakage-resilient NIZK, in Information Security and Privacy, ed. by W. Susilo, Y. Mu. Lecture Notes in Computer Science, vol. 8544 (Springer International Publishing, New York, 2014), pp. 66–81 Y. Wang, K. Tanaka, Strongly simulation-extractable leakage-resilient NIZK, in Information Security and Privacy, ed. by W. Susilo, Y. Mu. Lecture Notes in Computer Science, vol. 8544 (Springer International Publishing, New York, 2014), pp. 66–81
28.
Zurück zum Zitat Y. Wang, K. Tanaka, Generic transformation to strongly existentially unforgeable signature schemes with continuous leakage resiliency, in Information Security and Privacy, ed. by E. Foo, D. Stebila. Lecture Notes in Computer Science, vol. 9144 (Springer International Publishing, New York, 2015), pp. 213–229 Y. Wang, K. Tanaka, Generic transformation to strongly existentially unforgeable signature schemes with continuous leakage resiliency, in Information Security and Privacy, ed. by E. Foo, D. Stebila. Lecture Notes in Computer Science, vol. 9144 (Springer International Publishing, New York, 2015), pp. 213–229
29.
Zurück zum Zitat Y. Wang, K. Tanaka, Generic transformations for existentially unforgeable signature schemes in the bounded leakage model. Secur. Commun. Netw. 9(12), 1829–1842 (2016)CrossRef Y. Wang, K. Tanaka, Generic transformations for existentially unforgeable signature schemes in the bounded leakage model. Secur. Commun. Netw. 9(12), 1829–1842 (2016)CrossRef
Metadaten
Titel
How to Strengthen the Security of Signature Schemes in the Leakage Models: A Survey
verfasst von
Yuyu Wang
Keisuke Tanaka
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-5065-7_17

Premium Partner