2016
DOI: 10.1002/sec.1580
|View full text |Cite
|
Sign up to set email alerts
|

Leakage‐resilient ID‐based signature scheme in the generic bilinear group model

Abstract: Security mechanisms in the traditional cryptography have been modeled under the assumption that secret values (keys) are completely hidden to an adversary. Indeed, a number of side‐channel attacks (e.g., timing, power, fault, etc.) have been demonstrated to obtain partial information about secret keys. Leakage‐resilient cryptography is a countermeasure to withstand side‐channel attacks. Recently, a large number of leakage‐resilient cryptographic schemes or protocols have been proposed to resist various side‐ch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 20 publications
(19 citation statements)
references
References 37 publications
0
19
0
Order By: Relevance
“…Subsequently, Yuen et al (2012) presented an improvement on Brakerski et al's scheme in terms of computational costs. under the continual leakage model, Wu et al (2016) proposed the first leakage-resilient ID-based signature (LR-IBS) scheme.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Subsequently, Yuen et al (2012) presented an improvement on Brakerski et al's scheme in terms of computational costs. under the continual leakage model, Wu et al (2016) proposed the first leakage-resilient ID-based signature (LR-IBS) scheme.…”
Section: Related Workmentioning
confidence: 99%
“…To achieve overall unbounded leakage property (Galindo and Virek, 2013;Wu et al, 2016Wu et al, , 2018Wu et al, , 2019, a private/secret key must be split into two components. Additionally, each private/secret key participated in the associated algorithm is also refreshed before/after each algorithm invocation.…”
Section: Frameworkmentioning
confidence: 99%
“…In our scheme, adversaries are given the complete leakage abilities to continuously gain partial information of the CA's system secret key, the user's private key and certificate, and random values. The design principle of the proposed LR-CB-KE scheme is to employ the key refreshing technique [17], [22], [36] to update the CA's system secret key, and each user's private key and certificate after each invocation. In the key refreshing technique, the CA partitions the system secret key into two parts and updates the two parts after each certificate generation procedure.…”
Section: B Contribution and Organizationmentioning
confidence: 99%
“…At most 2λ bits of c is helpless to gain the current system secret key SSK for A I . (SSK i−1,1 , SSK i−1,2 ): By the multiplicative blinding technique[17],[22],[36], the CA's system secret key SSK satisfies the equality SSK= SSK i−1,1 • SSK i−1,2 = SSK i,1 • SSK i,2 .Note that the leaked information of both SSK i−1,1 and SSK i−1,2 is independent of that of both SSK i,1 and SSK i,2 . Hence, at most λ bits of SSK i−1,1 and SSK i−1,2 are leaked to A I .…”
mentioning
confidence: 99%
“…ey measured the leakage by the induced decrease of the minimum entropy of the secret (noisy leakage). Under these formulations, some leakage resilient primitives are successfully designed, including signature schemes [3][4][5] and key agreement protocol [6,7].…”
Section: Introductionmentioning
confidence: 99%