2015
DOI: 10.1007/978-3-662-47672-7_37
|View full text |Cite
|
Sign up to set email alerts
|

Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation

Abstract: We construct new leakage-resilient signature schemes. Our schemes remain unforgeable against an adversary leaking arbitrary (yet bounded) information on the entire state of the signer (sometimes known as fully leakage resilience), including the random coin tosses of the signing algorithm.The main feature of our constructions is that they offer a graceful degradation of security in situations where standard existential unforgeability is impossible. This property was recently put forward by Nielsen, Venturi, and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
8
1
1

Relationship

7
3

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 52 publications
(81 reference statements)
0
8
0
Order By: Relevance
“…We show how to apply EUF-RMA against SAs to the setting of subversion-resilient identification (ID) schemes. Similar applications already appeared in the literature for leakage and tamper resistance [ADW09, FHN + 12, DFMV13,NVZ14,FNV15].…”
Section: Subversion-resilient Identification Schemesmentioning
confidence: 79%
“…We show how to apply EUF-RMA against SAs to the setting of subversion-resilient identification (ID) schemes. Similar applications already appeared in the literature for leakage and tamper resistance [ADW09, FHN + 12, DFMV13,NVZ14,FNV15].…”
Section: Subversion-resilient Identification Schemesmentioning
confidence: 79%
“…In Section 7 we show that cryptographic primitives which remain secure if the adversary obtains some bounded amount of leakage from the key, can naturally be protected against tampering attacks using our new notion of leaky non-malleability. Since there is a large body of work on bounded leakage-resilient cryptographic primitives, including signature schemes, symmetric and public key encryption [32,16,34,38,39,22,23], and many more, our transformation protects these primitives against any efficient space-bounded tampering attack.…”
Section: Our Contributionmentioning
confidence: 99%
“…An abridged version of this paper appeared as [34], which only contains a high-level description of the signature scheme with security against noisy leakage in the nonerasure model (i.e., the scheme SS 3 from this paper). This work is the full extended version of that paper, containing new material (i.e., the schemes SS 1 , SS 2 , and SS 4 ) and significantly revised proofs.…”
Section: Conference Versionmentioning
confidence: 99%