Due to the imperfect implementation of cryptosystems, adversaries are able to obtain secret state of the systems via side-channel attacks which are not considered in the traditional security notions of cryptographic primitives, and thus break their security. Leakage-resilient cryptography was proposed to prevent adversaries from doing so. Katz et al. and Boyle et al. proposed signature schemes which are existentially unforgeable in the bounded leakage model. However, neither takes measures to prevent the adversary from forging on messages that have been signed before. Recently, Wang et al. showed that any signature scheme can be transformed to one that is strongly unforgeable in the leakage environment with the help of a leakage-resilient chameleon hash function. However, their transformation requires changing the key pair of the signature scheme. In this work, we further improve Wang et al.’s results by proposing a black-box construction of signature schemes, which converts a leakageresilient signature scheme to one that is both strongly unforgeable and leakage resilient. Our construction does not require adding any element to the signature key pair nor modify the signature scheme at all. It is efficient in the sense that the resulting signature scheme has almost the same computational cost in signing and verification as the underlying scheme.
CITATION STYLE
Huang, J., Huang, Q., & Pan, C. (2016). A black-box construction of strongly unforgeable signature schemes in the bounded leakage model. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10005 LNCS, pp. 320–339). Springer Verlag. https://doi.org/10.1007/978-3-319-47422-9_19
Mendeley helps you to discover research relevant for your work.