File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Fully leakage-resilient signatures with auxiliary inputs

TitleFully leakage-resilient signatures with auxiliary inputs
Authors
KeywordsAuxiliary inputs
Generic construction
Side channel attack
Signing key
Artificial intelligence
Security of data
Issue Date2012
PublisherSpringer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/
Citation
The 17th Australasian Conference on Information Security and Privacy (ACISP 2012), Wollongong, NSW, Australia, 9-11 July 2012. In Lecture Notes in Computer Science, 2012, v. 7372, p. 294-307 How to Cite?
AbstractThe auxiliary input model for leakage-resilient encryption considers the leakage of a computationally hard-to-invert function, which can capture a wide class of possible side channel attacks. To avoid the trivial attack that the leakage function simply outputs the forged signature, we propose a new selective auxiliary input model for signatures. This model captures side channel attacks that are based on the physical implementation of the cryptosystem regardless of the underlying public parameters chosen. We provide the first generic construction of fully leakage-resilient signatures, allowing polynomial leakage of the signing key and all intermediate randomness used, under this selective auxiliary input model. We then demonstrate an efficient instantiation of it, thus solving an open problem mentioned by Boyle et al. (Eurocrypt 2011). © 2012 Springer-Verlag.
DescriptionLNCS v. 7372 has title: Information security and privacy : 17th Australasian Conference, ACISP 2012 ... proceedings
Persistent Identifierhttp://hdl.handle.net/10722/160102
ISBN
ISSN
2023 SCImago Journal Rankings: 0.606

 

DC FieldValueLanguage
dc.contributor.authorYuen, THen_US
dc.contributor.authorYiu, SMen_US
dc.contributor.authorHui, LCKen_US
dc.date.accessioned2012-08-16T06:03:11Z-
dc.date.available2012-08-16T06:03:11Z-
dc.date.issued2012en_US
dc.identifier.citationThe 17th Australasian Conference on Information Security and Privacy (ACISP 2012), Wollongong, NSW, Australia, 9-11 July 2012. In Lecture Notes in Computer Science, 2012, v. 7372, p. 294-307en_US
dc.identifier.isbn978-3-642-31447-6-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10722/160102-
dc.descriptionLNCS v. 7372 has title: Information security and privacy : 17th Australasian Conference, ACISP 2012 ... proceedings-
dc.description.abstractThe auxiliary input model for leakage-resilient encryption considers the leakage of a computationally hard-to-invert function, which can capture a wide class of possible side channel attacks. To avoid the trivial attack that the leakage function simply outputs the forged signature, we propose a new selective auxiliary input model for signatures. This model captures side channel attacks that are based on the physical implementation of the cryptosystem regardless of the underlying public parameters chosen. We provide the first generic construction of fully leakage-resilient signatures, allowing polynomial leakage of the signing key and all intermediate randomness used, under this selective auxiliary input model. We then demonstrate an efficient instantiation of it, thus solving an open problem mentioned by Boyle et al. (Eurocrypt 2011). © 2012 Springer-Verlag.-
dc.languageengen_US
dc.publisherSpringer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/en_US
dc.relation.ispartofLecture Notes in Computer Scienceen_US
dc.rightsThe original publication is available at www.springerlink.comen_US
dc.subjectAuxiliary inputs-
dc.subjectGeneric construction-
dc.subjectSide channel attack-
dc.subjectSigning key-
dc.subjectArtificial intelligence-
dc.subjectSecurity of data-
dc.titleFully leakage-resilient signatures with auxiliary inputsen_US
dc.typeConference_Paperen_US
dc.identifier.emailYuen, TH: johnyuen@hku.hken_US
dc.identifier.emailYiu, SM: smyiu@cs.hku.hken_US
dc.identifier.emailHui, LCK: hui@cs.hku.hken_US
dc.identifier.authorityYiu, SM=rp00207en_US
dc.identifier.authorityHui, LCK=rp00120en_US
dc.identifier.doi10.1007/978-3-642-31448-3_22-
dc.identifier.scopuseid_2-s2.0-84864815981-
dc.identifier.hkuros205209en_US
dc.identifier.volume7372en_US
dc.identifier.spage294en_US
dc.identifier.epage307en_US
dc.publisher.placeGermany-
dc.customcontrol.immutablesml 130409-
dc.identifier.issnl0302-9743-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats