File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-642-31448-3_22
- Scopus: eid_2-s2.0-84864815981
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Fully leakage-resilient signatures with auxiliary inputs
Title | Fully leakage-resilient signatures with auxiliary inputs |
---|---|
Authors | |
Keywords | Auxiliary inputs Generic construction Side channel attack Signing key Artificial intelligence Security of data |
Issue Date | 2012 |
Publisher | Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ |
Citation | The 17th Australasian Conference on Information Security and Privacy (ACISP 2012), Wollongong, NSW, Australia, 9-11 July 2012. In Lecture Notes in Computer Science, 2012, v. 7372, p. 294-307 How to Cite? |
Abstract | The auxiliary input model for leakage-resilient encryption considers the leakage of a computationally hard-to-invert function, which can capture a wide class of possible side channel attacks. To avoid the trivial attack that the leakage function simply outputs the forged signature, we propose a new selective auxiliary input model for signatures. This model captures side channel attacks that are based on the physical implementation of the cryptosystem regardless of the underlying public parameters chosen. We provide the first generic construction of fully leakage-resilient signatures, allowing polynomial leakage of the signing key and all intermediate randomness used, under this selective auxiliary input model. We then demonstrate an efficient instantiation of it, thus solving an open problem mentioned by Boyle et al. (Eurocrypt 2011). © 2012 Springer-Verlag. |
Description | LNCS v. 7372 has title: Information security and privacy : 17th Australasian Conference, ACISP 2012 ... proceedings |
Persistent Identifier | http://hdl.handle.net/10722/160102 |
ISBN | |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yuen, TH | en_US |
dc.contributor.author | Yiu, SM | en_US |
dc.contributor.author | Hui, LCK | en_US |
dc.date.accessioned | 2012-08-16T06:03:11Z | - |
dc.date.available | 2012-08-16T06:03:11Z | - |
dc.date.issued | 2012 | en_US |
dc.identifier.citation | The 17th Australasian Conference on Information Security and Privacy (ACISP 2012), Wollongong, NSW, Australia, 9-11 July 2012. In Lecture Notes in Computer Science, 2012, v. 7372, p. 294-307 | en_US |
dc.identifier.isbn | 978-3-642-31447-6 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10722/160102 | - |
dc.description | LNCS v. 7372 has title: Information security and privacy : 17th Australasian Conference, ACISP 2012 ... proceedings | - |
dc.description.abstract | The auxiliary input model for leakage-resilient encryption considers the leakage of a computationally hard-to-invert function, which can capture a wide class of possible side channel attacks. To avoid the trivial attack that the leakage function simply outputs the forged signature, we propose a new selective auxiliary input model for signatures. This model captures side channel attacks that are based on the physical implementation of the cryptosystem regardless of the underlying public parameters chosen. We provide the first generic construction of fully leakage-resilient signatures, allowing polynomial leakage of the signing key and all intermediate randomness used, under this selective auxiliary input model. We then demonstrate an efficient instantiation of it, thus solving an open problem mentioned by Boyle et al. (Eurocrypt 2011). © 2012 Springer-Verlag. | - |
dc.language | eng | en_US |
dc.publisher | Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ | en_US |
dc.relation.ispartof | Lecture Notes in Computer Science | en_US |
dc.rights | The original publication is available at www.springerlink.com | en_US |
dc.subject | Auxiliary inputs | - |
dc.subject | Generic construction | - |
dc.subject | Side channel attack | - |
dc.subject | Signing key | - |
dc.subject | Artificial intelligence | - |
dc.subject | Security of data | - |
dc.title | Fully leakage-resilient signatures with auxiliary inputs | en_US |
dc.type | Conference_Paper | en_US |
dc.identifier.email | Yuen, TH: johnyuen@hku.hk | en_US |
dc.identifier.email | Yiu, SM: smyiu@cs.hku.hk | en_US |
dc.identifier.email | Hui, LCK: hui@cs.hku.hk | en_US |
dc.identifier.authority | Yiu, SM=rp00207 | en_US |
dc.identifier.authority | Hui, LCK=rp00120 | en_US |
dc.identifier.doi | 10.1007/978-3-642-31448-3_22 | - |
dc.identifier.scopus | eid_2-s2.0-84864815981 | - |
dc.identifier.hkuros | 205209 | en_US |
dc.identifier.volume | 7372 | en_US |
dc.identifier.spage | 294 | en_US |
dc.identifier.epage | 307 | en_US |
dc.publisher.place | Germany | - |
dc.customcontrol.immutable | sml 130409 | - |
dc.identifier.issnl | 0302-9743 | - |