Signature schemes secure against hard-to-invert leakage

Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

28 Scopus citations

Abstract

In the auxiliary input model an adversary is allowed to see a computationally hard-to-invert function of the secret key. The auxiliary input model weakens the bounded leakage assumption commonly made in leakage resilient cryptography as the hard-to-invert function may information-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomialtime hard to invert function. Here, polynomial-hardness is required even when given the entire public-key - so called weak auxiliary input security. We show that such signature schemes readily give us auxiliary input secure identification schemes.

Original languageEnglish
Title of host publicationAdvances in Cryptology, ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
Pages98-115
Number of pages18
DOIs
StatePublished - 2012
Event18th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2012 - Beijing, China
Duration: 2 Dec 20126 Dec 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7658 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference18th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2012
Country/TerritoryChina
CityBeijing
Period2/12/126/12/12

Funding

FundersFunder number
Seventh Framework Programme279447

    Fingerprint

    Dive into the research topics of 'Signature schemes secure against hard-to-invert leakage'. Together they form a unique fingerprint.

    Cite this