1. Leakage-resilient ID-based signature scheme in the generic bilinear group model
- Author
-
Jui-Di Wu, Sen-Shan Huang, and Yuh-Min Tseng
- Subjects
Scheme (programming language) ,Hardware_MEMORYSTRUCTURES ,Theoretical computer science ,Computer Networks and Communications ,Computer science ,business.industry ,Cryptography ,0102 computer and information sciences ,02 engineering and technology ,Adversary ,Fault (power engineering) ,Computer security ,computer.software_genre ,01 natural sciences ,Signature (logic) ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Identity (object-oriented programming) ,020201 artificial intelligence & image processing ,Side channel attack ,business ,computer ,Countermeasure (computer) ,Information Systems ,computer.programming_language - Abstract
Security mechanisms in the traditional cryptography have been modeled under the assumption that secret values keys are completely hidden to an adversary. Indeed, a number of side-channel attacks e.g., timing, power, fault, etc. have been demonstrated to obtain partial information about secret keys. Leakage-resilient cryptography is a countermeasure to withstand side-channel attacks. Recently, a large number of leakage-resilient cryptographic schemes or protocols have been proposed to resist various side-channel attacks. Up to now, no work has been done on leakage-resilient identity-based signature LR-IBS. In this article, we propose the first LR-IBS scheme based on Galindo and Vivek's leakage-resilient signature. In the generic bilinear group model, we formally prove that our LR-IBS scheme possesses existential unforgeability against identity and adaptive chosen message attacks under the continual leakage model. Copyright © 2016 John Wiley & Sons, Ltd.
- Published
- 2016
- Full Text
- View/download PDF