Leakage-resilient group signature: Definitions and constructions

Information Sciences - Tập 509 - Trang 119-132 - 2020
Jianye Huang1,2, Qiong Huang1, Willy Susilo2
1College of Mathematics and Informatics, South China Agricultural University, Guangzhou 510642, China
2School of Computing and Information Technology, University of Wollongong, Wollongong, NSW 2522, Australia

Tài liệu tham khảo

Akavia, 2009, Simultaneous hardcore bits and cryptography against memory attacks, 474 Alwen, 2009, Leakage-resilient public-key cryptography in the bounded-retrieval model, 36 Ateniese, 2000, A practical and provably secure coalition-resistant group signature scheme, 255 Ateniese, 2000, A practical and provably secure coalition-resistant group signature scheme, 255 Ateniese, 2002, Efficient group signatures without trapdoors, Cryptol. Eprint Arch., 2002, 173 Ateniese, 2002, Quasi-efficient revocation of group signatures, 183 Ateniese, 1999, Group signatures á la carte, 848 Bellare, 2003, Foundations of group signatures: formal definitions, simplified requirements, and a construction based on general assumptions, 614 Bellare, 1999, A forward-secure digital signature scheme, 431 Boneh, 2004, Short group signatures, 41 Boneh, 1997, On the importance of checking cryptographic protocols for faults, 37 Boyle, 2013, Fully leakage-resilient signatures, J. Cryptol., 26, 513, 10.1007/s00145-012-9136-3 Brakerski, 2010, Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage, 501 Bresson, 2001, Efficient revocation in group signatures, 190 Camenisch, 1997, Efficient group signature schemes for large groups, 410 Chaum, 1991, Group signatures, 257 Chen, 1994, New group signature schemes Coron, 1999, Resistance against differential power analysis for elliptic curve cryptosystems, 292 De Santis, 2001, Robust non-interactive zero knowledge, 566 Dodis, 2010, Efficient public-key cryptography in the presence of key leakage, 613 Dziembowski, 2008, Leakage-resilient cryptography, 293 Faust, 2016, Signature schemes secure against hard-to-invert leakage, J. Cryptol., 29, 422, 10.1007/s00145-015-9197-1 Gandolfi, 2001, Electromagnetic analysis: concrete results, 251 Goldwasser, 1988, A digital signature scheme secure against adaptive chosen-message attacks, SIAM J. Comput., 17, 281, 10.1137/0217017 Halderman, 2009, Lest we remember: cold-boot attacks on encryption keys, Commun. ACM, 52, 91, 10.1145/1506409.1506429 Huang, 2018, Black-box constructions of signature schemes in the bounded leakage setting, Inf. Sci., 423, 313, 10.1016/j.ins.2017.09.055 Huang, 2016, A black-box construction of strongly unforgeable signature schemes in the bounded leakage model, 320 Huang, 2017, A black-box construction of strongly unforgeable signature scheme in the leakage setting, Int. J. Found. Comput. Sci., 28, 761, 10.1142/S0129054117400172 Huang, 2018, Leakage-resilient dual-form signatures, Comput. J., 10.1093/comjnl/bxy059 Kalai, 2011, Cryptography with tamperable and leaky memory, 373 Katz, 2009, Signature schemes with bounded leakage resilience, 703 Kiayias, 2003, Extracting group signatures from traitor tracing schemes Kocher, 1999, Differential power analysis, 388 Kocher, 1996, Timing attacks on implementations of Diffie–Hellman, rsa, dss, and other systems, 104 Micali, 2004, Physically observable cryptography, 278 Ono, 2017, On randomness exposure resilience of group signatures, IEICE Trans. Inf. Syst., 100, 2357, 10.1587/transinf.2016INP0015 Quisquater, 2001, Electromagnetic analysis (EMA): measures and counter-measures for smart cards, 200 C. Ramsay, TEMPEST attacks against AES Covertly stealing keys for €200, 2017. Sahai, 1999, Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security, 543 Shamir, 1984, Identity-based cryptosystems and signature schemes, 47 Wang, 2014, A provably secure ring signature scheme with bounded leakage resilience, 388 Wang, 2016, Generic transformations for existentially unforgeable signature schemes in the bounded leakage model, Secur. Commun. Netw., 9, 1829, 10.1002/sec.1436 Yuen, 2012, Fully leakage-resilient signatures with auxiliary inputs, 294