• DocumentCode
    3512656
  • Title

    Leakage-Resilient Proxy Signatures

  • Author

    Fei Tang ; Hongda Li ; Qihua Niu ; Bei Liang

  • Author_Institution
    State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
  • fYear
    2013
  • fDate
    9-11 Sept. 2013
  • Firstpage
    495
  • Lastpage
    502
  • Abstract
    We design a proxy signature in the setting of leakage-resilient cryptography for the first time. Our motivation is that the proxy signatures are often used in scenarios where the signing is done in an insecure environment, e.g., the proxy key is stored in a device which is not secure enough example of IC card. In such setting, an adversary who can launch side-channel attacks may detect some leakage information about the proxy key. The traditional security models of the proxy signatures cannot provide such security. Hence we extend them to the leakage-resilient setting, and also give a concrete construction which conforms to the extended security model.
  • Keywords
    cryptography; digital signatures; extended security model; leakage information; leakage-resilient cryptography; leakage-resilient proxy signatures; side-channel attacks; Adaptation models; Computational modeling; Concrete; Protocols; Public key; Proxy signatures; leakage-resilient cryptography; provable security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on
  • Conference_Location
    Xi´an
  • Type

    conf

  • DOI
    10.1109/INCoS.2013.94
  • Filename
    6630463