DocumentCode
3512656
Title
Leakage-Resilient Proxy Signatures
Author
Fei Tang ; Hongda Li ; Qihua Niu ; Bei Liang
Author_Institution
State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
fYear
2013
fDate
9-11 Sept. 2013
Firstpage
495
Lastpage
502
Abstract
We design a proxy signature in the setting of leakage-resilient cryptography for the first time. Our motivation is that the proxy signatures are often used in scenarios where the signing is done in an insecure environment, e.g., the proxy key is stored in a device which is not secure enough example of IC card. In such setting, an adversary who can launch side-channel attacks may detect some leakage information about the proxy key. The traditional security models of the proxy signatures cannot provide such security. Hence we extend them to the leakage-resilient setting, and also give a concrete construction which conforms to the extended security model.
Keywords
cryptography; digital signatures; extended security model; leakage information; leakage-resilient cryptography; leakage-resilient proxy signatures; side-channel attacks; Adaptation models; Computational modeling; Concrete; Protocols; Public key; Proxy signatures; leakage-resilient cryptography; provable security;
fLanguage
English
Publisher
ieee
Conference_Titel
Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on
Conference_Location
Xi´an
Type
conf
DOI
10.1109/INCoS.2013.94
Filename
6630463
Link To Document