首页> 外文期刊>Engineering Economics >Leakage-Resilient Certificateless Signature Under Continual Leakage Model
【24h】

Leakage-Resilient Certificateless Signature Under Continual Leakage Model

机译:连续泄漏模型下的防泄漏弹性无证书签名

获取原文
           

摘要

In the past, the security notions of cryptography were modeled under the assumption that private (or secret) keys are completely hidden to adversaries. Nowadays, these security notions could be insufficient due to a new kind of threat, called “side-channel attacks”, by which an adversary obtains partial information of private (or secret) keys via employing specific properties resulting from physical implementations of cryptographic schemes. In order to resist such side-channel attacks, numerous leakage-resilient cryptographic schemes have been proposed. However, there is little work on studying leakage-resilient certificateless cryptographic schemes. In this article, we propose the first leakage-resilient certificateless signature (LR-CLS) scheme under the continual leakage model. In the generic bilinear group model, we demonstrate that our scheme possesses existential unforgeability against adaptive chosen-message attacks for both Type I and Type II adversaries. Finally, performance analysis is made to demonstrate that the proposed LR-CLS scheme is suitable for resource-constrained devices.DOI: http://dx.doi.org/10.5755/j01.itc.47.2.17847.
机译:过去,加密的安全性概念是在假定私有(或秘密)密钥完全对对手隐藏的前提下建模的。如今,这些安全概念可能由于一种称为“侧信道攻击”的新型威胁而变得不够用,通过这种威胁,对手可以通过利用密码方案的物理实现所产生的特定属性来获取私有(或秘密)密钥的部分信息。为了抵抗这种侧信道攻击,已经提出了许多防泄漏的加密方案。但是,在研究具有防泄漏能力的无证书加密方案方面工作很少。在本文中,我们提出了在连续泄漏模型下的第一个防泄漏弹性无证书签名(LR-CLS)方案。在通用双线性群模型中,我们证明了我们的方案对于类型I和类型II对手都具有针对自适应选择消息攻击的生存不可伪造性。最后,进行性能分析以证明所提出的LR-CLS方案适用于资源受限的设备。DOI:http://dx.doi.org/10.5755/j01.itc.47.2.17847。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号