期刊文献+

可容忍信息泄露的指定验证者签名方案 被引量:1

Leakage-resilient designated verifier signature scheme
下载PDF
导出
摘要 指定验证者签名(DVS)克服了传统的数字签名中可公开验证的缺点,可防止验证者向第三方表明他获得了签名方发布的数字签名。但传统的密码方案的安全性依赖理想的假设,即攻击者不能获得保密的密钥的信息,而边信道攻击表明攻击者可以获得部分的秘密信息,因此有必要设计可以容忍信息泄露的指定验证者签名方案。基于"或"证明的技术,把Okamoto认证方案推广到指定验证者签名的情形,并在给定的泄露界下,证明了所提出的指定验证者签名方案在相对泄露模型下是安全的。 Designated Verifier Signature (DVS) eliminates the publicly verifiable feature of traditional digital signature to prevent a verifier from proving to a third party the fact that a particular digital signature held by him is issued by a signer. Traditionally, security of digital signature schemes relies on the ideal assumption that an adversary has no access to the information of a secret key. However, side-channel attacks show that the physical implementation of a eryptographic algorithm will leak partial secret information to an adversary. Hence it is necessary to design a leakage-resilient designated verifier signature. Okamoto authentication scheme was converted into a designated verifier signature scheme by using the OR proof technique. Given the leakage bound, the security of the presented scheme was proved under the relative leakage model.
作者 洪晓静 王斌
出处 《计算机应用》 CSCD 北大核心 2013年第12期3514-3518,共5页 journal of Computer Applications
基金 江苏省高校自然科学研究项目(10KJD520005) 扬州大学科技创新培育基金资助项目(2011CXJ022)
关键词 指定验证者签名 边信道攻击 相对泄露模型 公开验证 数字签名 Designated Verifier Signature (DVS) side-channel attack relative leakage model public verifiability digital signature
  • 相关文献

参考文献16

  • 1JAKOBSSON M, SAKO K, IMPAGLIAZZO R. Designated verifier proofs and their applications[C] // EUROCRYPT '1996: Proceed?ings of the 15th Annual International Conference on Theory and Ap?plication of Cryptographic Techniques, LNCS 1070. Berlin: Spring- er-Verlag, 1996: 143 -154.
  • 2KOCHER P C. Timing attacks on the implementations of Diffie-Hell?man, RSA, DSS, and other systems[C] // CRYPTO '1996: Pro?ceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology. Berlin: Springer-Verlag, 1996: 104 -113.
  • 3HALDERMANJ A, SCHOEN S 0, HENINGER N, et al. Lest we remember: cold boot attacks on encryption keys[C] // Proceedings of 17th USE NIX Security symposium. Berkeley: USENIX Associa?tion, 2008: 45 -60.
  • 4MICALI S, REYZIN L. Physically observable cryptography[C] // Proceedings of Theory of Cryptography'2004, LNCS 2951. Berlin: Springer-Verlag, 2004: 278 - 296.
  • 5FAUST S, KILTZ E, PIETRZAK K, et al. Leakage-resilient signa?tures[C] // Proceedings of Theory of Cryptography'20 10 , LNCS 5978. Berlin: Springer-Verlag, 2010: 343 -360.
  • 6AKA VIA A, GOLDWASSER S, VAIKUNTANATHAN V. Simulta?neous hard core bits and cryptography against memory attacks[C] // Proceedings of Theory of Cryptography'2009, LNCS 5444. Berlin: Springer-Verlag, 2009:474 -495.
  • 7NAOR M, SEGEV G. Public-key cryptosystems resilient to key leak?age[C]// CRYPTO'2OO9: Proceedings of Advance in Cryptology, LNCS 5677. Berlin: Springer-Verlag, 2009: 18 -35.
  • 8CRAMER R, SHOUP V. Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption[C] // Pro?ceedings of Advance in Cryptology-EUROCRYPT'2002, LNCS 2332. Berlin: Springer-Verlag, 2002: 45 - 64.
  • 9ALWEN], DOorS Y, NAOR M, et al. Public-key encryption in the Bounded Retrieval Model[CJ / / Proceedings of Advance in Cryptology- EUROCRYPT'201O, LNCS 6110. Berlin: Springer-Ver?lag, 2010: 113-134.
  • 10DOorS Y, HARALAMBIEV K, LOPEZ-ALT A, et al. Efficient public-key cryptography in the presence of key leakage[C] / / Proceedings of Advance in Cryptology-ASIACRYPT'2010, LNCS 6477. Berlin: Springer-Verlag, 2010: 613 -631.

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部