{"title":"Leakage-Resilient Proxy Signatures","authors":"Fei Tang, Hongda Li, Qihua Niu, Bei Liang","doi":"10.1109/INCoS.2013.94","DOIUrl":null,"url":null,"abstract":"We design a proxy signature in the setting of leakage-resilient cryptography for the first time. Our motivation is that the proxy signatures are often used in scenarios where the signing is done in an insecure environment, e.g., the proxy key is stored in a device which is not secure enough example of IC card. In such setting, an adversary who can launch side-channel attacks may detect some leakage information about the proxy key. The traditional security models of the proxy signatures cannot provide such security. Hence we extend them to the leakage-resilient setting, and also give a concrete construction which conforms to the extended security model.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"108 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INCoS.2013.94","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
We design a proxy signature in the setting of leakage-resilient cryptography for the first time. Our motivation is that the proxy signatures are often used in scenarios where the signing is done in an insecure environment, e.g., the proxy key is stored in a device which is not secure enough example of IC card. In such setting, an adversary who can launch side-channel attacks may detect some leakage information about the proxy key. The traditional security models of the proxy signatures cannot provide such security. Hence we extend them to the leakage-resilient setting, and also give a concrete construction which conforms to the extended security model.