Presentation 2011-03-03
A Study on Forward Secure Leakage Resilient Signature Schemes
Kentaro MOTO, Daisuke MORIYAMA, Hiroshi DOI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Recently there are a lot of secure digital signature schemes proved by a security notion. The standard security notion for digital signature schemes is existential unforgeability under chosen message attacks (EUF-CMA). In this notion, it is assumed that the information such that random numbers and a secret key used in signing does not leak. However, in practice, key exposure could be caused by human error. Moreover, there exists side-channel attacks (e.g.SPA/DPA attack, EMA attack) which exploit leakage of information about the secret internal state. It is important to consider about countermeasures of leaks of the information.Forward-Secure Signatures and Leakage-Resilient Signatures are countermeasure for these threats. In this research, we propose Forward-Secure Leakage-Resilient Signature scheme which satisfies both properties described above, and give a construction using CML Leakage-Resilient scheme. Finally, we give a securty proof.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) digital signature / Forward-Secure Signature / Leakage-Resilient Signature
Paper # IT2010-71,ISEC2010-75,WBS2010-50
Date of Issue

Conference Information
Committee ISEC
Conference Date 2011/2/24(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Study on Forward Secure Leakage Resilient Signature Schemes
Sub Title (in English)
Keyword(1) digital signature
Keyword(2) Forward-Secure Signature
Keyword(3) Leakage-Resilient Signature
1st Author's Name Kentaro MOTO
1st Author's Affiliation Institute of Information Security()
2nd Author's Name Daisuke MORIYAMA
2nd Author's Affiliation Institute of Information Security
3rd Author's Name Hiroshi DOI
3rd Author's Affiliation Institute of Information Security
Date 2011-03-03
Paper # IT2010-71,ISEC2010-75,WBS2010-50
Volume (vol) vol.110
Number (no) 443
Page pp.pp.-
#Pages 8
Date of Issue