Leakage-Resilient Certificateless Signature Under Continual Leakage Model

Authors

  • Jui-Di Wu Department of Mathematics, National Changhua University of Education, Jin–De Campus, Chang–Hua City 500, Taiwan
  • Yuh–Min Tseng Department of Mathematics, National Changhua University of Education, Jin–De Campus, Chang–Hua City 500, Taiwan
  • Sen-Shan Huang Department of Mathematics, National Changhua University of Education, Jin–De Campus, Chang–Hua City 500, Taiwan

DOI:

https://doi.org/10.5755/j01.itc.47.2.17847

Keywords:

Side-channel attack, certificateless signature, Leakage-resilience, Provable security

Abstract

In the past, the security notions of cryptography were modeled under the assumption that private (or secret) keys are completely hidden to adversaries. Nowadays, these security notions could be insufficient due to a new kind of threat, called “side-channel attacks”, by which an adversary obtains partial information of private (or secret) keys via employing specific properties resulting from physical implementations of cryptographic schemes. In order to resist such side-channel attacks, numerous leakage-resilient cryptographic schemes have been proposed. However, there is little work on studying leakage-resilient certificateless cryptographic schemes. In this article, we propose the first leakage-resilient certificateless signature (LR-CLS) scheme under the continual leakage model. In the generic bilinear group model, we demonstrate that our scheme possesses existential unforgeability against adaptive chosen-message attacks for both Type I and Type II adversaries. Finally, performance analysis is made to demonstrate that the proposed LR-CLS scheme is suitable for resource-constrained devices.

DOI: http://dx.doi.org/10.5755/j01.itc.47.2.17847

Author Biography

Downloads

Published

2018-05-18

Issue

Section

Articles