메뉴 건너뛰기




Volumn 5912 LNCS, Issue , 2009, Pages 703-720

Signature schemes with bounded leakage resilience

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOSYSTEMS; INTERNAL STATE; LEAKAGE-RESILIENCE; ONE-TIME SIGNATURE; ONE-WAY FUNCTIONS; SECRET KEY; SIGNATURE SCHEME; THE STANDARD MODEL;

EID: 72449205531     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10366-7_41     Document Type: Conference Paper
Times cited : (186)

References (35)
  • 1
    • 70350627587 scopus 로고    scopus 로고
    • Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, 5444, pp. 474-495. Springer, Heidelberg (2009)
    • Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474-495. Springer, Heidelberg (2009)
  • 2
    • 72449143900 scopus 로고    scopus 로고
    • Alwen, J., Dodis, Y., Wichs, D.: Public key cryptography in the bounded retrieval model and security against side-channel attacks. In: Halevi, S. (ed.) Crypto 2009. LNCS, 5677, pp. 1-17. Springer, Heidelberg (2009)
    • Alwen, J., Dodis, Y., Wichs, D.: Public key cryptography in the bounded retrieval model and security against side-channel attacks. In: Halevi, S. (ed.) Crypto 2009. LNCS, vol. 5677, pp. 1-17. Springer, Heidelberg (2009)
  • 3
    • 51849097235 scopus 로고    scopus 로고
    • Bug attacks
    • Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
    • Biham, E., Carmeli, Y., Shamir, A.: Bug attacks. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 221-240. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 221-240
    • Biham, E.1    Carmeli, Y.2    Shamir, A.3
  • 4
    • 18844454571 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • Boneh, D., Brumley, D.: Remote timing attacks are practical. Computer Networks 48(5), 701-716 (2005)
    • (2005) Computer Networks , vol.48 , Issue.5 , pp. 701-716
    • Boneh, D.1    Brumley, D.2
  • 5
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
    • Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37-51. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 37-51
    • Boneh, D.1    DeMillo, R.A.2    Lipton, R.J.3
  • 6
    • 84948973494 scopus 로고    scopus 로고
    • Exposure-resilient functions and all-or-nothing transforms
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Canetti, R., Dodis, Y., Halevi, S., Kushilevitz, E., Sahai, A.: Exposure-resilient functions and all-or-nothing transforms. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 453-469. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 453-469
    • Canetti, R.1    Dodis, Y.2    Halevi, S.3    Kushilevitz, E.4    Sahai, A.5
  • 7
    • 84921068967 scopus 로고    scopus 로고
    • Cramer, R., Damg?ard, I.: Secure signature schemes based on interactive protocols. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, 963, pp. 297-310. Springer, Heidelberg (1995)
    • Cramer, R., Damg?ard, I.: Secure signature schemes based on interactive protocols. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 297-310. Springer, Heidelberg (1995)
  • 8
    • 84880875026 scopus 로고    scopus 로고
    • Robust noninteractive zero knowledge
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • De Santis, A., Di Crescenzo, G., Ostrovsky, R., Persiano, G., Sahai, A.: Robust noninteractive zero knowledge. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 566-598. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 566-598
    • De Santis, A.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4    Sahai, A.5
  • 11
    • 57949107348 scopus 로고    scopus 로고
    • Leakage-resilient cryptography. In: 49th Annual Symposium on Foundations of Computer Science (FOCS)
    • Dziembowski, S., Pietrzak, K.: Leakage-resilient cryptography. In: 49th Annual Symposium on Foundations of Computer Science (FOCS), pp. 293-302. IEEE, Los Alamitos (2008), Full version: http://eprint.iacr.org/2008/240
    • IEEE, Los Alamitos (2008), Full version , pp. 293-302
    • Dziembowski, S.1    Pietrzak, K.2
  • 13
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
    • Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
    • (1987) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 14
    • 84944898222 scopus 로고    scopus 로고
    • Fischlin, M., Fischlin, R.: The representation problem based on factoring. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, 2271, pp. 96-113. Springer, Heidelberg (2002)
    • Fischlin, M., Fischlin, R.: The representation problem based on factoring. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 96-113. Springer, Heidelberg (2002)
  • 15
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17(2), 281-308 (1988)
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 16
    • 84947558992 scopus 로고
    • A "paradoxical" indentity-based signature scheme resulting from zero-knowledge
    • Goldwasser, S, ed, CRYPTO 1988, Springer, Heidelberg
    • Guillou, L.C., Quisquater, J.-J.: A "paradoxical" indentity-based signature scheme resulting from zero-knowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 216-231. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.403 , pp. 216-231
    • Guillou, L.C.1    Quisquater, J.-J.2
  • 18
    • 33745848493 scopus 로고    scopus 로고
    • Finding collisions on a public road, or do secure hash functions need secret coins?
    • Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
    • Hsiao, C.-Y., Reyzin, L.: Finding collisions on a public road, or do secure hash functions need secret coins? In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 92-105. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 92-105
    • Hsiao, C.-Y.1    Reyzin, L.2
  • 19
    • 35248830337 scopus 로고    scopus 로고
    • Private circuits: Securing hardware against probing attacks
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Ishai, Y., Sahai, A., Wagner, D.: Private circuits: Securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463-481. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 463-481
    • Ishai, Y.1    Sahai, A.2    Wagner, D.3
  • 20
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
    • Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 21
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
    • Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 22
    • 84957057937 scopus 로고    scopus 로고
    • Coding constructions for blacklisting problems without computational assumptions
    • Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
    • Kumar, R., Rajagopalan, S., Sahai, A.: Coding constructions for blacklisting problems without computational assumptions. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 609-623. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 609-623
    • Kumar, R.1    Rajagopalan, S.2    Sahai, A.3
  • 23
    • 0003605145 scopus 로고
    • Constructing digital signatures from a one-way function
    • Technical Report SRI-CSL-98, SRI International Computer Science Laboratory October
    • Lamport, L.: Constructing digital signatures from a one-way function. Technical Report SRI-CSL-98, SRI International Computer Science Laboratory (October 1979)
    • (1979)
    • Lamport, L.1
  • 24
    • 40249114814 scopus 로고    scopus 로고
    • Lyubashevsky, V., Micciancio, D.: Asymptotically efficient lattice-based digital signatures. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 37-54. Springer, Heidelberg (2008)
    • Lyubashevsky, V., Micciancio, D.: Asymptotically efficient lattice-based digital signatures. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 37-54. Springer, Heidelberg (2008)
  • 25
    • 35048852134 scopus 로고    scopus 로고
    • Micali, S., Reyzin, L.: Physically observable cryptography. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 278-296. Springer, Heidelberg (2004)
    • Micali, S., Reyzin, L.: Physically observable cryptography. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 278-296. Springer, Heidelberg (2004)
  • 26
    • 70350303869 scopus 로고    scopus 로고
    • Public-key cryptosystems resilient to key leakage
    • Halevi, S, ed, CRYPTO 2009, Springer, Heidelberg
    • Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 18-35. Springer, Heidelberg (2009), http://eprint.iacr.org/2009/105
    • (2009) LNCS , vol.5677 , pp. 18-35
    • Naor, M.1    Segev, G.2
  • 27
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • ACM Press, New York
    • Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: 21st Annual ACM Symposium on Theory of Computing (STOC), pp. 33-43. ACM Press, New York (1989)
    • (1989) 21st Annual ACM Symposium on Theory of Computing (STOC) , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 28
    • 33746391879 scopus 로고    scopus 로고
    • The insecurity of the digital signature algorithm with partially known nonces
    • Nguyen, P.Q., Shparlinski, I.: The insecurity of the digital signature algorithm with partially known nonces. Journal of Cryptology 15(3), 151-176 (2002)
    • (2002) Journal of Cryptology , vol.15 , Issue.3 , pp. 151-176
    • Nguyen, P.Q.1    Shparlinski, I.2
  • 29
    • 84875762817 scopus 로고
    • Provably secure and practical identification schemes and corresponding signature schemes
    • Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
    • Okamoto, T.: Provably secure and practical identification schemes and corresponding signature schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31-53. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 31-53
    • Okamoto, T.1
  • 30
    • 33745972475 scopus 로고
    • Fast signature generation with a Fiat-Shamir-like scheme
    • Damgård, I.B, ed, EUROCRYPT 1990, Springer, Heidelberg
    • Ong, H., Schnorr, C.-P.: Fast signature generation with a Fiat-Shamir-like scheme. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 432-440. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.473 , pp. 432-440
    • Ong, H.1    Schnorr, C.-P.2
  • 31
    • 67650675583 scopus 로고    scopus 로고
    • A leakage-resilient mode of operation
    • Joux, A, ed, EUROCRYPT 2009, Springer, Heidelberg
    • Pietrzak, K.: A leakage-resilient mode of operation. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 462-482. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 462-482
    • Pietrzak, K.1
  • 32
    • 49149086879 scopus 로고    scopus 로고
    • Explicit non-adaptive combinatorial group testing schemes
    • Aceto, L, Damgård, I, Goldberg, L.A, Halldórsson, M.M, Ingólfsdóttir, A, Walukiewicz, I, eds, ICALP 2008, Part I, Springer, Heidelberg
    • Porat, E., Rothschild, A.: Explicit non-adaptive combinatorial group testing schemes. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part I. LNCS, vol. 5125, pp. 748-759. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5125 , pp. 748-759
    • Porat, E.1    Rothschild, A.2
  • 33
    • 0033342534 scopus 로고    scopus 로고
    • Non-malleable non-interactive zero knowledge and adaptive chosenciphertext security
    • IEEE, Los Alamitos
    • Sahai, A.: Non-malleable non-interactive zero knowledge and adaptive chosenciphertext security. In: 40th Annual Symposium on Foundations of Computer Science (FOCS), pp. 543-553. IEEE, Los Alamitos (1999)
    • (1999) 40th Annual Symposium on Foundations of Computer Science (FOCS) , pp. 543-553
    • Sahai, A.1
  • 34
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Schnorr, C.-P.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239-252. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 239-252
    • Schnorr, C.-P.1
  • 35
    • 67650694228 scopus 로고    scopus 로고
    • A unified framework for the analysis of side-channel key recovery attacks
    • Joux, A, ed, EUROCRYPT 2009, Springer, Heidelberg
    • Standaert, F.-X., Malkin, T., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443-461. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 443-461
    • Standaert, F.-X.1    Malkin, T.2    Yung, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.