A provably secure ring signature scheme with bounded leakage resilience

  • Huaqun Wang
  • , Qianhong Wu
  • , Bo Qin
  • , Futai Zhang
  • , Josep Domingo-Ferrer

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Conventionally, the unforgeability of ring signature schemes is defined in an ideal environment where the attackers cannot access any information about the secret keys of the signers. This assumption is too strong to be satisfied in the real world since the cryptographic operations involves the secret key information leakage in various ways due to power/time consumption difference in operations on the 0/1 bits of the secret key. An attacker can obtain this information both passively by collecting power consumption information or actively by injecting faults during the signing operations. Thus, provably secure ring signature in the conventional security definition may be insecure in the real world due to the key information leakage. To address this problem, we formalize the first bounded leakage resilience definition for ring signature. A leakage resilient ring signature scheme remains secure even if arbitrary, but bounded, information about the secret key is leaked to an adversary. A bound on the leaked information is necessary because a ring signature cannot be secure if some signer's secret key is fully leaked. Then we propose the first ring signature scheme with bounded leakage resilience. Following the enhanced security definition with leakage resilience, the proposed scheme is provably secure based on the difficulty of the second l-representation problem in finite field.

Original languageEnglish
Title of host publicationInformation Security Practice and Experience - 10th International Conference, ISPEC 2014, Proceedings
PublisherSpringer Verlag
Pages388-402
Number of pages15
ISBN (Print)9783319063195
DOIs
StatePublished - 2014
Event10th International Conference on Information Security Practice and Experience, ISPEC 2014 - Fuzhou, China
Duration: 5 May 20148 May 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8434 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th International Conference on Information Security Practice and Experience, ISPEC 2014
Country/TerritoryChina
CityFuzhou
Period5/05/148/05/14

Keywords

  • Leakage resilience
  • Ring signature
  • Secret key leakage

Fingerprint

Dive into the research topics of 'A provably secure ring signature scheme with bounded leakage resilience'. Together they form a unique fingerprint.

Cite this