Signature Schemes Secure Against Hard-to-Invert Leakage

Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel
2015 Journal of Cryptology  
In the auxiliary input model an adversary is allowed to see a computationally hard-to-invert function of the secret key. The auxiliary input model weakens the bounded leakage assumption commonly made in leakage resilient cryptography as the hard-to-invert function may information-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature
more » ... that is secure against chosen message attacks when given an exponentially hard-to-invert function of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomialtime hard to invert function. Here, polynomial-hardness is required even when given the entire public-key -so called weak auxiliary input security. We show that such signature schemes readily give us auxiliary input secure identification schemes.
doi:10.1007/s00145-015-9197-1 fatcat:gv752itwbzdlfamfrc6aigft4i