Title
Leakage resilient strong key-insulated signatures in public channel
Abstract
Key-insulation aims at minimizing (i.e., compartmentalizing) the damage of users from key exposures, and traditionally requires a private channel of communication between a user and a semi-trusted party called a helper to refresh the private keys. The configuration is highly suitable to architectures where the signer is a user application and the helper resides in the safer “trusted module,” yet the user wants to remain in control of the sensitive crypto operation. The private channel employed in the model, while acceptable in some settings, certainly limits the usage of key insulation schemes (in case the user sits across the network from the trusted environment). In 2009, Bellare, Duan, and Palacio (CT-RSA 2009) refined the model of key-insulation by considering public channels (namely, ones controlled by the adversary), and showed how to convert a key-insulated signature scheme from the private channel into the public one, using extra primitives such as key exchange protocols and symmetric encryption. In this paper, we show that the primitives may be redundant in specific cases. In particular, we revisit the original key-insulated signature scheme in the private channel given by Dodis, Katz, Xu, and Yung (PKC 2003), and show that, with a tweak, the scheme can be naturally proved secure in the public channel without any additional primitives. Next we consider the area of leakage resilient cryptographic schemes which has gained much interest recently. In particular, we consider the continual key leakage scenario of our design (which is more general than the model of key exposure), and argue that our proposal, while requiring an added helper component, nevertheless enjoys several advantages over the recent signature scheme of Faust et al. (TCC 2010) with the same purpose of allowing continual leakage. Our design demonstrates how when given a more complex architecture with some parts that are safer than others, a trade-off can be applied, exploiting the safer modules but keeping users in control; further we show how to do it while mitigating the effect of exposures and leakages.
Year
DOI
Venue
2010
10.1007/978-3-642-25283-9_11
INTRUST
Keywords
Field
DocType
key exposure,resilient strong key-insulated signature,private key,key insulation scheme,continual key leakage scenario,private channel,key-insulated signature scheme,original key-insulated signature scheme,public channel,leakage resilient cryptographic scheme,key exchange protocol
Symmetric-key algorithm,Architecture,Key exchange,Computer security,Computer science,Cryptography,Strong key,Communication channel,SAFER,Adversary
Conference
Citations 
PageRank 
References 
1
0.35
18
Authors
3
Name
Order
Citations
PageRank
Le Trieu Phong115916.88
Shin'ichiro Matsuo211616.05
Moti Yung3120801152.41