Signatures Resilient to Continual Leakage on Memory and Computation

Recent breakthrough results by Brakerski et al and Dodis et al have shown that signature schemes can be made secure even if the adversary continually obtains information leakage from the secret key of the scheme. However, the schemes currently do not allow leakage on the secret key and randomness during signing, except in the random oracle model. Further, the random oracle based schemes require updates to the secret key in order to maintain security, even when no leakage during computation is present.

Provided by: Columbia University Topic: Security Date Added: Oct 2010 Format: PDF

Find By Topic