ID-Based Ring Signature against Continual Side Channel Attack

نویسندگان

چکیده

The security of the signature scheme is destroyed because its secret information system leaked due to side channel attack. Ring has good application value, which can provide more flexibility and complete anonymity. It be used in some systems such as anonymous authentication ad hoc networks, electronic voting crypto coin based on blockchain. Because attack, private key ring may exposed, cause insecurity. We present a against continuous symmetry ring, user’s identity privacy protection. proposed completely secure without random oracle model disclosure rate close 1/3. Through dual technique, existential unforgeability unconditional anonymity are proved composite order group subgroup decision assumption.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardware Based Strategies Against Side - Channel - Attack Implemented in WDDL

This contribution discusses cryptographic algorithm in hardware that protects the information leaks out of the device through so called „side channels“. Attacks on crypto-processors are based on analyses of the leaked data are known as sidechannel attacks (SCA). Important information, such as secret keys, can be obtained by observing the power consumption, the electromagnetic radiation, the tim...

متن کامل

New side-channel attack against scan chains

Insertion of scan chains is the most common technique to ensure observability and controllability of sequential elements in an IC. However, when the chip deals with secret information, the scan chain can be used as back door for accessing secret (or hidden) information, and thus jeopardize the overall security. Several scan-based attacks on cryptographic functions have been described and shown ...

متن کامل

ID-Based Blind Signature and Ring Signature from Pairings

Recently the bilinear pairing such as Weil pairing or Tate pairing on elliptic curves and hyperelliptic curves have been found various applications in cryptography. Several identity-based (simply ID-based) cryptosystems using bilinear pairings of elliptic curves or hyperelliptic curves were presented. Blind signature and ring signature are very useful to provide the user’s anonymity and the sig...

متن کامل

Anonymous E-voting System Based on Id-based Ring Signature

The design of an electronic voting system has been a hot research topic in the area of information security. Based on ID-based ring signature, blind signature, multi-verification technology and existed typical electronic voting models, an improved anonymous electronic voting system is designed. We proved that the new system has good properties of security: anonymity, eligibility, fairness, nonr...

متن کامل

ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings

In 2001, Rivest et al. firstly introduced the concept of ring signatures. A ring signature is a simplified group signature without any manager. It protects the anonymity of a signer. The first scheme proposed by Rivest et al. was based on RSA cryptosystem and certificate based public key setting. The first ring signature scheme based on DLP was proposed by Abe, Ohkubo, and Suzuki. Their scheme ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Symmetry

سال: 2023

ISSN: ['0865-4824', '2226-1877']

DOI: https://doi.org/10.3390/sym15010179