ID-Based Ring Signature against Continual Side Channel Attack
نویسندگان
چکیده
The security of the signature scheme is destroyed because its secret information system leaked due to side channel attack. Ring has good application value, which can provide more flexibility and complete anonymity. It be used in some systems such as anonymous authentication ad hoc networks, electronic voting crypto coin based on blockchain. Because attack, private key ring may exposed, cause insecurity. We present a against continuous symmetry ring, user’s identity privacy protection. proposed completely secure without random oracle model disclosure rate close 1/3. Through dual technique, existential unforgeability unconditional anonymity are proved composite order group subgroup decision assumption.
منابع مشابه
Hardware Based Strategies Against Side - Channel - Attack Implemented in WDDL
This contribution discusses cryptographic algorithm in hardware that protects the information leaks out of the device through so called „side channels“. Attacks on crypto-processors are based on analyses of the leaked data are known as sidechannel attacks (SCA). Important information, such as secret keys, can be obtained by observing the power consumption, the electromagnetic radiation, the tim...
متن کاملNew side-channel attack against scan chains
Insertion of scan chains is the most common technique to ensure observability and controllability of sequential elements in an IC. However, when the chip deals with secret information, the scan chain can be used as back door for accessing secret (or hidden) information, and thus jeopardize the overall security. Several scan-based attacks on cryptographic functions have been described and shown ...
متن کاملID-Based Blind Signature and Ring Signature from Pairings
Recently the bilinear pairing such as Weil pairing or Tate pairing on elliptic curves and hyperelliptic curves have been found various applications in cryptography. Several identity-based (simply ID-based) cryptosystems using bilinear pairings of elliptic curves or hyperelliptic curves were presented. Blind signature and ring signature are very useful to provide the user’s anonymity and the sig...
متن کاملAnonymous E-voting System Based on Id-based Ring Signature
The design of an electronic voting system has been a hot research topic in the area of information security. Based on ID-based ring signature, blind signature, multi-verification technology and existed typical electronic voting models, an improved anonymous electronic voting system is designed. We proved that the new system has good properties of security: anonymity, eligibility, fairness, nonr...
متن کاملID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
In 2001, Rivest et al. firstly introduced the concept of ring signatures. A ring signature is a simplified group signature without any manager. It protects the anonymity of a signer. The first scheme proposed by Rivest et al. was based on RSA cryptosystem and certificate based public key setting. The first ring signature scheme based on DLP was proposed by Abe, Ohkubo, and Suzuki. Their scheme ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Symmetry
سال: 2023
ISSN: ['0865-4824', '2226-1877']
DOI: https://doi.org/10.3390/sym15010179