@article {15082,
title = {Signature schemes with bounded leakage resilience},
journal = {Advances in Cryptology{\textendash}ASIACRYPT 2009},
year = {2009},
month = {2009///},
pages = {703 - 720},
abstract = {A leakage-resilient cryptosystem remains secure even if arbitrary, but bounded, information about the secret key (and possibly other internal state information) is leaked to an adversary. Denote the length of the secret key by n. We show:{\textbullet} A full-fledged signature scheme tolerating leakage of n - n ε bits of information about the secret key (for any constant ε> 0), based on general assumptions.
{\textbullet} A one-time signature scheme, based on the minimal assumption of one-way functions, tolerating leakage of (41-)n bits of information about the signer{\textquoteright}s entire state.
{\textbullet} A more efficient one-time signature scheme, that can be based on several specific assumptions, tolerating leakage of (21-)n bits of information about the signer{\textquoteright}s entire state.
The latter two constructions extend to give leakage-resilient t-time signature schemes. All the above constructions are in the standard model.
},
doi = {10.1007/978-3-642-10366-7_41},
author = {Katz, Jonathan and Vaikuntanathan,V.}
}