Welcome to the resource topic for
**2009/220**

**Title:**

Signature Schemes with Bounded Leakage Resilience

**Authors:**
Jonathan Katz

**Abstract:**

A leakage-resilient cryptosystem remains secure even if arbitrary, but bounded, information about the secret key (or possibly other internal state information) is leaked to an adversary. Denote the length of the secret key by n. We show a signature scheme tolerating (optimal) leakage of up to n-n^\epsilon bits of information about the secret key, and a more efficient one-time signature scheme that tolerates leakage of (\frac{1}{4}-\epsilon) \cdot n bits of information about the signerâ€™s entire state. The latter construction extends to give a leakage-resilient t-time signature scheme. All these constructions are in the standard model under general assumptions.

**ePrint:**
https://eprint.iacr.org/2009/220

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

**Example resources include:**
implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .