Unlike black-box cryptography, an adversary in a white-box security model has full access to the implementation of the cryptographic algorithm. Thus, white-box implementation of cryptographic algorithms is more practical. Nevertheless, in recent years, there is no white-box implementation for public key cryptography. In this paper, we propose the first white-box implementation of the identity-based signature scheme in the IEEE P1363 standard. Our main idea is to hide the private key to multiple lookup tables, so that the private key cannot be leaked during the algorithm executed in the untrusted environment. We prove its security in both black-box and white-box models. We also evaluate the performance of our white-box implementations, in order to demonstrate utility for real-world applications.
Yudi ZHANG
Wuhan University,State Key Laboratory of Cryptology
Debiao HE
Wuhan University,State Key Laboratory of Cryptology
Xinyi HUANG
Fujian Normal University,the Fujian Provincial Key Laboratory of Network Security and Cryptology
Ding WANG
State Key Laboratory of Cryptology,Peking University
Kim-Kwang Raymond CHOO
The University of Texas at San Antonio
Jing WANG
Wuhan University,State Key Laboratory of Cryptology
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Yudi ZHANG, Debiao HE, Xinyi HUANG, Ding WANG, Kim-Kwang Raymond CHOO, Jing WANG, "White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography" in IEICE TRANSACTIONS on Information,
vol. E103-D, no. 2, pp. 188-195, February 2020, doi: 10.1587/transinf.2019INP0004.
Abstract: Unlike black-box cryptography, an adversary in a white-box security model has full access to the implementation of the cryptographic algorithm. Thus, white-box implementation of cryptographic algorithms is more practical. Nevertheless, in recent years, there is no white-box implementation for public key cryptography. In this paper, we propose the first white-box implementation of the identity-based signature scheme in the IEEE P1363 standard. Our main idea is to hide the private key to multiple lookup tables, so that the private key cannot be leaked during the algorithm executed in the untrusted environment. We prove its security in both black-box and white-box models. We also evaluate the performance of our white-box implementations, in order to demonstrate utility for real-world applications.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.2019INP0004/_p
Copy
@ARTICLE{e103-d_2_188,
author={Yudi ZHANG, Debiao HE, Xinyi HUANG, Ding WANG, Kim-Kwang Raymond CHOO, Jing WANG, },
journal={IEICE TRANSACTIONS on Information},
title={White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography},
year={2020},
volume={E103-D},
number={2},
pages={188-195},
abstract={Unlike black-box cryptography, an adversary in a white-box security model has full access to the implementation of the cryptographic algorithm. Thus, white-box implementation of cryptographic algorithms is more practical. Nevertheless, in recent years, there is no white-box implementation for public key cryptography. In this paper, we propose the first white-box implementation of the identity-based signature scheme in the IEEE P1363 standard. Our main idea is to hide the private key to multiple lookup tables, so that the private key cannot be leaked during the algorithm executed in the untrusted environment. We prove its security in both black-box and white-box models. We also evaluate the performance of our white-box implementations, in order to demonstrate utility for real-world applications.},
keywords={},
doi={10.1587/transinf.2019INP0004},
ISSN={1745-1361},
month={February},}
Copy
TY - JOUR
TI - White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
T2 - IEICE TRANSACTIONS on Information
SP - 188
EP - 195
AU - Yudi ZHANG
AU - Debiao HE
AU - Xinyi HUANG
AU - Ding WANG
AU - Kim-Kwang Raymond CHOO
AU - Jing WANG
PY - 2020
DO - 10.1587/transinf.2019INP0004
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E103-D
IS - 2
JA - IEICE TRANSACTIONS on Information
Y1 - February 2020
AB - Unlike black-box cryptography, an adversary in a white-box security model has full access to the implementation of the cryptographic algorithm. Thus, white-box implementation of cryptographic algorithms is more practical. Nevertheless, in recent years, there is no white-box implementation for public key cryptography. In this paper, we propose the first white-box implementation of the identity-based signature scheme in the IEEE P1363 standard. Our main idea is to hide the private key to multiple lookup tables, so that the private key cannot be leaked during the algorithm executed in the untrusted environment. We prove its security in both black-box and white-box models. We also evaluate the performance of our white-box implementations, in order to demonstrate utility for real-world applications.
ER -