{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T02:38:16Z","timestamp":1747190296901,"version":"3.40.5"},"reference-count":39,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:00:00Z","timestamp":1605744000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program","doi-asserted-by":"crossref","award":["2017YFC0801004"],"award-info":[{"award-number":["2017YFC0801004"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,11,19]]},"abstract":"<jats:p>White-box attack context assumes that the running environments of algorithms are visible and modifiable. Algorithms that can resist the white-box attack context are called white-box cryptography. The elliptic curve digital signature algorithm (ECDSA) is one of the most widely used digital signature algorithms which can provide integrity, authenticity, and nonrepudiation. Since the private key in the classical ECDSA is plaintext, it is easy for attackers to obtain the private key. To increase the security of the private key under the white-box attack context, this article presents an algorithm for the white-box implementation of ECDSA. It uses the lookup table technology and the \u201ccloud plus side\u201d mode to protect the private key. The residue number system (RNS) theory is used to reduce the size of storage. Moreover, the article analyzes the security of the proposed algorithm against an exhaustive search attack, a random number attack, a code lifting attack, and so on. The efficiency of the proposed scheme is compared with that of the classical ECDSA through experiments.<\/jats:p>","DOI":"10.1155\/2020\/8881116","type":"journal-article","created":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T18:50:57Z","timestamp":1605811857000},"page":"1-10","source":"Crossref","is-referenced-by-count":6,"title":["White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0750-8870","authenticated-orcid":true,"given":"Jie","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Computer and Software Engineering, Xihua University, Chengdu 610039, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8567-2062","authenticated-orcid":true,"given":"Jian","family":"Bai","sequence":"additional","affiliation":[{"name":"China Electronic Technology Cyber Security Co., Ltd., Chengdu 610041, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4689-5914","authenticated-orcid":true,"given":"Meng Shan","family":"Jiang","sequence":"additional","affiliation":[{"name":"China Electronic Technology Cyber Security Co., Ltd., Chengdu 610041, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2017.014722"},{"key":"2","first-page":"250","article-title":"White-box cryptography and an AES implementation","volume-title":"SAC 2002, Lecture Notes in Computer Science","author":"S. Chow","year":"2002"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2012.060912.00182"},{"key":"4","first-page":"27","article-title":"A formally verified decentralized key management architecture for wireless sensor networks","volume-title":"PWC 2003, Lecture Notes in Computer Science","author":"Y. Law","year":"2003"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.100"},{"key":"6","first-page":"227","article-title":"Cryptanalysis of a white box AES implementation","volume-title":"SAC 2004, Lecture Notes in Computer Science","author":"O. Billet","year":"2004"},{"author":"J. Bringer","key":"7","article-title":"White box cryptography: another attempt"},{"key":"8","first-page":"292","article-title":"Cryptanalysis of a perturbated white-box AES implementation","volume-title":"INDOCRYPT 2010, Lecture Notes in Computer Science","author":"Y. D. Mulder","year":"2010"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CSA.2009.5404239"},{"key":"10","first-page":"34","article-title":"Cryptanalysis of the Xiao-Lai white-box AES implementation","volume-title":"SAC 2012, Lecture Notes in Computer Science","author":"Y. D. Mulder","year":"2012"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4562-8"},{"first-page":"423","article-title":"A new attempt of white-box AES implementation","author":"R. Luo","key":"12"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2017.0046"},{"key":"14","first-page":"1","article-title":"A white-box DES implementation for DRM applications","volume-title":"DRM 2002, Lecture Notes in Computer Science","author":"S. Chow","year":"2002"},{"key":"15","first-page":"16","article-title":"Attacking an obfuscated cipher by injecting faults","volume-title":"DRM 2002, Lecture Notes in Computer Science","author":"M. Jacob","year":"2002"},{"first-page":"679","article-title":"Clarifying obfuscation: improving the Security of White-Box DES","author":"H. Link","key":"16"},{"key":"17","first-page":"278","article-title":"Cryptanalysis of white box DES implementations","volume-title":"SAC 2007, Lecture Notes in Computer Science","author":"L. Goubin","year":"2007"},{"key":"18","first-page":"264","article-title":"Cryptanalysis of white-box DES implementations with arbitrary external encodings","volume-title":"SAC 2007, Lecture Notes in Computer Science","author":"B. Wyseur","year":"2007"},{"key":"19","first-page":"591","article-title":"A DFA attack on white-box implementations of AES with external encodings","volume-title":"SAC 2019, Lecture Notes in Computer Science","author":"A. Amadori","year":"2020"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1288\/1\/012005"},{"key":"21","first-page":"63","article-title":"Cryptographic schemes based on the ASASA structure: block-box, white-box, and public-key (extended abstract)","volume-title":"ASIACRYPT 2014, Lecture Notes in Computer Science","author":"A. Biryukov","year":"2014"},{"key":"22","first-page":"475","article-title":"Key-Recovery attack on the ASASA cryptosystem with expanding S-boxes","volume-title":"CRYPTO 2015, Lecture Notes in Computer Science","author":"H. Gilbert","year":"2015"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-017-9272-x"},{"key":"24","first-page":"106","article-title":"FPL: White-box secure block cipher using parallel table look-ups","volume-title":"CT-RSA 2020, Lecture Notes in Computer Science","author":"J. Kwon","year":"2020"},{"issue":"2","key":"25","doi-asserted-by":"crossref","first-page":"327","DOI":"10.46586\/tches.v2020.i2.327-357","article-title":"On the security goals of white-box cryptography","volume":"2020","author":"E. Alpirez Bock","year":"2020","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"issue":"3","key":"26","doi-asserted-by":"crossref","first-page":"1602","DOI":"10.1109\/TII.2019.2929431","article-title":"SDSRS: a novel white-box cryptography scheme for securing embedded devices in IIoT","volume":"16","author":"Y. Shi","year":"2019","journal-title":"IEEE Transactions on Industrial Informatics"},{"article-title":"White-box implementation of the identity-based signature scheme in the IEEE P1363 standard for public key cryptography","year":"2018","author":"Y. Zhang","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2910934"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"volume-title":"Information Technology-Security Techniques-Digital Sigantures with Appendix-Part 3: Certificate Based Mechanisms, ISO\/IEC 14888-3, 1998","author":"ISO","key":"30"},{"volume-title":"Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), ANSI X9.62","year":"1999","author":"American National Standards Institute","key":"31"},{"volume-title":"Standard Specifications for Public Key Cryptography, IEEE Std 1363-2000","year":"2000","author":"Institute of Electrical and Electronics Engineers","key":"32"},{"volume-title":"Digital Signature Standard, FIPS 186-2","year":"2000","author":"National Institute of Standards and Technology","key":"33"},{"first-page":"146","article-title":"The residue number system","author":"H. L. Garner","key":"34"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/TCS.1977.1084321"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2016.10.006"},{"first-page":"917\u2013","article-title":"Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers","author":"Q. Chai","key":"37"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1007\/bf00196725"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1985.1057074"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8881116.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8881116.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8881116.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T18:51:06Z","timestamp":1605811866000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8881116\/"}},"subtitle":[],"editor":[{"given":"Fulvio","family":"Valenza","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,11,19]]},"references-count":39,"alternative-id":["8881116","8881116"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8881116","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2020,11,19]]}}}