Proxy Re-encryption Phill Hallam-Baker.

Slides:



Advertisements
Similar presentations
Public Key Cryptosystem
Advertisements

Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
CMSC 414 Computer (and Network) Security Lecture 22 Jonathan Katz.
PGP Overview 2004/11/30 Information-Center meeting peterkim.
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Electronic mail security -- Pretty Good Privacy.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
IS 247 Introduction to Web Application Development Tim Wu.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Application Security: (April 10, 2013) © Abdou Illia – Spring 2013.
Encryption. What is encryption? Encryption is conversion of original data to another data that can be converted back to original data by authorized persons.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Peer to peer networks. Peer to peer is when digital devices communicate wirelessly with each others without the need for a transmitter. Wi-Fi Direct 1-
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
SELS: A Secure List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois Appeared in the ACM Symposium of Applied.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
By: Derek Ton & Alex Pappas.  Most frequently used internet service that you will manage as network administrator.  You need to understand how they.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
Mail Server Mail is just a message in any form sends from sender to receiver. Mail Server is a computerized system that is equivalent to virtual post office.
` ` Alice’s Mail Provider Bob’s Mail Provider Architecture Mary
Key management issues in PGP
Dibyajit Computer Security Hacking dibyajit
Unit 3 Section 6.4: Internet Security
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Privacy & Security.
A Wireless LAN Security Protocol
Fundamental Concepts in Security and its Application Cloud Computing
Group theory exercise.
Vernam Cipher Group Members: Muhammad Awais Muhammad Hasnain khan
Topic 1: Data, information, knowledge and processing
14-мавзу. Cookie, сеанс, FTP и технологиялари
Information Security message M one-way hash fingerprint f = H(M)
M3: Encryption r By Andrew Stringer.
Public-Key Cryptography
Ch. 11 – Cipher Techniques Dr. Wayne Summers
הוראת מיומנויות של עבודה בקבוצה מחקר פעולה
Secure Electronic Transaction (SET) University of Windsor
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
Crypto #4 Encryption and Network Protocols
Protocols 2 Key Revision Points.
Install AD Certificate Services
CDK: Chapter 7 TvS: Chapter 9
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Public-Key, Digital Signatures, Management, Security
Digital Communications
Emerging Security Mechanisms for Medical Cyber Physical Systems
Electronic Payment Security Technologies
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Cryptography and Network Security
Introduction to Cryptography
Digital Signature Standard (DSS)
Key Exchange, Man-in-the-Middle Attack
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Coracias Advanced Technologies LLC.
EDI Systems What They Are and Why They Matter
How to Use Charm Crypto Lib
Presentation transcript:

Proxy Re-encryption Phill Hallam-Baker

What it is Alice sends a encrypted message to X (e.g. a cloud service) Public key ‘belongs to’ X X cannot decrypt the message But X can convert messages Forward message to B, C, D using re-encryption keys Holder of private key creates re-encryption keys This can be performed offline Can be implemented in any DH cryptosystem Including EC variants

Why is it useful Confidential mailing list IMAP / POP server Cloud service and only cloud service knows membership Cloud service can’t decrypt message, not a point of vulnerability IMAP / POP server Alice has 5 devices, wants end to end encryption to each one Senders do not want to have to provide 5 decryption blobs Implement label based security CRM scheme Very powerful, currently encumbered, patents ‘should’ expire soon Group chats…

Next Steps Well known in theory circles Open questions Well grounded Has been overlooked by protocol community No standards support No (direct) support in toolkits Open questions What are the best approaches that are not encumbered? How should this be expressed in key formats?