An Introduction to Pairing Based Cryptography

Slides:



Advertisements
Similar presentations
Boneh-Franklin Identity-based Encryption. 2 Symmetric bilinear groups G = ágñ, g p = 1 e: G G G t Bilinear i.e. e(u a, v b ) = e(u, v) ab Non-degenerate:
Advertisements

1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Discrete Methods in Mathematical Informatics Lecture 3: Other Applications of Elliptic Curve 23h October 2012 Vorapong Suppakitpaisarn
An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
Russell Martin August 9th, Contents Introduction to CPABE Bilinear Pairings Group Selection Key Management Key Insulated CPABE Conclusion & Future.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Digital Signatures and Hash Functions. Digital Signatures.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
1 Identity-Based Encryption form the Weil Pairing Author : Dan Boneh Matthew Franklin Presentered by Chia Jui Hsu Date :
Introduction to Modern Cryptography Homework assignments.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Lecture 6: Public Key Cryptography
Public Key Model 8. Cryptography part 2.
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
By Abhijith Chandrashekar and Dushyant Maheshwary.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
An Efficient Identity-based Cryptosystem for
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
Great Theoretical Ideas in Computer Science.
Cyrtographic Security Identity-based Encryption 1Dennis Kafura – CS5204 – Operating Systems.
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Cryptography and Network Security Key Management and Other Public Key Cryptosystems.
Pairing Based Cryptography Standards Terence Spies VP Engineering Voltage Security
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
Pairing based IBE. Some Definitions Some more definitions.
Elliptic Curves Number Theory and Cryptography. A Pile of Cannonballs A Square of Cannonballs.
Key Management Network Systems Security Mort Anvari.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Key Management public-key encryption helps address key distribution problems have two aspects of this: – distribution of public keys – use of public-key.
Cryptography and Network Security Chapter 13
What is in a name? Identity-based cryptography. How public-key crypto works When you use public key cryptography, you can publish a value (public key)
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Practical Aspects of Modern Cryptography
An Introduction to Pairing Based Cryptography
Asymmetric-Key Cryptography
Identity Based Encryption
Boneh-Franklin Identity Based Encryption Scheme
Prelude to Public-Key Cryptography
SAKAWP: Simple Authenticated Key Agreement Protocol Based on Weil Pairing Authors: Eun-Jun Yoon and Kee-Young Yoo Src: International Conference on Convergence.
Attribute Based Encryption
Elliptic Curves.
Elliptic Curve Cryptography (ECC)
Key Management Network Systems Security
El Gamal and Diffie Hellman
CSCE 715: Network Systems Security
El Gamal and Diffie Hellman
Practical Aspects of Modern Cryptography
CSCE 715: Network Systems Security
Introduction to Modern Cryptography
Asymmetric Cryptographic Algorithms
The power of Pairings towards standard model security
Cryptography Lecture 26.
Diffie-Hellman Algorithm
Presentation transcript:

An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008

BOO!

Definitions Let G1 and G2 be abelian groups, written additively. Let n be a prime number such that [n]P for all P in G1 and G2 . Let G3 be a cyclic group of order n, written multiplicatively. Then a pairing is a map: (Bilinearity) (Non-Degeneracy)

Properties of Bilinear Pairings

Pairings on Elliptic Curves For our purposes, we will use the following: Let E be an elliptic curve defined over Fq. Let P be a fixed point on E of prime order n. Let k be the order of q mod n. Then k is also the smallest integer such that n | (q k - 1). k is called the embedding degree. Pairings will be of the form We’ll also require that e(P,P) ≠ 1, which can be done using distortion maps.

Computability and the Embedding Degree The Weil pairing and Tate pairing are examples of pairings on curves. Both are efficiently computable, provided that the embedding degree k is small. For a random elliptic curve, k ≈ n, which is too large. Theorem: If E is a supersingular elliptic curve, then k ≤ 6. (Recall E is supersingular if #E(Fpr) ≡ 1 mod p.) There are ordinary curves with low embedding degree (MNT curves have k = 2,3, or 4.)

Cryptographic Applications MOV attack- Transfers the discrete logarithm problem on E to a discrete logarithm in Fqk. Separating DDH from DH- Pairings can be used to show the Decision Diffie-Hellman problem is easier than the Diffie- Hellman problem on some curves. Identity based encryption- Public key encryption system where the users public key is based on his own identity, i.e. an email address. Short signatures- Signature schemes with signatures half the length of other signature schemes. Key exchange- A tripartite key exchange can be done in one round. Group structure of E- can be determined efficiently using pairings. Identity based signatures, Identity based key exchange……..

The MOV attack 1993 (Menezes, Okamoto, and Vanstone) Discrete Log (DL) Problem: Given P and Q = [c]P on E, find c. The attack: 1) Find S of order n on E, such that e(P,S)≠1. 2) Compute e(P,S) = ζ. 3) Compute e(Q,S) = e([c]P,S) = e(P,S)c = ζc. 4) Solve the DL in Fqk with ζ and ζc. Best algorithms for solving DL on elliptic curves is O(√ n ). In Fqk, there are subexponential methods (index calculus). Note, the attack is only efficient for small k.

Key Exchanges Diffie-Hellman Key exchange: 1) Alice selects secret a, sends [a]P to Bob. 2) Bob selects secret b, sends [b]P to Alice. 3) Each can compute the key [ab]P Extend to three parties?

One Round Tripartite Key Exchange 2000 (Joux) Alice sends [a]P to Bob and Chris Bob sends [b]P to Alice and Chris Chris sends [c]P to Alice and Bob All can compute the key e(P,P)abc. (For example, Alice computes e([b]P,[c]P)a.)

Security For the Diffie-Hellman key exchange, security is based on the (DH) problem: Given P, [a]P, and [b]P, compute [ab]P. For Joux’s tripartite exchange, security is based on the Bilinear Diffie-Hellman (BDH) problem: Given P, [a]P, [b]P, and [c]P, compute e(P,P)abc. Clearly, if one can solve the discrete log problem, then one can solve the Diffie-Hellman problem. Anyone who can solve the Diffie-Hellman problem can solve the bilinear Diffie-Hellman problem.

Separating DH and DDH The decision Diffie-Hellman (DDH) problem is: Given P, [a]P, b[P], and Q, determine if Q = [ab]P. The DDH problem is no harder than the DH problem. For awhile, there were no examples of groups where the DDH was strictly easier than the DH. Such groups are called “gap Diffie-Hellman groups”. Pairings make the DDH problem “easy”: 1) Compute e(P,Q) 2) Compute e([a]P,[b]P)=e(P,P)ab 3) Q=[ab]P if and only if the above two results agree. Thus, elliptic curves with small k are gap Diffie-Hellman groups. (Actually, the curve needs a distortion map so that e(P,P) ≠ 1.)

e(P, S) = e(P, [r]H1(M)) = e([r]P,H1(M)) = e(R,H1(M)). Short Signatures 2001 (Boneh, Lynn, and Schacham) Parameters: E,e,P, and a hash function Setup: Private key is a secret integer r. Public key is R = [r]P. To sign a message M, Alice computes S =[r]H1(M). To verify the signature, check if e(P, S) = e(R,H1(M)). e(P, S) = e(P, [r]H1(M)) = e([r]P,H1(M)) = e(R,H1(M)). To forge a signature on M, need to be able to find S = [r]H1(M), given P,R, and H1(M), which is a Diffie-Hellman problem in < P >.

Identity Based Encryption Using public key encryption, when Bob wants to send a message to Alice, he encrypts using Alice’s public key KA. Suppose the malicious Mallory substitutes her own public key KM for Alice’s. How does Bob know the key isn’t really Alice’s? One solution is to require a trusted authority (TA) to give certificates for public keys. Such a certificate has Alice’s ID and public key on it, signed by the TA. Bob can check the trusted authority’s signature on the certificate, and be assured of what Alice’s public key is. 1984- Shamir proposed using Alice’s ID information as her public key. (Such a key could be an email address, for example.) Bob then knows for sure who he is sending his message to.

Identity Based Encryption 2001 (Boneh and Franklin) Parameters: E, P, e, and two hash functions: Setup: Alice’s public key is KA = H1(IDA). The TA has private key s, and public key S=[s]P. TA gives Alice her secret decryption key DA = [s]KA. Encryption: To send M, Bob selects a random r and computes R = [r]P and c = M H2(e(KA, S)r). He sends Alice (R, c). Decryption: Alice uses her private key DA to calculate c H2(e(DA,R)) = c H2(e([s]KA, [r]P)) = c H2(e(KA, S)r) = M. Anyone other than Alice wishing to decrypt the message from (R, c) needs to be able to compute e(KA, S)r = e(KA, P)rs given P, KA, S, and R. This requires solving the bilinear Diffie-Hellman problem.

Miller’s algorithm to evaluate < P,Q >n Computing Pairings Miller’s algorithm to evaluate < P,Q >n 1. Given P,Q with order n, choose R with order n and R ≠ ∞,P,−Q,P−Q. 2. Write n in binary as n = (nt, ..., n1, n0). 3. Set f = 1, T = P and i = t. 4. If i < 0 then go to step 5. Else do the following: (a) Let l be the tangent line to E through T. Let v be the vertical line through 2T. (b) Set T = 2T. (c) Set (d) If ni = 1 then do the following: i. Let l be the line through T and P, and v the vertical line through T + P. ii. Set T = T + P. iii. Set (e) Set i = i − 1 and return to step 4 5. The desired value is < P,Q >n = f.

Verheul’s Theorem 2001 (Verheul) XTR: Let p be a prime p ≡ 2 mod 3 and n a prime number such that n | p2+p+1. Let g be a generator of μn, the group of nth roots of unity in . Let P be a point of order n on a supersingular E defined over with #E( ) = p2+p+1. Theorem: If an efficiently computable homomorphism can be found from μn to <P>, then the Diffie-Hellman problem can be efficiently solved in both μn and <P>.   What are the implications? My dissertation generalizes Verheul’s theorem.

Conclusion Active area of research (see Barreto’s Pairing Based Crypto Lounge or eprint.iacr.org) Many interesting/simpler protocols Not quite yet in SAGE Already commercially available -- Voltage Security needs to be studied and tested Other pairings (Ate, Eta, Eil, etc…) Pairings for hyperelliptic curves, abelian varieties etc…. Questions?

Thank You!