Allison Lewko TexPoint fonts used in EMF.

Slides:



Advertisements
Similar presentations
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption Allison Lewko Tatsuaki Okamoto Amit Sahai The.
Advertisements

Efficient Lattice (H)IBE in the standard model Shweta Agrawal, Dan Boneh, Xavier Boyen.
Short Non-interactive Zero-Knowledge Proofs
Adaptively Attribute-Hiding ( Hierarchical ) Inner Product Encryption
The Contest between Simplicity and Efficiency in Asynchronous Byzantine Agreement Allison Lewko The University of Texas at Austin TexPoint fonts used in.
Functional Encryption & Property Preserving Encryption
Efficient Non-interactive Proof Systems for Bilinear Groups Jens Groth University College London Amit Sahai University of California Los Angeles TexPoint.
Inaccessible Entropy Iftach Haitner Microsoft Research Omer Reingold Weizmann Institute Hoeteck Wee Queens College, CUNY Salil Vadhan Harvard University.
See you at the next conference! Hope you like our slides Hello everybody!
Dual System Encryption: Concept, History and Recent works Jongkil Kim.
Dual System Encryption: Realizing IBE and HIBE from Simple Assumptions Brent Waters.
The double-dimer model and skew Young diagrams Richard W. Kenyon David B. Wilson Brown University Microsoft Research TexPoint fonts used in EMF. Read the.
Support Vector Machines Joseph Gonzalez TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A AA A AA.
On Sketching Quadratic Forms Robert Krauthgamer, Weizmann Institute of Science Joint with: Alex Andoni, Jiecao Chen, Bo Qin, David Woodruff and Qin Zhang.
Ring Signatures of Sub- linear Size without Random Oracles Nishanth Chandran Jens Groth Amit Sahai University of California Los Angeles TexPoint fonts.
Convergent and Correct Message Passing Algorithms Nicholas Ruozzi and Sekhar Tatikonda Yale University TexPoint fonts used in EMF. Read the TexPoint manual.
Remote Timing Attacks -Rashmi Kukanur. Agenda  Timing Attacks  Case Study : –David Brumley –Dan Boneh  Defenses.
1 Conjunctive, Subset, and Range Queries on Encrypted Data Presenter: 陳國璋 Lecture Notes in Computer Science, 2007 Dan Boneh and Brent Waters.
Hypothesis Testing and Dynamic Treatment Regimes S.A. Murphy Schering-Plough Workshop May 2007 TexPoint fonts used in EMF. Read the TexPoint manual before.
The Search for Simple Symmetric Venn Diagrams Torsten Mütze, ETH Zürich Talk mainly based on [Griggs, Killian, Savage 2004] TexPoint fonts used in EMF.
1 Conjunctive, Subset, and Range Queries on Encrypted Data Dan Boneh Brent Waters Stanford University SRI International.
Hidden pairings and trapdoor DDH groups Alexander W. Dent Joint work with Steven D. Galbraith.
Coresets and Sketches for High Dimensional Subspace Approximation Problems Morteza Monemizadeh TU Dortmund Joint work with: D. Feldman, C. Sohler, D. Woodruff.
Cryptography in Subgroups of Z n * Jens Groth UCLA.
Uptake and elimination kinetics of toxicants in the real world Tjalling Jager & Elke Zimmer Dept. Theoretical Biology TexPoint fonts used in EMF. Read.
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
RSA Encryption Caitlin O’Dwyer. What is an RSA Number? An RSA number n is a number s.t. n=pq Where p and q are distinct, large, prime integers.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
On Rearrangements of Fourier Series Mark Lewko TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A AAA A AAA A A A A.
CS 3388 Working with 3D Vectors
Functional Encryption: An Introduction and Survey Brent Waters.
A New Approach on Bilinear Pairings and Its Applications Tatsuaki Okamoto.
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures Masayaki Abe, NTT Jens Groth, University College London Miyako Ohkubo, NICT.
The Sequence Memoizer Frank Wood Cedric Archambeau Jan Gasthaus Lancelot James Yee Whye Teh UCL Gatsby HKUST Gatsby TexPoint fonts used in EMF. Read the.
The Secrecy of Compressed Sensing Measurements Yaron Rachlin & Dror Baron TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Protecting Satellite Networks from Disassociation DoS Attacks Protecting Satellite Networks from Disassociation DoS Attacks (2010 IEEE International Conference.
1 Efficient Rule Matching for Large Scale Systems Packet Classification – A Case Study Alok Tongaonkar Stony Brook University TexPoint fonts used in EMF.
Privacy-Preserving Support Vector Machines via Random Kernels Olvi Mangasarian UW Madison & UCSD La Jolla Edward Wild UW Madison November 14, 2015 TexPoint.
The Square Variation of Rearranged Fourier Series Allison Lewko Mark Lewko Columbia University Institute for Advanced Study TexPoint fonts used in EMF.
David GalindoEric R. Verheul Computer Science DepartmentPWC Netherlands & University of MalagaUniversity of Nijmegen Microdata Sharing Via Pseudonymization.
Zero-Knowledge Argument for Polynomial Evaluation with Applications to Blacklists Stephanie Bayer Jens Groth University College London TexPoint fonts used.
C&O 355 Mathematical Programming Fall 2010 Lecture 5 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A.
Witness Encryption and Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption Craig Gentry IBM Allison Lewko Columbia Amit.
On sets of large doubling, ¤ (4) sets, and error-correcting codes Allison LewkoMark Lewko Columbia University Institute for Advanced Study TexPoint fonts.
1 Efficient Selective-ID IBE Without Random Oracle Dan Boneh Stanford University Xavier Boyen Voltage Security.
1 Compact Group Signatures Without Random Oracles Xavier Boyen and Brent Waters.
Constructing Verifiable Random Functions for Large Input Spaces Brent Waters Susan Hohenberger.
Privacy-Preserving Support Vector Machines via Random Kernels Olvi Mangasarian UW Madison & UCSD La Jolla Edward Wild UW Madison March 3, 2016 TexPoint.
Sequential Off-line Learning with Knowledge Gradients Peter Frazier Warren Powell Savas Dayanik Department of Operations Research and Financial Engineering.
Online/Offline Attribute-Based Encryption Brent WatersSusan Hohenberger Presented by Shai Halevi.
Outline Time series prediction Find k-nearest neighbors Lag selection Weighted LS-SVM.
On the Size of Pairing-based Non-interactive Arguments
Sampling of min-entropy relative to quantum knowledge Robert König in collaboration with Renato Renner TexPoint fonts used in EMF. Read the TexPoint.
Homework 3 As announced: not due today 
Risky Traitor Tracing and New Differential Privacy Negative Results
CS 154, Lecture 6: Communication Complexity
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces
CRYPTOGRAPHY קריפטוגרפיה Thu 15:45-18:15.
Functional Encryption: An Introduction and Survey
TexPoint fonts used in EMF.
Short Pairing-based Non-interactive Zero-Knowledge Arguments
New Direct Product results in Communication Complexity
Vector Spaces, Subspaces
CSE 321 Discrete Structures
CSE 321 Discrete Structures
The power of Pairings towards standard model security
Support Vector Machines
Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups Essam Ghadafi University of the West of England Jens Groth University.
Presentation transcript:

Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting Allison Lewko TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAAAAAA

Types of Bilinear Groups Prime Order: Composite Order:

Pros and Cons Composite Order Groups: Prime Order Groups: Smaller group order Orthogonal Subgroups Faster pairings Coprime Orders Simple assumptions Large group order Lack of extra structure Slow pairings

Goal Composite Order Groups Prime Order Groups

Prior State of Affairs Ad Hoc Results General translation [F10] [OT10] [BGN05] [LOSTW10] [KSW08] [BSW06] [W09] Ad Hoc Results General translation [F10]

Challenge Prime Order Groups Composite Order Groups Proof construction

What Features Do Proofs Need? Orthogonal Subgroups: Expand/Contract With Computational Assumptions Hidden Parameters: Public Parameters V|PP - random variable - has some entropy Internal View V Simulator Attacker

Building Orthogonality in Prime Order

Progress So Far ?

Exploiting Coprimality Chinese Remainder Theorem attacker simulator

Goal Replace coprimality, CRT Alternate mechanism for hiding parameters

Tool: Dual Pairing Vector Spaces [OT08,09]

Orthogonal Subspaces with DPVS Orthogonality across bases, not within!

Hidden Parameters with DPVS Can’t detect change! Not Everything! What can be determined about hidden vectors?

Expanding/Contracting with DPVS

Demonstration: Boneh-Boyen IBE

Sketch of Proof Dual System Encryption Subspace Assumption Decryption Failure! Dual System Encryption

Further Applications Lewko-Waters Unbounded HIBE Natural prime order construction Security from DLIN Simpler proof

Summary Dual pairing vector spaces 1. orthogonality 2. parameter hiding Subspace assumption 1. simulated subgroup decision 2. implied by DLIN General tools for translating dual system encryption proofs

Thanks for your attention. Questions?