Identity Based Encryption from the Diffie-Hellman Assumption

Slides:



Advertisements
Similar presentations
Asymptotically Optimal Communication for Torus- Based Cryptography David Woodruff MIT Joint work with Marten van Dijk Philips/MIT.
Advertisements

Boneh-Franklin Identity-based Encryption. 2 Symmetric bilinear groups G = ágñ, g p = 1 e: G G G t Bilinear i.e. e(u a, v b ) = e(u, v) ab Non-degenerate:
An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
Lecturer: Moni Naor Foundations of Cryptography Lecture 15: Oblivious Transfer and Secure Function Evaluation.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
On the Security of the “Free-XOR” Technique Ranjit Kumaresan Joint work with Seung Geol Choi, Jonathan Katz, and Hong-Sheng Zhou (UMD)
Yan Huang, Jonathan Katz, David Evans University of Maryland, University of Virginia Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Public Key Cryptography
1 CPSC156: The Internet Co-Evolution of Technology and Society Lectures 19,20, and 21: April 5, 10, and 12, 2007 Cryptographic Primitives.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Black-Box Garbled RAM Sanjam Garg UC Berkeley Based on join works with
Blind Vision Shai Avidan, Moshe Butman Yuval Schwartz.
0x1A Great Papers in Computer Security
Slide 1 Vitaly Shmatikov CS 380S Yao’s Protocol. slide Yao’s Protocol uCompute any function securely … in the semi-honest model uFirst, convert.
Secure two-party computation: a visual way by Paolo D’Arco and Roberto De Prisco.
Improved Non-Committing Encryption with Application to Adaptively Secure Protocols joint work with Dana Dachman-Soled (Columbia Univ.), Tal Malkin (Columbia.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Succinct Functional Encryption: d Reusable Garbled Circuits and Beyond
Secure Computation Lecture Arpita Patra. Recap >> Improving the complexity of GMW > Step I: Offline: O(n 2 c AND ) OTs; Online: i.t., no crypto.
The Many Faces of Garbled Circuits MIT Vinod Vaikuntanathan.
What is in a name? Identity-based cryptography. How public-key crypto works When you use public key cryptography, you can publish a value (public key)
Bounded key-dependent message security
Network security Cryptographic Principles
The Exact Round Complexity of Secure Computation
The Exact Round Complexity of Secure Computation
Lower Bounds on Assumptions behind Indistinguishability Obfuscation
An Introduction to Pairing Based Cryptography
Topic 26: Discrete LOG Applications
Key Exchange References: Applied Cryptography, Bruce Schneier
Public-Key Cryptography and Message Authentication
iO with Exponential Efficiency
Boneh-Franklin Identity Based Encryption Scheme
B504/I538: Introduction to Cryptography
B504/I538: Introduction to Cryptography
Laconic Oblivious Transfer and its Applications
Basic Network Encryption
Introduction to security goals and usage of cryptographic algorithms
An Introduction to Pairing Based Cryptography
Course Business I am traveling April 25-May 3rd
CS/COE 1501 Recitation RSA Encryption/Decryption
Public Key Infrastructure
Topic 30: El-Gamal Encryption
Network Security Basics
Secure Multiparty RAM Computation in Constant Rounds
Cryptography for Quantum Computers
Public Key Cryptography Diffie-Hellman, Discrete Log, RSA
Cryptography Lecture 24.
Cryptography Lecture 25.
Cryptographic protocols 2016, Lecture 3 Key Exchange, CDH, DDH
Cryptographic protocols 2015, Lecture 3 Key Exchange, CDH, DDH
Intro to Cryptography Some slides have been taken from:
Appendix 5: Cryptography p
On the Efficiency of 2 Generic Cryptographic Constructions
Non-Trivial Witness Encryption and Null-
Chapter 3 - Public-Key Cryptography & Authentication
Basic Network Encryption
The power of Pairings towards standard model security
Cryptography Lecture 21.
Compact Adaptively Secure ABE for NC1 from k-Lin
Cryptography Lecture 23.
How to Use Charm Crypto Lib
Presentation transcript:

Identity Based Encryption from the Diffie-Hellman Assumption Sanjam Garg University of California, Berkeley (Joint work with Nico Döttling)

Private-Key Encryption 𝐾 𝐾 𝑐 𝑚 Alice Bob 𝑐= 𝐸𝑛𝑐(𝐾, 𝑚)

Public-Key Encryption [DH76,RSA78,GM82] Obtain 𝑝 𝑘 𝐵𝑜𝑏 𝑠 𝑘 𝐵𝑜𝑏 𝐸𝑛𝑐(𝑝 𝑘 𝐵𝑜𝑏 , 𝑚) 𝑚 Alice Bob

Identity-Based Encryption (IBE) [Shamir84, BF01] Identity of the recipient used as the public key 𝐸𝑛𝑐(𝑏𝑜𝑏@𝑔𝑚𝑎𝑖𝑙.𝑐𝑜𝑚, 𝑚) 𝑚 pp 𝑏𝑜𝑏@𝑔𝑚𝑎𝑖𝑙.𝑐𝑜𝑚 Alice Bob First construction based on pairings [BF01] CA/PKG 𝑆 𝐾 𝑏𝑜𝑏@𝑔𝑚𝑎𝑖𝑙.𝑐𝑜𝑚

Reduce the Gap! ABE [SW05] Hierarchical IBE IBE [Pairing, Lattices] Public-key crypto Public-Key Encryption Trapdoor Functions Private-key crypto Signatures OWF PRG PRF

Our Results Main result: IBE from Computational Diffie-Hellman Assumption (Fully-secure) Or, the hardness of Factoring Avoid impossibilities using non-black-box techniques.

Challenge? How do we it?

Compress two keys 𝑝𝑝 = 𝑝 𝑘 0 = 𝑝 𝑘 1 Alice Bob 𝑝𝑝 = 𝑝 𝑘 0 = 𝑝 𝑘 1 Encryption can be done to either 𝑝 𝑘 0 or 𝑝 𝑘 1 knowing just 𝑝𝑝 Decryption can be done using 𝑝 𝑘 0 , 𝑝 𝑘 1 and the right secret key 𝑝𝑝 looses information about 𝑝 𝑘 0 or 𝑝 𝑘 1 𝑝 𝑘 0 𝑝 𝑘 1 𝑝𝑝 Cara 𝑐= 𝐸𝑛 𝑐 2 (𝑝𝑝, 𝑏, 𝑚) 𝑚

How known schemes from stronger assumptions compress two keys? 𝑝 𝑘 0 or 𝑝 𝑘 1 are correlated Structured assumptions Impossibility results: Similar intuition 𝑝 𝑘 0 𝑝 𝑘 1 𝑝𝑝 Our goal: Compress Uncorrelated Keys!

Our Construction: Tools + Yao’s Garbled Circuits Hash with Encryption

Tool I: Hash with Encryption Three Algorithms: (𝐻,𝐸, 𝐷) H 𝑥 →ℎ ℎ is short (say 𝜆-bits) 𝑥 is 2𝜆-bits 𝐸 (ℎ,𝑖,𝑏), 𝑚 →𝑐 where 𝑖 ∈ 2𝜆 and 𝑏 ∈ 0,1 𝐷 𝑐, 𝑥 →𝑚 if 𝐻 𝑥 =ℎ and 𝑥 𝑖 = 𝑏 Security: Hard to compute 𝑥, 𝑥 ′ such that 𝐻 𝑥 = 𝐻 𝑥’ Security: 𝑥, 𝐸 (ℎ,𝑖,1− 𝑥 𝑖 ), 0 ≈𝑥, 𝐸 (ℎ,𝑖,1− 𝑥 𝑖 ), 1 Reminiscent of Witness Encryption [GGSW13] or laconic OT [CDGGMP17].

Tool I: Hash with Encryption Hash Parameters 𝐴 1,0 𝐴 2,0 𝐴 1,1 𝐴 2,1 … 𝐴 𝑛,0 𝐴 𝑛,1 H 𝑥 →ℎ ℎ= 𝑖∈[𝑛] 𝐴 𝑖, 𝑥 𝑖 𝐸 (ℎ,𝑖,𝑏), 𝑚 →𝑐= 𝐴 1,0 𝑠 𝐴 2,0 𝑠 𝐴 1,1 𝑠 𝐴 2,1 𝑠 … 𝐴 𝑛,0 𝑠 𝐴 𝑛,1 𝑠 , ℎ 𝑠 ⊕𝑚 D 𝑐, 𝑥 : Set ℎ 𝑠 = 𝑖∈[𝑛] 𝐴 𝑖, 𝑥 𝑖 𝑠 Security can be argued based on DDH 𝑔 𝑥 , 𝑔 𝑦 , 𝑔 𝑥𝑦 ≈ 𝑔 𝑥 , 𝑔 𝑦 , 𝑔 𝑟 𝐴 𝑖,1−𝑏 𝑠

Security: ( 𝐶 , 𝑙𝑎𝑏 𝑖, 𝑥 𝑖 )≈𝑆𝑖𝑚(𝐶 𝑥 ) Tool 2: Yao’s Garbled Circuits (𝐺𝑎𝑟𝑏𝑙𝑒,𝐸𝑣𝑎𝑙) [Yao86, AIK04, AIK05, LP09, BHR12] 𝐺𝑎𝑟𝑏𝑙𝑒 𝐶 → 𝐶 , 𝑙𝑎 𝑏 𝑖,0 , 𝑙𝑎 𝑏 𝑖,1 𝑖 𝐸𝑣𝑎𝑙 𝐶 , 𝑙𝑎𝑏 𝑖, 𝑥 𝑖 →𝐶(𝑥) Security: ( 𝐶 , 𝑙𝑎𝑏 𝑖, 𝑥 𝑖 )≈𝑆𝑖𝑚(𝐶 𝑥 )

How do we compress? 𝑝𝑝 = 𝐻 𝑝 𝑘 0 𝑝 𝑘 1 𝑝 𝑘 0 𝑝 𝑘 1 𝑝𝑝

How do we encrypt? 𝑐= 𝐸𝑛 𝑐 2 (𝑝𝑝, 𝑏, 𝑚) 𝑝 𝑘 0 𝑝 𝑘 1 𝑝𝑝 𝑃 𝑝𝑝, 𝑏, 𝑚 𝑥 Obfuscation Lens! How do we encrypt? Alice Bob 𝑝𝑝 = 𝐻 𝑝 𝑘 0 𝑝 𝑘 1 𝑝 𝑘 0 𝑝 𝑘 1 𝑝𝑝 𝑃 𝑝𝑝, 𝑏, 𝑚 𝑥 Abort if 𝑝𝑝 ≠𝐻 𝑥 . If 𝑏 = 0 then 𝑝𝑘 = 𝑥 1…𝜆 else 𝑝𝑘 = 𝑥 𝜆+1… 2𝜆 Output 𝐸𝑛𝑐(𝑝𝑘, 𝑚) Cara 𝑐= 𝐸𝑛 𝑐 2 (𝑝𝑝, 𝑏, 𝑚) 𝑚

How do we encrypt? 𝑐= 𝐸𝑛 𝑐 2 (𝑝𝑝, 𝑏, 𝑚) 𝑝 𝑘 0 𝑝 𝑘 1 𝑝𝑝 Alice Bob 𝑝𝑝 = 𝐻 𝑝 𝑘 0 𝑝 𝑘 1 𝑝 𝑘 0 𝑝 𝑘 1 𝑝𝑝 𝐸𝑛 𝑐 2 (𝑝𝑝, 𝑏, 𝑚) Circuit 𝐶 𝑚 (𝑝𝑘) = 𝐸𝑛𝑐 𝑝𝑘, 𝑚 𝐺𝑎𝑟𝑏𝑙𝑒 𝐶 𝑚 → 𝐶 , 𝑙𝑎 𝑏 𝑖,0 , 𝑙𝑎 𝑏 𝑖,1 𝑖 ∀ 𝑖∈ {𝑏𝜆+1, 𝑏𝜆+𝜆}, 𝛾∈{0,1} 𝑐 𝑖,𝛾 = 𝐸 𝑝𝑝,𝑖,𝛾 , 𝑙𝑎 𝑏 𝑖,𝛾 𝑐= 𝐶 , 𝑐 𝑖,𝛾 Cara 𝑐= 𝐸𝑛 𝑐 2 (𝑝𝑝, 𝑏, 𝑚) 𝑚

How to decrypt? Decrypt 𝑐= 𝐶 , 𝑐 𝑖,𝛾 using 𝑝 𝑘 1 , 𝑝 𝑘 2 and 𝑠 𝑘 𝛾 Recall 𝑐 1,0 = 𝐸 𝑝𝑝,𝛾𝜆+1,0 , 𝑙𝑎 𝑏 1,0 and 𝑐 1,1 =𝐸 𝑝𝑝,𝛾𝜆+1,1 , 𝑙𝑎 𝑏 1,1 which one can be decrypted? 𝑐 1,𝑝 𝑘 𝛾,1 which decrypts to 𝑙𝑎𝑏 1,𝑝 𝑘 𝛾,1 Similarly, for each 𝑖 decrypt 𝑐 𝑖,0 or 𝑐 𝑖,1 Evaluate( 𝐶 , {𝑙𝑎𝑏 𝑖,𝑝 𝑘 𝛾,𝑖 }) outputs 𝐸𝑛𝑐 𝑝 𝑘 𝛾 , 𝑚

Many new Applications New constructions of cryptographic primitives from weaker computation assumptions Two round MPC [GS17,GS18,BL18,GIS18] TDF [GD18] from CDH Deterministic Encryption [GGH18] from CDH Beats the efficiency of prior works even under DDH Two-round OT [DGHMW19] form CDH First PIR with polylogarithmic communication under DDH [DGMMIO19] (also rate 1-OT and more) Many new techniques: Can lead to several other improvements!

Thank You! Questions? ? ?