Encryption Public-Key, Identity-Based, Attribute-Based.

Slides:



Advertisements
Similar presentations
Boneh-Franklin Identity-based Encryption. 2 Symmetric bilinear groups G = ágñ, g p = 1 e: G G G t Bilinear i.e. e(u a, v b ) = e(u, v) ab Non-degenerate:
Advertisements

Securing Critical Unattended Systems with Identity Based Cryptography A Case Study Johannes Blömer, Peter Günther University of Paderborn Volker Krummel.
Probabilistic Public Key Encryption with Equality Test Duncan S. Wong Department of Computer Science City University of Hong Kong Joint work with Guomin.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
11 Provable Security. 22 Given a ciphertext, find the corresponding plaintext.
CIS 5371 Cryptography 3b. Pseudorandomness.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
RIKE Using Revocable Identities to Support Key Escrow in PKIs Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao State Key Laboratory of Information Security,
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Certificateless encryption and its infrastructures Dr. Alexander W. Dent Information Security Group Royal Holloway, University of London.
Identity Based Encryption
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
1 Identity-Based Encryption form the Weil Pairing Author : Dan Boneh Matthew Franklin Presentered by Chia Jui Hsu Date :
A Designer’s Guide to KEMs Alex Dent
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Strongly Secure Certificateless Encryption Alexander W. Dent Information Security Group
1 CPSC156: The Internet Co-Evolution of Technology and Society Lectures 19,20, and 21: April 5, 10, and 12, 2007 Cryptographic Primitives.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Key Distribution CS 470 Introduction to Applied Cryptography
1 CIS 5371 Cryptography 9. Data Integrity Techniques.
Building an Encrypted and Searchable Audit Log 11th Annual Network and Distributed Security Symposium (NDSS '04); 2004 February 5-6; San Diego; CA. Presented.
1 Introduction to Information Security , Spring 2015 Lecture 7: Applied cryptography: asymmetric Eran Tromer Slides credit: John Mitchell, Stanford.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Dan Boneh Public Key Encryption from trapdoor permutations Public key encryption: definitions and security Online Cryptography Course Dan Boneh.
8. Data Integrity Techniques
Functional Encryption: An Introduction and Survey Brent Waters.
Cryptography Lecture 8 Stefan Dziembowski
On the Risks of IBE Himanshu Khurana and Jim Basney NCSA, University of Illinois International Workshop on Applied PKC (IWAP), Dalian, China, Nov 2006.
An Efficient Identity-based Cryptosystem for
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 3 Public-Key Cryptography and Key Management.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
Cyrtographic Security Identity-based Encryption 1Dennis Kafura – CS5204 – Operating Systems.
James Higdon, Sameer Sherwani
1 Lect. 13 : Public Key Encryption RSA ElGamal. 2 Shamir Rivest Adleman RSA Public Key Systems  RSA is the first public key cryptosystem  Proposed in.
Computer Science CSC 774 Advanced Network Security Topic 2.6 ID Based Cryptography #2 Slides by An Liu.
Software Security Seminar - 1 Chapter 5. Advanced Protocols 조미성 Applied Cryptography.
IND-CPA and IND-CCA Concepts Summary  Basic Encryption Security Definition: IND-CPA  Strong Encryption Security Definition: IND-CCA  IND-CPA, IND-CCA.
Review of Certificateless Cryptography Yu-Chi Chen.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Christof Paar and Jan Pelzl Chapter 8 –
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
Sensor Network Security through Identity-Based Encryption
Overview of Cryptography & Its Applications
Códigos y Criptografía Francisco Rodríguez Henríquez Códigos y Criptografía Francisco Rodríguez Henríquez CINVESTAV
ECE509 Cyber Security : Concept, Theory, and Practice Key Management Spring 2014.
Pairing Based Cryptography Standards Terence Spies VP Engineering Voltage Security
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Homework #1 J. H. Wang Oct. 2, 2013.
Pairing based IBE. Some Definitions Some more definitions.
Dan Boneh Introduction Course Overview Online Cryptography Course Dan Boneh.
1/28 Chosen-Ciphertext Security from Identity- Based Encryption Jonathan Katz U. Maryland Ran Canetti, Shai Halevi IBM.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Online/Offline Attribute-Based Encryption Brent WatersSusan Hohenberger Presented by Shai Halevi.
INCS 741: Cryptography Overview and Basic Concepts.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Homework #1 J. H. Wang Oct. 9, 2012.
Identity Based Encryption
Boneh-Franklin Identity Based Encryption Scheme
Group theory exercise.
Presentation transcript:

Encryption Public-Key, Identity-Based, Attribute-Based

I. Public key encryption and security concepts Eve 2 Use encryption to prevent eavesdropping and achieve confidentiality.

Public key encryption 3 Bob  generates pair of public key pk B and secret key sk B  makes pk B public  decrypts with sk B Alice  encrypts message m with pk B  sends encrypted message/ciphertext c

Public-key encryption schemes 4

Negligible functions 5

Security concepts 6 Security concepts must specify  goals of adversary  resources of adversary  additional information available to adversary.  adversaries should learn almost nothing about plaintext given a ciphertext  adversaries will be probabilistic polynomial time algorithms.  adversaries known complete specifications of encryption schemes (Kerckhoff’s principle)  additional information formalized with chosen plaintext and chosen ciphertext attacks

The CPA game 7

8

CPA security 9

The CCA game 10

CCA security 11 Observation CPA security does not imply CCA security.

PKC and reality 12 Certification Authority (CA)

Certificates and certification authorities 13  require significant organizational and technical overhead  require complex data management  their complexity can become a threat to security

Public key vs. identity-based encryption 14  PKE requires special pairs of keys, not all bit strings can be public keys  in IBE every bit string or identity can be public key  identities can already be certified, e.g. passport numbers  may simplify necessary infrastructure  IBE introduced in 1984 by A. Shamir  first fully functional realization in 2001 by Boneh, Franklin  can be generalized to attribute-based encryption

Identity-based enryption 15 Private Key Generator

Identity-based enryption 16

Identity-based enryption 17 Private Key Generator

Security concepts 18 Security concepts must specify  goals of adversary  resources of adversary  additional information available to adversary.  adversaries should learn almost nothing about plaintext given a ciphertext  adversaries will be probabilistic polynomial time algorithms.  adversaries known complete specifications of encryption schemes (Kerckhoff’s principle)  additional information formalized with chosen plaintext and chosen ciphertext attacks

IBE security – additional requirements 19  adversaries should learn almost nothing about plaintext given a ciphertext  adversaries will be probabilistic polynomial time algorithms.  adversaries known complete specifications of encryption schemes (Kerckhoff’s principle)  additional information formalized with chosen plaintext and chosen ciphertext attacks  adversary may know private keys to many identities Challenge Exponentially (in n) many private keys depend on master secret msk of polynomial (in n) length.

The CPA game 20

The CCA game 21

IBE security 22

Power of PKG 23 Private Key Generator PKG is  very powerful  attractive target for attacks Possible solutions  secure protocols  distributed realization

PKG via secure protocols 24 Private Key Generator

Distributed PKG 25

Boneh-Franklin IBE and pairings 26  uses one basic primitive – bilinear pairings  concrete realization with groups on elliptic curves  examples are Weil, Tate, Eta, Ate pairing  but can be described with generic pairings  share this feature with most techniques in IBC

Boneh-Franklin IBE and pairings 27

Simplified Boneh-Franklin IBE 28

Boneh-Franklin IBE - correctness 29

Boneh-Franklin IBE 30

Boneh-Franklin IBE - correctness 31