Improving Privacy and Security in Multi- Authority Attribute-Based Encryption Advanced Information Security April 6, 2010 Presenter: Semin Kim.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Boneh-Franklin Identity-based Encryption. 2 Symmetric bilinear groups G = ágñ, g p = 1 e: G G G t Bilinear i.e. e(u a, v b ) = e(u, v) ab Non-degenerate:
Simulation-sound NIZK Proofs for a Practical Language and Constant Size Group Signatures Jens Groth University of California Los Angeles Presenter: Eike.
An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
Attribute-based Encryption
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Cryptography 101 How is data actually secured. RSA Public Key Encryption RSA – names after the inventors –Rivest, Shamir, and Adleman Basic Idea: Your.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Identity Based Encryption
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
1 CPSC156: The Internet Co-Evolution of Technology and Society Lectures 19,20, and 21: April 5, 10, and 12, 2007 Cryptographic Primitives.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
Identity Base Threshold Proxy Signature Jing Xu, Zhenfeng Zhang, and Dengguo Feng Form eprint Presented by 魏聲尊.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Katz, Stoica F04 EE 122: (More) Network Security November 5, 2003.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
Computer Science Public Key Management Lecture 5.
Introduction to Public Key Cryptography
By Jyh-haw Yeh Boise State University ICIKM 2013.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
How HTTPS Works J. David Giese. Hyper Text Transfer Protocol BrowserHTTP Server GET / HTTP/1.1 HOST: edge-effect.github.io HEADERS BODY HTTP/ OK.
Privacy Preserving Query Processing in Cloud Computing Wen Jie
1 AN EFFICIENT METHOD FOR FACTORING RABIN SCHEME SATTAR J ABOUD 1, 2 MAMOUN S. AL RABABAA and MOHAMMAD A AL-FAYOUMI 1 1 Middle East University for Graduate.
An Efficient Identity-based Cryptosystem for
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Cyrtographic Security Identity-based Encryption 1Dennis Kafura – CS5204 – Operating Systems.
An Ad Hoc Group Signature Scheme for Accountable and Anonymous Access to Outsourced Data Chuang Wang a,b and Wensheng Zhang a a Department of Computer.
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
1 Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal Omkant Pandey Amit Sahai Brent Waters UCLA SRI.
Attribute-Based Encryption with Non-Monotonic Access Structures
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Collusion-Resistant Group Key Management Using Attribute-
Darci Miyashiro Math 480 April 29, 2013
1 Public-Key Cryptography and Message Authentication.
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Visual Cryptography Advanced Information Security March 11, 2010 Presenter: Semin Kim.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Key-Policy Attribute-Based Encryption Present by Xiaokui.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Digital Signatures, Message Digest and Authentication Week-9.
多媒體網路安全實驗室 Anonymous ID Signature Scheme with Provable Identity Date: Reporter :Chien-Wen Huang 出處: 2008 Second International Conference on Future.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Encryption CS110: Computer Science and the Internet.
CS Modular Division and RSA1 RSA Public Key Encryption To do RSA we need fast Modular Exponentiation and Primality generation which we have shown.
Attribute-Based Encryption
Attribute-Based Encryption With Verifiable Outsourced Decryption.
28 September 2005 Secret Sharing Amin Y. Teymorian Department of Computer Science The George Washington University.
2011 IEEE TrustCom-11 Sushmita Ruj Amiya Nayak and Ivan Stojmenovic Regular Seminar Tae Hoon Kim.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Key Generation Protocol in IBC Author : Dhruti Sharma and Devesh Jinwala 論文報告 2015/12/24 董晏彰 1.
Online/Offline Attribute-Based Encryption Brent WatersSusan Hohenberger Presented by Shai Halevi.
Secret computation of purchase history data using somewhat homomorphic encryption Date: Reporter: 許哲毓.
多媒體網路安全實驗室 A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for mobile Networks 作者 :Zhiguo Wan,Kui Ren,Bart.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Boneh-Franklin Identity Based Encryption Scheme
Fuzzy Identity Based Encryption
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data An, Sanghong KAIST
Analysis of the RSA Encryption Algorithm
Attribute-Based Encryption
Oblivious Transfer.
Presentation transcript:

Improving Privacy and Security in Multi- Authority Attribute-Based Encryption Advanced Information Security April 6, 2010 Presenter: Semin Kim

OverviewOverview History of Attribute-Based Encryption Introduction of Paper Single Authority ABE Multi Authority ABE Conclusions -2/19-

OverviewOverview History of Attribute-Based Encryption Introduction of Paper Single Authority ABE Multi Authority ABE Conclusions -3/19-

History of Attributed-Based Encryption 1977, RSA  Rivest, Shamir and Adleman  Public/Private(Secret) Key 1985, IBE(Identity-Based Encryption)  Shamir  Allows for a sender to encrypt message to an identity without access to a public key certificate -4/19- Encrypted by Address, Name

History of Attributed-Based Encryption 2005, Fuzzy IBE  Sahai and Waters  A user having identity ω can decrypt a ciphertext with public key ω’. (|ω – ω’| < threshold distance)  Two interesting new applications Uses biometric identities. –Ex) a fingerprint of human can be changeable by pressure, angle and noisy Attributed-Based Encryption (ABE) –Suppose that a party wish to encrypt a document to all users that have a certain set of attributes –Ex) {School, Department, Course} -> {KAIST, ICE, Ph.D} -5/19-

OverviewOverview History of Attribute-Based Encryption Introduction of Paper Single Authority ABE Multi Authority ABE Conclusions -6/19-

Introduction of paper Title  Improving Privacy and Security in Multi-Authority Attribute-Based Encryption Conference  In CCS'09: Proceedings of the 16th ACM conference on Computer and communications security. ACM, New York, NY, USA, 2009 Authors  Melissa Chase (Microsoft Research)  Sherman S.M. Chow (New York University) -7/19-

Background of paper Motivation  In single authority Attribute-Based Encryption (ABE), there exist only one trusted server who monitors all attributes.  However, this may not be entirely realistic. Goal  To provide an efficient scheme to resolve the above problem by multi-authority ABE -8/23-

OverviewOverview History of Attribute-Based Encryption Introduction of Paper Single Authority ABE Multi Authority ABE Conclusions -9/19-

PreliminariesPreliminaries Basic Idea of ABE  Attributes of Human are different and changeable.  Thus, it is difficult to find a perfect set of attributes according to various situations. -10/23- Soccer Action Red Reading Soccer Red Reading AB Soccer Drama Blue Music

PreliminariesPreliminaries Lagrange Polynomial (from Wikipedia) -11/23-

Single Authority ABE Step One – Feldman Verifiable Secret Sharing  Init: First fix y ← Z q, where q is a prime.  Secret Key (SK) for user u: Choose a random polynomial p such that p(0) = y and the degree of p is d-1. SK: {D i = g p(i) } ∀ i ∈ A u,where A u is a attribute set of user u and g is a costant  Encryption: E = g y m, where m is a message  Decryption: Use d SK elements D i to interpolate to obtain Y = g p(0) = g y. Then m = E/Y -12/23-

Single Authority ABE Step Two – Specifying Attributes  Let G 1 be a cyclic multiplicative group of prime order q generated by g.  Let e(, ) be a bilinear map such that g ∈ G1, and a, b ∈ Z q, e(g a, g b ) = e(g, g) ab  Init: First fix y, t 1,…,t n ←Zq, Let Y = e(g, g) y  SK for user u: Choose a random polynomial p such that p(0) = y.. SK: {D i = g p(i)/ti } ∀ i ∈ A u  Encryption for attribute set A c : E=Ym and {E i = g ti } ∀ i ∈ A C  Decryption: For d attributes i ∈ A c ∩A u, compute e(E i, D i ) = e(g, g) p(i). Interpolate to find Y = e(g, g) p(0) = e(g, g) y. Then m = E/Y. -13/23-

Single Authority ABE Step Three – Multiple Encryptions  To encrypt multiple times without the decryptor needing to get a new secret key each time.  Init: First fix y, t 1, …, t n ← Z q.  Public Key (PK) for system: T 1 = g t1 … T n = g tn, Y = e(g, g) y. PK = {T i } 1 ≤ I ≤ n,Y  SK for user u: Choose a random polynomial p such that p(0) = y. SK: {D i = g p(i)/ti } ∀ i ∈ A u  Encryption for attribute set A c : E=Y s =e(g, g) ys m and {E i = g tis } ∀ i ∈ A C  Decryption: For d attributes i ∈ A c ∩A u, compute e(E i, D i ) = e(g, g) p(i)s. Interpolate to find Y s = e(g, g) p(0)s = e(g, g) ys. Then m = E/Y s. -14/23-

OverviewOverview History of Attribute-Based Encryption Introduction of Paper Single Authority ABE Multi Authority ABE Conclusions -15/19-

Multi Authority Attribute Based Encryption Encryption  Attribute Set {A 1 C, …, A N C ), pick s ∈ R Zq.  Return (E0 = mY s, E1 = g 2 s, {C k, i = T s k,i } Decryption  For each authority k ∈ [1, …, N] For any d k attributes i ∈ A k C ∩ A k u, pair up S k,i and C k,i compute e(S k,i, C k,i ) = e(g 1, g 2 ) spk(i). Interpolate all the values e(g 1, g 2 ) spk(i) to get P k = e(g 1, g 2 ) spk(i) = e(g 1, g 2 ) s(vk- ∑Rkj)  Multiply Pk’s together to get Q = e(g 1, g 2 ) s(vk- ∑Ru) = Ys/ e(g 1 Ru, g 2 s )  Compute e(Du, E1)Q = e(g 1 Ru, g 2 s )Q = Ys  Recover m by E 0 /Y s -16/23-

OverviewOverview History of Attribute-Based Encryption Introduction of Paper Single Authority ABE Multi Authority ABE Conclusions -17/19-

ConclusionConclusion Contribution  Multi-authority attributed-based encryption enables a more realistic deployment of attribute-based access control. Novelty  An attribute-based encryption scheme without the trusted authority was proposed -18/19-

Q&AQ&A Thank you! Any questions? -19/19-