Identity Based Encryption

Slides:



Advertisements
Similar presentations
Efficient Lattice (H)IBE in the standard model Shweta Agrawal, Dan Boneh, Xavier Boyen.
Advertisements

Boneh-Franklin Identity-based Encryption. 2 Symmetric bilinear groups G = ágñ, g p = 1 e: G G G t Bilinear i.e. e(u a, v b ) = e(u, v) ab Non-degenerate:
ONE WAY FUNCTIONS SECURITY PROTOCOLS CLASS PRESENTATION.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
Encryption Public-Key, Identity-Based, Attribute-Based.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Foundations of Cryptography Lecture 13 Lecturer: Moni Naor.
Cramer & Shoup Encryption Cramer and Shoup: A practical public key crypto system provably secure against adaptive chosen ciphertext attack. Crypto 1998.
New Efficient Searchable Encryption Schemes from Bilinear Pairings Author:Chunxiang Gu and Yuefei Zhu International Journal of Network Security, 2007 Presenter:
7. Asymmetric encryption-
1 IDENTITY BASED ENCRYPTION SECURITY NOTIONS AND NEW IBE SCHEMES FOR SAKAI KASAHARA KEY CONSTRUCTION N. DENIZ SARIER.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes Presenter: 陳國璋 EUROCRYPT'99, LNCS 1592, pp , By Pascal Paillier Efficient.
1 Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
1 Identity-Based Encryption form the Weil Pairing Author : Dan Boneh Matthew Franklin Presentered by Chia Jui Hsu Date :
1 Queries on Encrypted Data Dan Boneh Brent Waters Stanford UniversitySRI.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
1 Conjunctive, Subset, and Range Queries on Encrypted Data Dan Boneh Brent Waters Stanford University SRI International.
Strongly Secure Certificateless Encryption Alexander W. Dent Information Security Group
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
1 CIS 5371 Cryptography 9. Data Integrity Techniques.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Dan Boneh Public Key Encryption from trapdoor permutations The RSA trapdoor permutation Online Cryptography Course Dan Boneh.
1 Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys Dan Boneh, Craig Gentry, and Brent Waters.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Dan Boneh Public Key Encryption from trapdoor permutations Public key encryption: definitions and security Online Cryptography Course Dan Boneh.
8. Data Integrity Techniques
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2014 Nitesh Saxena.
Cryptography Lecture 8 Stefan Dziembowski
(Multimedia University) Ji-Jian Chin Swee-Huay Heng Bok-Min Goi
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Cyrtographic Security Identity-based Encryption 1Dennis Kafura – CS5204 – Operating Systems.
1 Lect. 13 : Public Key Encryption RSA ElGamal. 2 Shamir Rivest Adleman RSA Public Key Systems  RSA is the first public key cryptosystem  Proposed in.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Computer Science CSC 774 Advanced Network Security Topic 2.6 ID Based Cryptography #2 Slides by An Liu.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
Cryptography Lecture 9 Stefan Dziembowski
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
By Yernar.  Background  Key generation  Encryption  Decryption  Preset Bits  Example.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
8: Network Security 8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Information Security CS 526
Pairing Based Cryptography Standards Terence Spies VP Engineering Voltage Security
Attacking RSA Brian Winant Reference “Twenty Years of Attacks on the RSA Cryptosystem” By Dan Boneh In Notices of the American Mathematical.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
A new provably secure certificateless short signature scheme Authors: K.Y. Choi, J.H. Park, D.H. Lee Source: Comput. Math. Appl. (IF:1.472) Vol. 61, 2011,
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Attribute-Based Encryption
Pairing based IBE. Some Definitions Some more definitions.
A New Provably Secure Certificateless Signature Scheme Date: Reporter:Chien-Wen Huang 出處 :2008 IEEE International Conference on Communications.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
1 Efficient Selective-ID IBE Without Random Oracle Dan Boneh Stanford University Xavier Boyen Voltage Security.
1/28 Chosen-Ciphertext Security from Identity- Based Encryption Jonathan Katz U. Maryland Ran Canetti, Shai Halevi IBM.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
The Boneh-Franklin IBE. Simplified Boneh-Franklin IBE 2.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
What is in a name? Identity-based cryptography. How public-key crypto works When you use public key cryptography, you can publish a value (public key)
Identity Based Encryption
Boneh-Franklin Identity Based Encryption Scheme
Certificateless signature revisited
The power of Pairings towards standard model security
Presentation transcript:

Identity Based Encryption Based on a paper by Dan Boneh and Matthew Franklin Presented by: Saar Ron

Outline Introduction to IBE Applications of IBE Definition of IBE Security Properties The Boneh-Franklin IBE Scheme

Outline Introduction to IBE Applications of IBE Definition of IBE Security Properties The Boneh-Franklin IBE Scheme

What is IBE? IBE is a public-key encryption system in which an arbitrary string can be used as the public key

History of IBE The concept was formulated by Adi Shamir in 1984 First usable IBE schemes in 2001 Boneh and Franklin [crypto 2001, SIAM J. of computing 2003] Cocks [IMA International Conference on Cryptography and Coding 2001]

email encrypted using public key: I am “alice@hotmail.com” An example of IBE email encrypted using public key: “alice@hotmail.com” I am “alice@hotmail.com” Private key CA/PKG master-key

Outline Introduction to IBE Applications of IBE Definition of IBE Security Properties The Boneh-Franklin IBE Scheme

Applications of IBE Bob encrypts mail with pub-key = “alice@hotmail” Easy to use: no need for Bob to lookup Alice’s cert Bob can send mail to Alice even if Alice has no cert Bob encrypts with pub-key = “alice@hotmail || current-date” Short lived private keys: revocation + mobility Bob can send mail to be read at future date Credentials: embed user credentials in public key Encrypt with: “alice@hotmail || date || clearance=secret” Alice can decrypt only if she has secret clearance on given date Easy to grant and revoke credentials at PKG

Outline Introduction to IBE Applications of IBE Definition of IBE Security Properties The Boneh-Franklin IBE Scheme

Definition of IBE (1) Setup Extract input: a security parameter t output: params and master-key Extract input: params, master-key, and ID∈{0,1}* output: dID

Definition of IBE (2) Encrypt Decrypt input: params, ID∈{0,1}*, M∈M output: C Decrypt input: params, dID, C ∈C output: M

Is the following RSA based IBE scheme correct? Setup (t) randomly picks two t-bit primes p, q params = 〈n=pq, H〉 master-key = 〈p,q〉 Encrypt (〈n,H 〉,ID,M) = MH(ID) mod n Extract (〈n,H〉, 〈p,q〉, ID) = dID such that dID H(ID) = (p-1)(q-1) mod n Decrypt (〈n,H〉,ID,C) = CdID mod n

Outline Introduction to IBE Applications of IBE Definition of IBE Security Properties The Boneh-Franklin IBE Scheme

Security properties of Crypto schemes Formalization of the notion that no algorithm breaks a crypto system defined via a game between an Adversary and a Challenger no polynomially bound Adversary wins the game with non-negligible advantage

Security demands for IBE Semantic security against an adaptive chosen ciphertext attack No polynomially bound adversary wins the following game with non-negligible advantage

The Game (1) The Challenger The Adversary issues m queries chooses a security parameter t and runs Setup keeps the master-key gives the Adversary params The Adversary issues m queries extraction query 〈IDi〉 decryption query 〈IDi , Ci〉

The Game (2) The Adversary picks M0, M1 and a public key ID The Challenger picks a random b∈{0,1} and sends C=Encrypt(params, ID, Mb) The Adversary issues n additional queries extraction query 〈IDi〉 decryption query 〈IDi , Ci 〉

The Game (3) The Adversary outputs b’ The Adversary wins if b=b’ | P (the attacker wins) – ½ | should be negligible

A weaker notion: Semantic Security Almost the same game, but with a small difference: The adversary is not allowed to use decryption queries

Outline Introduction to IBE Applications of IBE Definition of IBE Security Properties The Boneh-Franklin IBE Scheme

Bilinear maps (1) e : G1× G1 → G2 Bilinear Map G1 and G2 are cyclic groups of prime order p Bilinear Map for all x, y ∈ G1 and for all a, b ∈ Zp e(ax,by) = e(x,y)ab

Bilinear maps (2) Non-Degenerate Computable There exists x,y ∈ G1 such that e(x,y) ≠ 1G2 Computable computing e(x,y) for any x,y ∈ G1 is efficient

The Boneh-Franklin IBE Scheme (1) Setup (t) uses t to generate a prime q generates cyclic groups G1, G2 of order q, and a bilinear map e: G1×G1 → G2 chooses an arbitrary generator g∈G1 picks a random s∈Zq* and set P= sg picks two crypto hash functions: H1:{0,1}* →G1* and H2:G2 → {0,1}n

The Boneh-Franklin IBE Scheme (2) Setup (t) M = {0,1}n C = G1* × {0,1}n params = q, G1, G2, e, n, g, P, H1, H2 master-key = s Extract (ID) dID=s H1(ID)

The Boneh-Franklin IBE Scheme (3) Encrypt (M) chooses a random r∈Zq* C=〈rg, M⊕H2(e(H1(ID),P)r〉 Decrypt(C=(U,V)) V ⊕ H2(e(dID,U)) e(sH1(ID), rg) = e(H1(ID), g)sr = e(H1(ID), sg)r = e(H1(ID),P)r

The security assumption Bilinear Diffie-Hellman Problem (BDHP) in 〈G1, G2, e〉 given a generator g of G1 and three elements ag, bg, cg ∈ G1 for random a, b, c in Zp, compute e(g,g)abc Security Assumption: BDHP is hard

The security of BF-IBE It can be shown that there is a reduction between breaking the BF-IBE in the Semantic Security model and the BDHP problem The question: How can we improve BF-IBE so this will be true in the Semantic Security Against an Adaptive Chosen Ciphertext Attack model?

The answer: The Fujisaki-Okamoto technique εpk(M) – The encryption of M using the public key pk Fujisaki-Okamoto: If εpk(M) is a one-way encryption scheme, the hybrid scheme εpkhy(M) = <εpk(σ;H3(σ,M)),H4(σ)⊕M> is secure in the Semantic Security Against an Adaptive Chosen Ciphertext Attack model

Improving BF-IBE (1) Setup (t) Extract (ID) As before params = q, G1, G2, e, n, g, P, H1, H2, H3, H4 Extract (ID)

Improving BF-IBE (2) Encrypt (M) Decrypt(C=(U,V,W)) Chooses a random σ∈{0,1}n r = H3(σ,M) C = <rP, σ⊕H2(e(H1(ID),P)r, M⊕H4(σ(> Decrypt(C=(U,V,W)) σ = V ⊕ H2(e(dID,U)) M = W ⊕ H4(σ)

Open issues Authentication of the message receiver to the PKG (Private Key Generator) The IBE system is an escrowed system Key Revocation

That's all, folks