Universal Re-encryption: For Mix-Nets

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Chapter 11: Cryptography
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Digital Signatures and Hash Functions. Digital Signatures.
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Reusable Anonymous Return Channels
Session 4 Asymmetric ciphers.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
Parallel Mixing Philippe Golle, PARC Ari Juels, RSA Labs.
Cryptographic Technologies
1 Digital Signatures CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 12, 2004.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Introduction to Signcryption November 22, /11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made.
UMBC Protocol Meeting 10/01/03 Universal Re-encryption: For Mix-Nets and Other Applications (to appear CT-RSA ’04) Paul Syverson NRL Markus Jakobsson Ari.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Public Key Encryption that Allows PIR Queries Dan Boneh 、 Eyal Kushilevitz 、 Rafail Ostrovsky and William E. Skeith Crypto 2007.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Cryptanalysis. The Speaker  Chuck Easttom  
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Masud Hasan Secue VS Hushmail Project 2.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Chapter 4: Intermediate Protocols
Optimistic Mixing for Exit-Polls Philippe Golle, Stanford Sheng Zhong, Yale Dan Boneh, Stanford Markus Jakobsson, RSA Labs Ari Juels, RSA Labs.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Cryptography, Authentication and Digital Signatures
Public-Key Cryptography CS110 Fall Conventional Encryption.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Authenticated Key Exchange I. Definitions I. MAP I. matching conversations II. oracles II. (I)KA II. AKEP2 III. AKEP2 Security I. Session Keys II. Perfect.
Jun Luo Panos Papadimitratos Jean-Pierre Hubaux By: Mai Ali Sayed.
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
Software Security Seminar - 1 Chapter 4. Intermediate Protocols 발표자 : 이장원 Applied Cryptography.
Private key
Almost Entirely Correct Mixing With Applications to Voting Philippe Golle Dan Boneh Stanford University.
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
Key Management and Distribution Anand Seetharam CST 312.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Encryption Encryption: Transforms Message so that Interceptor Cannot Read it –Plaintext (original message) Not necessarily text; Can be graphics, etc.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Cryptographic methods. Outline  Preliminary Assumptions Public-key encryption  Oblivious Transfer (OT)  Random share based methods  Homomorphic Encryption.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Software Security Seminar - 1 Chapter 2. Protocol Building Blocks 발표자 : 최두호 Applied Cryptography.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Searchable Encryption in Cloud
Untraceable Electronic Mail, Return addresses, and Digital Pseudonyms
Presentation transcript:

Universal Re-encryption: For Mix-Nets

Introduction We introduce a new cryptographic technique that we call universal re-encryption. A conventional cryptosystem that permits re- encryption, such as ElGamal, does so only for a player with knowledge of the public key corresponding to a given ciphertext. In contrast, universal re-encryption can be done without knowledge of public keys.

Purpose of the Mixnets Called upon to enable players to communicate with one another through channels that are externally anaonymous. No Traffic analysis possible. With the help of Universal Re-encryption the mixnet has servers that has no keying material. Cumbersome requirements of key generation,key distribution and key management are dispensed with.

What is a mixnet???

What does a mix network do? cryptographic construction that invokes a set of servers to establish private communication channels . mix network accepts as input a collection of ciphertexts, and outputs the corresponding plaintexts in a randomly permuted order. The main privacy property desired of such a mixnet is that the permutation matching inputs to outputs should be known only to the mixnet, and no one else. An adversary should be unable to guess which input ciphertext corresponds to an output plaintext any more effectively than by guessing at random.

What does a mix network do?

What does a mix network do? The inputs are submitted encrypted under the public-key of the mixnet. (The corresponding private key is held in distributed form among the servers.) Each server in turn takes the set of ciphertexts output by the previous server, and re-encrypts and mixes them. The set of ciphertexts produced by the last server may be decrypted by a quorum of mix servers to yield plaintext outputs. Privacy in this mixnet construction derives from the fact that the ciphertext pair (C,C’) is indistinguishable from a pair (C,R) for a random ciphertext R to any adversary without knowledge of the private key.

Universal Encryption We introduce the term universal encryption to mean re-encryption without knowledge of the public key under which a ciphertext was computed. The novelty in our proposal is that re-encryption neither requires nor yields knowledge of the public key under which a ciphertext was computed. Mix networks based on universal re-encryption dispense with the cumbersome protocols that traditional mixnets require in order to establish and maintain a shared private key.

Universal re-encryption for mixnets Every input to the mixnet is encrypted under the public key of the recipient for whom it is intended. Thus, unlike standard re-encryption mixnets, universal mixnets accept ciphertexts encrypted under the individual public keys of receivers, rather than encrypted under the unique public key of the mix network. These ciphertexts are universally re-encrypted and mixed by each server. The output of a universal mixnet is a set of ciphertexts. Recipients can retrieve from the set of output ciphertexts those addressed to them, and decrypt them.

Organization of the presentation 1.Distinction between Universal mixnet and the Standard mixnet. 2.Semnatic security for universal encryption. 3.Construction of assymetric universal mixnet. 4.Security properties of our system. 5.Proposal of a hybrid variant of our universal mixnet construction. 6.Conclusion.

PART 1.

Universal Mixnets: Properties Universal mixnets hold no keying material. A universal mixnet operates without a monolithic public key and thus dispenses at the server level with the complexities of key generation, key distribution, and key maintenance. More efficient and flexible than a traditional mixnet. Universal mixnet allows rapid reconfiguration.

Universal Mixnets: Properties Universal mixnets guarantee forward anonymity. Absence of shared keys. Assumption--servers do not store the permutations or re-encryption factors they used to process their inputs. In contrast, if the keying material of a standard mix is revealed, an adversary with transcripts from previous mix sessions can compromise the privacy of users.

Universal Mixnets: Properties Universal mixnets do not support escrow capability. Flip side of forward anonymity. Escrow can be achieved if every server involved in mixing remembers how it permuted its input and is willing to reveal that permutation. Drawback as far as law enforcement is concerned . Escrow is possible in a traditional mix provided the shared key can be reconstructed.

Universal Mixnets: Properties and Applications Efficiency. Half as efficient as standard El Gamal. Requires twice as much as storage. Requires twice as much as computation. Big Drawback----receivers must attempt to decrypt all output items in order to identify the messages intended for them.

Universal Mixnets:Application Anonymizing RFID tags An RFID tag is a small device that is used to locate and identify physical objects very limited processing ability. allow devices to read and write to their memory. Examples of uses of RFID tags include the theft-detection tags attached to consumer items in stores and the plaques mounted on car windshields for automated toll payment. Due to the projected decrease in the cost of RFID tags, their use is likely to extend in the near future to a wide range of general consumer items, including possibly even banknotes. concerns of an emerging privacy threat.

PART 2.

Semantic security for universal encryption A critical security property for providing privacy in a mix network is that of semantic security. Loosely speaking, this property stipulates the infeasibility of learning any information about a plaintext from a corresponding ciphertext

Semantic security for universal encryption Distinguishability of ciphertexts The adversary is able to distinguish with probability greater than ½ , encryptions of different plaintexts, or encryptions of a given plaintext and a random string. A public key cryptosystem in which the adversary cannot (in polynomial time) distinguish ciphertexts, under certain computational assumptions hold, is said to achieve semantical security.

Universal re-encryption based on ElGamal. The basic idea is simple: We append to a standard ElGamal ciphertext a second ciphertext on the identity element. By exploiting the algebraic homomorphism of ElGamal, we can use the second ciphertext to alter the encryption factor in the first ciphertext. As a result, we can dispense with knowledge of the public key in the re-encryption operation.

Universal re-encryption based on ElGamal.

Universal re-encryption based on ElGamal.

Universal re-encryption based on ElGamal.

Universal re-encryption based on ElGamal. Let E[m] loosely denote the ElGamal encryption of a plaintext m (under some key). In a universal cryptosystem, a ciphertexts on message m consists of a pair [E[m];E[1]]. ElGamal possesses a homomorphic property, namely that E[a] * E[b] = E[ab] . Thanks to this property, the second component can be used to re-encrypt the first without knowledge of the associated public key.

Universal re-encryption based on ElGamal.

Universal re-encryption based on ElGamal. Observe that the ciphertext size and the computational costs for all algorithms are exactly twice those of the basic ElGamal cryptosystem.

PART 3.

Construction of assymetric universal mixnet We consider a number of senders who wish to send messages to recipients in such a way that the communication is concealed from everyone but the sender and recipient themselves. OR establish channels between senders and receivers that are externally anonymous.

Construction of assymetric universal mixnet ASSUMPTIONS: every recipient has an ElGamal private/public key pair (x,y = gx). 2. every sender knows the public key of all the receivers with whom she intends to communicate

Construction of assymetric universal mixnet COMMUNICATION PROTOCOL 1.Submission of inputs. 2.Universal mixing. (a)Re-encrypting all the ciphertexts. (b)Writing the new ciphertexts to the bulletin board overwriting the old ones. 3.Retrieval of Outputs.

Construction of assymetric universal mixnet Properties of the basic protocol 1.Universal mixnets hold no keying information. Public and private keys are managed by the players providing input ciphertexts and retrieving outputs from the standard mix. 2.Only guarantees external anonymity. It does not provide anonymity of senders with respect to the receivers. 3.Overhead imposed on receivers.

Construction of assymetric universal mixnet A potential drawback of a bulletin board based on universal mixing is that one must download the full contents in order to be assured of obtaining all of the messages addressed to oneself. Problem if the number of messages on the bulletin board is allowed to grow indefinitely. To mitigate this problem we can have recipients remove the messages not intended for them in such a way that the removal does not reveal the entity which posted the message. Only a portion of each message needs to be downloaded in order for the receiver to determine whether the message is intended for him.

RFID-tag privacy. not specified the source of information without knowledge of public-key when re-encryption not specified the source of information re-encryption by a third party Semantic security not leak the information about original ciphertext from the re-encrypted ciphertext decryption at once using the private key protocol based on ElGamal using homomorphic property (E[a]*E[b]=E[ab]) ciphertexts on message m consists of a pair [E[m];E[1]]

RFID-tag privacy. Key-generation:generate SK=x, PK=y=gx Encryption reader/writer C m:message, y=gx:public key x:private key, r=(k0,k1): random number C:ciphertext

RFID-tag privacy. Decryption RFID tag reader/writer C m:message, y=gx:public key x:private key, r=(k0,k1): random number C:ciphertext

RFID-tag privacy. Re-encryption RFID tag reader/writer C C' α,β: contents on RFID tags y=gx: public key, x: private key r=(k0,k1): random number C: ciphertext

PART 4

Security properties of our system. Two security properties of universal mixnets: correctness and communication privacy. Correctness-The mixnet is correct if the set of outputs it produces is a permutation of the set of inputs. Communication Privacy-The mixnet guarantees communication privacy if, when Alice sends a message to Bob and Cathy sends a message to Dario, an observer can not tell whether Alice (resp. Cathy) sent a message to Bob or Dario.

PART 5.

Hybrid universal mixing This type of mixnet combines symmetric and public-key encryption to accommodate potentially very long messages (all of the same size) in an efficient manner. inputs m are submitted to a hybrid mix encrypted under an initial symmetric (rather than public) key. We denote by Ek[m] the symmetric key encryption of m under key k. Each mix server Si re-encrypts the output of the previous mix under a new random symmetric key ki. The final output:

Hybrid universal mixing Symmetric keys k,k1,.....Kn conveyed alongside the encrypted message to enable decryption by the final recipient. Symmetic keys themselves encrypted under the public keys of the recipients.

Hybrid universal mixing The protocol consists of the following steps: Submission of inputs: An input ciphertext takes the form Universal mixing. Retrieval of the outputs.

Hybrid universal mixing

Hybrid universal mixing

Hybrid universal mixing

Conclusions Universal re-encryption represents a simple modification to the basic ElGamal cryptosystems. provides a valuable tool for the construction of privacy-preserving architectures. dispense with the complications and risks of distributed key setup and management. costs for the basic universal cryptosystem are only twice those of ordinary ElGamal.

Opportunity for further research The problem of receiver costs in a universal mixnet presents a compelling line of further research. A method for reducing this cost would be appealing from both a technical and practical standpoint.

QUESTIONS???????

Thank you!