Public-Key Cryptosystems Based on Composite Degree Residuosity Classes Author: Pascal Paillier Presenter: 陳國璋 [Published in J. Stern, Ed., Advances in.

Slides:



Advertisements
Similar presentations
Foundations of Cryptography Lecture 13 Lecturer: Moni Naor.
Advertisements

Notation Intro. Number Theory Online Cryptography Course Dan Boneh
7. Asymmetric encryption-
1 Finding a shortest vector in a two-dimensional lattice modulo m Theoretical Computer Science, Vol 172, 1997 Gunter Rote 田錦燕95/06/01.
Stata教學 第六講 變異數分析ANOVA ©Ming-chi Chen 社會統計.
1 ID-Based Proxy Signature Using Bilinear Pairings Author: Jing Xu, Zhenfeng Zhang, and Dengguo Feng Presenter: 林志鴻.
目的 「升學調查系統」,幫助某一學校調查並記錄 其歷屆畢業生報考研究所的情況、未來提供給 學弟妹作參考,以及學校推廣之相關工作。 功能需求 紀錄並追蹤歷屆畢業生升學的狀態 協助畢業生做升學輔導 未來提供學弟妹作查詢、參考 計算上榜率、前十大學校上榜率.
Self proxy signature scheme IJCSNS International Journal of Computer Science and Network Security,VOL.7 No.2,Februry 2007 Author:Young-seol Kim,Jik Hyun.
1 Secure Context-sensitive Authorization 2005 Author : Kazuhiro Minami, David Kotz Presented by Shih Yu Chen.
第四章 助人的倫理議題.
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes Presenter: 陳國璋 EUROCRYPT'99, LNCS 1592, pp , By Pascal Paillier Efficient.
1. 假設以下的敘述為一未提供 “ 捷徑計算 ” 能力的程式段,試用程 式設計的技巧,使此敘述經此改 寫的動作後,具有與 “ 捷徑計算 ” 之 處理方法相同之處理模式。 if and then E1 else E2 endif.
Structural Equation Modeling Chapter 7 觀察變數路徑分析=路徑分析 觀察變數路徑分析.
Certificateless Public Key Encryption without Paring Joonsang Baek, Reihaneh Safavi- Naunu, and Willy Susilo 報告者:陳國璋.
基礎物理總論 基礎物理總論 熱力學與統計力學(三) Statistical Mechanics 東海大學物理系 施奇廷.
Monte Carlo Simulation Part.2 Metropolis Algorithm Dept. Phys. Tunghai Univ. Numerical Methods C. T. Shih.
1 A new identity based proxy signature scheme Source: Lecture Notes In Computer Science Author: Chunxiang Gu and Yuefei Zhu Presenter: 林志鴻.
The RSA Cryptosystem and Factoring Integers (II) Rong-Jaye Chen.
Network Connections ★★★☆☆ 題組: Contest Archive with Online Judge 題號: Network Connections 解題者:蔡宗翰 解題日期: 2008 年 10 月 20 日 題意:給你電腦之間互相連線的狀況後,題.
A Server-aided Signature Scheme Based on Secret Sharing for Mobile Commerce Source: Journal of Computers, Vol.19, No.1, April 2008 Author: Chin-Ling Chen,
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
: The largest Clique ★★★★☆ 題組: Contest Archive with Online Judge 題號: 11324: The largest Clique 解題者:李重儀 解題日期: 2008 年 11 月 24 日 題意: 簡單來說,給你一個 directed.
The Algebra of Encryption CS 6910 Semester Research and Project University of Colorado at Colorado Springs By Cliff McCullough 20 July 2011.
Practical Techniques for Searches on Encrypted Data 報告者:陳國璋.
Lecturer: Moni Naor Foundations of Cryptography Lecture 11: Security of Encryption Schemes.
自動機 (Automata) Time: 1:10~2:00 Monday: practice exercise, quiz 2:10~4:00 Wednesday: lecture Textbook: (new!) An Introduction to Formal Languages and Automata,
公開金鑰基礎建設 Public Key Infrastructure (PKI) 資管 4B B 陳冠伯.
Dynamic Multi-signatures for Secure Autonomous Agents Panayiotis Kotzanikolaou Mike Burmester.
: GCD - Extreme II ★★★★☆ 題組: Contest Archive with Online Judge 題號: 11426: GCD - Extreme II 解題者:蔡宗翰 解題日期: 2008 年 9 月 19 日 題意: 最多 20,000 組測資,題目會給一個數字.
1 Provably secure randomized blind signature scheme based on bilinear pairing Source: Computers and Mathematics with Applications Author: Chun-I Fan, Wei-Zhe.
: Expect the Expected ★★★★☆ 題組: Contest Archive with Online Judge 題號: 11427: Expect the Expected 解題者:李重儀 解題日期: 2008 年 9 月 21 日 題意:玩一種遊戲 (a game.
Chapter 3 Entropy : An Additional Balance Equation
Cryptography in Subgroups of Z n * Jens Groth UCLA.
Public Encryption: RSA
Structural Equation Modeling Chapter 6 CFA 根據每個因素有多重指標,以減少 測量誤差並可建立問卷的構念效度 驗證性因素分析.
質數 (Prime) 相關問題 (III) — 如何找出相對大的質數 Date: May 27, 2009 Introducer: Hsing-Yen Ann.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes Presenter: 陳國璋 EUROCRYPT'99, LNCS 1592, pp , By Pascal Paillier Efficient.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc.,All Rights Reserved. 壹 企業研究導論.
Teacher : Ing-Jer Huang TA : Chien-Hung Chen 2015/6/30 Course Embedded Systems : Principles and Implementations Weekly Preview Question CH7.1~CH /12/26.
兩黨與多黨政黨體系 Lijphart (1984) Party Systems: Two-Party and Multiparty Patterns.
Security Analysis of Server-Aided Public Key Generation Protocols on Low-power Devices for Ad-hoc Networks Source: 2008 ISECS Author: Tianjie Cao, Xianping.
: Finding Paths in Grid ★★★★☆ 題組: Contest Archive with Online Judge 題號: 11486: Finding Paths in Grid 解題者:李重儀 解題日期: 2008 年 10 月 14 日 題意:給一個 7 個 column.
1 Knapsack Cryptosystems 2 ◎ Merkle-Hellman Knapsack Cryptosystem 觀察: (1) 0/1 knapsack problem (i.e. sum of subset) 例:已知 C = 14, A = (1, 10, 5, 22, 3)
1 Chemical and Engineering Thermodynamics Chapter 1 Introduction Sandler.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
Public Key Model 8. Cryptography part 2.
The RSA Algorithm Based on the idea that factorization of integers into their prime factors is hard. ★ n=p . q, where p and q are distinct primes Proposed.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
The RSA Algorithm Rocky K. C. Chang, March
1 Public-Key Cryptosystems Based on Composite Degree Residuosity Classes Author: Pascal Paillier Presenter: 廖俊威 [Published in J. Stern, Ed., Advances in.
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
By Yernar.  Background  Key generation  Encryption  Decryption  Preset Bits  Example.
A Method for Obtaining Digital Signatures and Public-key Cryptosystems
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 離散對數密碼系統 交通大學資訊工程系 陳榮傑. 2 Outline 離散對數問題 (Discrete Logarithm Problem) 離散對數演算法 (DL Algorithms) –A trivial algorithm –Shanks’ algorithm –Pollard’s algorithm.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
A Novel Technique for Image Authentication in Frequency Domain using Discrete Fourier Transformation Technique (IAFDDFTT) Malaysian Journal of Computer.
The Paillier Cryptosystem
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Sunday, December 20, 2015 ARCHITECTURE OF A SERVER- AIDED SIGNATURE SERVICE (SASS) FOR MOBILE NETWORKS Source: P. Lorenz and P. Dini (Eds.): ICN 2005,
ID-base Signature from Pairings on Elliptic Curve Kenneth G. Paterson From IACR Server 2002/004 Reference :Identity-Based Encryption from the Weil Pairing.
1 Cryptanalysis Lab Elliptic Curves. Cryptanalysis Lab Elliptic Curves 2 Outline [1] Elliptic Curves over R [2] Elliptic Curves over GF(p) [3] Properties.
Impossibility proofs for RSA signatures in the standard model Pascal Paillier Topics in Cryptology – CT-RSA 2007.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
week 8Complexity of Algorithms1 Elementary Number Theory Given positive integers a and b, we use the notation a¦b to indicated that a divides b, i.e.,
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Presentation transcript:

Public-Key Cryptosystems Based on Composite Degree Residuosity Classes Author: Pascal Paillier Presenter: 陳國璋 [Published in J. Stern, Ed., Advances in Cryptology- EUROCRYPT'99, vol of Lecture Notes in Computer Science, pp , Springer-Verlag, 1999.]

Outline  Introduction  Notation and math. assumption  Scheme 1  Scheme 2  Scheme 3  Properties  Conclusion

Introduction(1/2)  兩個主要的 Trapdoor 技術 RSA Diffie-Hellman  提出新的技術 Composite Residuosity  提出新的計算性問題 Composite Residuosity Class Problem

Introduction(2/2)  提出 3 個架構在上述假設的同態加密機制 (Homomophic encryption schemes), 之中包含一個新的 trapdoor permutation  滿足 semantically secure, 不過, 作者沒 有證明.

Outline  Background  Notation and math. assumption  Scheme 1  Scheme 2  Scheme 3  Properties  Conclusion

Notation and math. assumption (1/10)  p, q are two large primes.  n = pq  Euler phi-function: ψ(n) = (p-1)(q-1)  Carmichael function: λ(n) = lcm(p-1,q-1)  |Z n 2 *| = ψ(n 2 ) = nψ(n)  Any w ∈ Z n 2 *, w λ = 1 mod n w nλ = 1 mod n

Notation and math. assumption (2/10)  RSA[n,e] problem Extracting e-th roots modulo n where n=pq  Relation P 1 P 2 (resp. P 1 ≡ P 2 ) will denoted that problem P 1 is polynomial reducible to the problem P 2.  n-th residue modulo n 2 A number z is th n-th residue modulo n 2 if there exist a number y such that z=y n mod n 2

Notation and math. assumption (3/10)  CR[n] problem deciding n-th residuosity  The CR[n] problem of deciding quadratic or higher degree residuosity, it is a random-self-reducibility problem.  There exists no polynomial time distinguisher for n-th residues modulo n 2, i.e. CR[n] is intractable.

Notation and math. assumption (4/10) 

Notation and math. assumption (5/10)  if order(g) = kn where k is nonzero multiple of n then ε g is bijective. Domain and Co-domain are the same order nψ(n) and the function is 1-to-1. 

Notation and math. assumption (6/10)    

Notation and math. assumption (7/10)  Class[n,g] problem computing the class function in base g. given w ∈ Z n 2 *, compute [w] g random-self-reducible problem the bases g are independent

Notation and math. assumption (8/10)  Class[n] problem composite residuosity class problem given w ∈ Z n 2 *, g ∈ B, compute [w] g   Class[n] Fact[n]

Notation and math. assumption (9/10)    

Notation and math. assumption (10/10)  Class[n] RSA[n,n]  D-Class[n] problem decisional Class[n] problem given w ∈ Z n 2 *,g ∈ B, x ∈ Z n, decide whether x=[w] g or not 

Outline  Background  Notation and math. assumption  Scheme 1  Scheme 2  Scheme 3  Properties  Conclusion

Scheme 1(1/6)  New probabilistic encryption scheme 

Scheme 1 (2/6)    

Scheme 1 (3/6)  One-way function Given x, to compute f(x) = y is easy. Given y, to find x s.t. f(x) = y is hard.  One-way trapdoor f() is a one-way function. Given a secret s, given y, to find x s.t. f(x) = y is easy.  Trapdoor permutation f() is a one-way trapdoor. f() is bijective.

Scheme 1 (4/6) 

Scheme 1 (5/6)  Scheme 1 is one-way ⇔ the Computational composite residuosity assumption(Class[n] problem) holds. Inverting our scheme is by the definition the composite residuosity class problem.

Scheme 1 (6/6)  Scheme 1 is semantically secure ⇔ the Decisional composite residuosity assumption(CR[n] problem) holds. m 0, m 1 : known messages. c:ciphertext of either m 0 or m 1. [w] g =0 iff w is the n-th residue modulo n 2. c=ε g (m 0,r) iff cg -m 0 mod n 2 is the n-th residue modulo n 2. Vice-versa.

Outline  Background  Notation and math. assumption  Scheme 1  Scheme 2  Scheme 3  Properties  Conclusion

Scheme 2(1/5)  New one-way trapdoor permutation 

Scheme 2(2/5) 

Scheme 2(3/5) 

Scheme 2(4/5) 

Scheme 2(5/5)  Digital Signatures 

Outline  Background  Notation and math. assumption  Scheme 1  Scheme 2  Scheme 3  Properties  Conclusion

Scheme 3(1/4)  Cost down for decryption complexity.  Restricting the ciphertext space Z n 2 * to subgroup of smaller order. 

Scheme 3(2/4)    

Scheme 3(3/4)  PDL[n,g] problem Partial discrete logarithm problem Given w ∈, compute [w] g  D-PDL[n,g] problem Decisional partial discrete logarithm problem Given w ∈, x ∈ Z n, decide whether [w] g =x.

Scheme 3(4/4)  Scheme 3 is one-way ⇔ PDL[n,g] is hard.  Scheme 3 is semantically secure ⇔ D-PDL[n,g] is hard. 

Outline  Background  Notation and math. assumption  Scheme 1  Scheme 2  Scheme 3  Properties  Conclusion

Properties(1/3)  Random-Self-Reducibility A good algorithm for the average case implies a good algorithm for the worst case.

Properties(2/3)  Additive Homomorphic Properties

Properties(3/3)  Self-Blinding Any ciphertext can be publicly changed into another one without affecting the plaintext.

Outline  Background  Notation and math. assumption  Scheme 1  Scheme 2  Scheme 3  Properties  Conclusion

Conclusion(1/4) SchemeMainPermutationFast Variant RSAElGamal One- wayness Class[n]RSA[n,n]PDL[n,g]RSA[n,F 4 ]DH[p] Semantic Secure CR[n]noneD-PDL[n,g]noneDDH[p] Plaintext size |n|2|n||n| |p| Ciphertext size 2|n| |n|2|p|

EncMainPermutat ion Fast Variant RSAElGamal |n|,|p|= |n|,|p|= |n|,|p|= |n|,|p|= |n|,|p|=

DecMainPermutat ion Fast Variant RSAElGamal |n|,|p|= |n|,|p|= |n|,|p|= |n|,|p|= |n|,|p|=

Conclusion(4/4)  提出新的數論問題 Class[n]  基於 composite degree residues 的 trapdoor 的機制  雖然並沒有提出任何證明作者的 scheme 能 抵抗 CCA ,但作者相信小小的修改 Scheme 1 與 3 就可以對抗 CCA ,並能透過 random oracle 來證明