Circular-Secure Encryption from Decision Diffie-Hellman Dan Boneh Shai Halevi Mike Hamburg Rafail Ostrovsky.

Slides:



Advertisements
Similar presentations
Simulation-sound NIZK Proofs for a Practical Language and Constant Size Group Signatures Jens Groth University of California Los Angeles Presenter: Eike.
Advertisements

ElGamal Security Public key encryption from Diffie-Hellman
Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions PKC 2010 May 27, 2010 Petros Mol, Scott Yilek 1 UC, San Diego.
Vote privacy: models and cryptographic underpinnings Bogdan Warinschi University of Bristol 1.
Dan Boneh Public key encryption from Diffie-Hellman ElGamal Variants With Better Security Online Cryptography Course Dan Boneh.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
11 Provable Security. 22 Given a ciphertext, find the corresponding plaintext.
Encryption Public-Key, Identity-Based, Attribute-Based.
Dual System Encryption: Concept, History and Recent works Jongkil Kim.
Cramer & Shoup Encryption Cramer and Shoup: A practical public key crypto system provably secure against adaptive chosen ciphertext attack. Crypto 1998.
Garbled RAM, Revisited Daniel Wichs (Northeastern University) Joint work with: Craig Gentry, Shai Halevi, Seteve Lu, Rafail Ostrovsky, Mariana Raykova.
S EMANTICALLY - SECURE FUNCTIONAL ENCRYPTION : P OSSIBILITY RESULTS, IMPOSSIBILITY RESULTS AND THE QUEST FOR A GENERAL DEFINITION Adam O’Neill, Georgetown.
7. Asymmetric encryption-
Secret Handshakes from CA-Oblivious Encryption Asiacrypt 2004, Jeju-do, Korea Claude Castelluccia, Stanisław Jarecki, Gene Tsudik UC Irvine.
Non-interactive Zaps and New Techniques for NIZK Jens Groth Rafail Ostrovsky Amit Sahai University of California Los Angeles.
Foundations of Network and Computer Security J J ohn Black Lecture #10 Sep 18 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Identity Based Encryption
A Designer’s Guide to KEMs Alex Dent
1 Queries on Encrypted Data Dan Boneh Brent Waters Stanford UniversitySRI.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
1 Conjunctive, Subset, and Range Queries on Encrypted Data Dan Boneh Brent Waters Stanford University SRI International.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 2: Perfect Secrecy.
Strongly Secure Certificateless Encryption Alexander W. Dent Information Security Group
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Anonymity and Robustness in Encryption Schemes Payman Mohassel University of Calgary.
ON THE PROVABLE SECURITY OF HOMOMORPHIC ENCRYPTION Andrej Bogdanov Chinese University of Hong Kong Bertinoro Summer School | July 2014 based on joint work.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 2: Perfect Secrecy.
A Brief History of Provable Security and PKE Alex Dent Information Security Group Royal Holloway, University of London.
Slide 1 Vitaly Shmatikov CS 380S Semantic Security.
Dan Boneh Public Key Encryption from trapdoor permutations The RSA trapdoor permutation Online Cryptography Course Dan Boneh.
0x1A Great Papers in Computer Security
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Dan Boneh Public Key Encryption from trapdoor permutations Public key encryption: definitions and security Online Cryptography Course Dan Boneh.
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
Cryptography Lecture 8 Stefan Dziembowski
1 Hierarchical Identity-Based Encryption with Constant Size Ciphertext Dan Boneh, Xavier Boyen and Eu-Jin Goh Eurocrypt 2005 投影片製作:張淑慧.
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh.
Cryptography Lecture 10 Arpita Patra. Quick Recall and Today’s Roadmap >> CPA & CPA-mult security >> Equivalence of CPA and CPA-mult security >> El Gamal.
Threshold PKC Shafi Goldwasser and Ran Canetti. Public Key Encryption [DH] A PKC consists of 3 PPT algorithms (G,E,D) - G(1 k ) outputs public key e,
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
New Techniques for NIZK Jens Groth Rafail Ostrovsky Amit Sahai University of California Los Angeles.
1 Lossy Trapdoor Functions and Their Applications Brent Waters SRI International Chris Peikert SRI International.
A New Paradigm of Hybrid Encryption Scheme Kaoru Kurosawa, Ibaraki Univ. Yvo Desmedt, UCL and FSU.
1 Efficient Selective-ID IBE Without Random Oracle Dan Boneh Stanford University Xavier Boyen Voltage Security.
1/28 Chosen-Ciphertext Security from Identity- Based Encryption Jonathan Katz U. Maryland Ran Canetti, Shai Halevi IBM.
1 Lossy Trapdoor Functions and Their Applications Brent Waters SRI International Chris Peikert SRI International.
Pairing-Based Non-interactive Zero-Knowledge Proofs Jens Groth University College London Based on joint work with Amit Sahai.
Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev Microsoft Research.
Randomness Leakage in the KEM/DEM Framework Hitoshi Namiki (Ricoh) Keisuke Tanaka (Tokyo Inst. of Tech.) Kenji Yasunaga (Tokyo Inst. of Tech.  ISIT) ProvSec.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Online/Offline Attribute-Based Encryption Brent WatersSusan Hohenberger Presented by Shai Halevi.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2014.
Cryptographic methods. Outline  Preliminary Assumptions Public-key encryption  Oblivious Transfer (OT)  Random share based methods  Homomorphic Encryption.
A plausible approach to computer-aided cryptographic proofs (a collection of thoughts) Shai Halevi – May 2005.
On the Hardness of Proving CCA-Security of Signed ElGamal Bogdan Warinschi (University of Bristol) joint work with David Bernhard, Marc Fischlin.
Bounded key-dependent message security
Group theory exercise.
Secrecy of (fixed-length) stream ciphers
Cryptography Lecture 25.
Rishab Goyal Venkata Koppula Brent Waters
The power of Pairings towards standard model security
Cryptography Lecture 21.
Cryptography Lecture 24.
Presentation transcript:

Circular-Secure Encryption from Decision Diffie-Hellman Dan Boneh Shai Halevi Mike Hamburg Rafail Ostrovsky

Key Dependent Messages Message may depend on key –Encrypted swap –Encrypted backups Security in this setting does not follow from semantic security –Trivial, pathological counterexamples –Or…

Secure Self-Encryption [BRS’02] H(n||k) H k E k (m) = ( r, H(r||k)  m ) m r←R

Insecure Self-Encryption [HK’07] Encrypt r←R H(r||k) E’ k (k) = ( r, E r (k) ) H k E r (k)

KDM in practice Collaboration: PK A / SK A PK B / SK B E PK B (SK A ) E PK A (SK B )

Circular Encryption [CL’01] A user has n credentials signed by CA: User should not “lend” any of his credentials to a friend Solution [CL’01] : SK 1 SK 2 SK n PK 1 PK 2 PK n … … secret public and signed by CA E PK 1 [SK 2 ], E PK 2 [SK 3 ], …, E PK n [SK 1 ] NY driver license I am Shai

Clique Security E ki (k j ) for all i,j

(C,n)-KDM security [BRS’02] ChallengerAdversary (PK 1,…,PK n ) (F ∈ C, i ∈ {1,…,n}) E PKi [ F(SK 1,…,SK n ) ] or random b*b*

Is ElGamal self-referential secure? Maybe, maybe not Need (g, g x, g r, g rx  x) indist from random Requires a funny assumption! Clique security? Need an even funnier assumption… Our goal: use a standard assumption ( DDH )

Notation Let G be a group of prime order p Using additive notation for G 1-dim vector space over Z p Perform dot products etc. normally (x 1, x 2, x 3 )  (g 1, g 2, g 3 ) = x 1 g 1 + x 2 g 2 + x 3 g 3 g i ∈ G, x i ∈ Z p aka g 1 x1 g 2 x2 g 3 x3

The Result n-Clique Secure for any [poly] n –CPA only –Bounds indpendent of n –More generally, (Affine,n)-Clique Secure Security rests on DDH –Standard model –Weaker assumptions possible, eg D-linear

The System rv m × Encrypt: Secret Key: s ∈ {0,1} ℓ 1 Public Key: v∈Gℓv∈Gℓ -v  s s1s1 Decrypt:  s 1, s 2, …, s ℓ g 1, g 2, …, g ℓ h = 1/(g 1 s1 …g ℓ s ℓ ) g 1 r, g 2 r, …, g ℓ r h r ·m m=(g 1 r ) s1 …(g ℓ r ) sℓ · (h r ·m) =0=m

Theorem Breaking (Affine,n)-Clique-Secure breaks DDH Let’s prove self-referential

Intuition always decrypts to the secret key “ciphertext vectors” (g,1,1,…,1) (1,g,1,…,1) (1,1,1,…,g) Easy to generate “encryption of the secret key”

The Proof r m × Game 0: CPA game

The Proof R Rank 1 + × Indistinguishable: identical ciphertext distrbution Game m r (g 1,…,g ℓ,h) ~ r 1 a 1 (g 1,…,g ℓ,h) + … + r t a t (g 1,…,g ℓ,h)

The Proof R Rank ℓ-1 + × Game m Indistinguishable by DDH 1 a b ab 1 a b c vs.

The Proof R Rank ℓ × 10 Game 3 i-th row of identity mat. Indistinguishable: identical ciphertext distrbution

The Proof R Rank 1 + × Game Random subset-sum of columns Indistinguishable by DDH

The Proof R Rank 1 + × Statistically indistinguishable (using LOHL) Game

The Proof R Rank ℓ + × Indistinguishable by DDH Game

The Proof Indistinguishable: identical ciphertext distrbution Game 7

Follow-up work Camenisch-Chandran-Shoup 2009: CCA security –Apply Naor-Yung/Sahai –For DDH-based scheme, can do it efficiently Applebaum, Cash, Peikert, Sahai 2009: Circular security from LPN/LWE

Questions?