ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption Danfeng Yao Nelly Fazio Brown University New.

Slides:



Advertisements
Similar presentations
Boneh-Franklin Identity-based Encryption. 2 Symmetric bilinear groups G = ágñ, g p = 1 e: G G G t Bilinear i.e. e(u a, v b ) = e(u, v) ab Non-degenerate:
Advertisements

An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
A Survey of Key Management for Secure Group Communications Celia Li.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Dan Boneh Public key encryption from Diffie-Hellman ElGamal Variants With Better Security Online Cryptography Course Dan Boneh.
Russell Martin August 9th, Contents Introduction to CPABE Bilinear Pairings Group Selection Key Management Key Insulated CPABE Conclusion & Future.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
Encryption Public-Key, Identity-Based, Attribute-Based.
Notarized Federated Identity Management for Web Services Michael T. Goodrich Roberto Tamassia Danfeng Yao Brown University University of California, Irvine.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Dual System Encryption: Realizing IBE and HIBE from Simple Assumptions Brent Waters.
IAW 2006 Cascaded Authorization with Anonymous- Signer Aggregate Signatures Danfeng Yao Department of Computer Science Brown University Joint work with.
7. Asymmetric encryption-
Optimal Communication Complexity of Generic Multicast Key Distribution Saurabh Panjwani UC San Diego (Joint Work with Daniele Micciancio)
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
Identity Based Encryption
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
1 Identity-Based Encryption form the Weil Pairing Author : Dan Boneh Matthew Franklin Presentered by Chia Jui Hsu Date :
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Scalable Secure Bidirectional Group Communication Yitao Duan and John Canny Berkeley Institute of Design Computer Science.
Strongly Secure Certificateless Encryption Alexander W. Dent Information Security Group
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Group Key Distribution Chih-Hao Huang
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack Yitao Duan Computer Science Division, University of.
1 Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys Dan Boneh, Craig Gentry, and Brent Waters.
Receiver Anonymity via Incomparable Public Keys Brent R. Waters, Edward W. Felten, and Amit Sahai Department of Computer Science Princeton University.
Public Key Model 8. Cryptography part 2.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
1 Self Protecting Cryptosystems Moti Yung Columbia University/ RSA Labs.
By Jyh-haw Yeh Boise State University ICIKM 2013.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
(Multimedia University) Ji-Jian Chin Swee-Huay Heng Bok-Min Goi
1 Hierarchical Identity-Based Encryption with Constant Size Ciphertext Dan Boneh, Xavier Boyen and Eu-Jin Goh Eurocrypt 2005 投影片製作:張淑慧.
An Efficient Identity-based Cryptosystem for
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
RSA Ramki Thurimella.
Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups David Insel John Stephens Shawn Smith Shaun Jamieson.
Cyrtographic Security Identity-based Encryption 1Dennis Kafura – CS5204 – Operating Systems.
James Higdon, Sameer Sherwani
Public-Key Cryptography CS110 Fall Conventional Encryption.
1 Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal Omkant Pandey Amit Sahai Brent Waters UCLA SRI.
The Dual Receiver Cryptosystem and its Applications Presented by Brijesh Shetty.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptanalysis and Improvement of an Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem Reporter : Tzer-Long Chen Information Sciences.
Yu-Li Lin and Chien-Lung Hsu Department of Information Management, Chang-Gung University Information Science(SCI) Reporter: Tzer-Long Chen.
Center for Information Security Technologies ID-based Authenticated Key Exchange for Low-Power Mobile Devices K. Y. Choi, J. Y. Hwang, D. H. Lee CIST,
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Key-Policy Attribute-Based Encryption Present by Xiaokui.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Group Key Distribution Xiuzhen Cheng The George Washington University.
A new provably secure certificateless short signature scheme Authors: K.Y. Choi, J.H. Park, D.H. Lee Source: Comput. Math. Appl. (IF:1.472) Vol. 61, 2011,
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Computer Science Revocation and Tracing Schemes for Stateless Receivers Dalit Naor, Moni Naor, Jeff Lotspiech Presented by Attila Altay Yavuz CSC 774 In-Class.
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
Chair for Network- and Data-Security
Key Management Network Systems Security Mort Anvari.
1 Efficient Selective-ID IBE Without Random Oracle Dan Boneh Stanford University Xavier Boyen Voltage Security.
1/28 Chosen-Ciphertext Security from Identity- Based Encryption Jonathan Katz U. Maryland Ran Canetti, Shai Halevi IBM.
Homework #2 J. H. Wang Oct. 31, 2012.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
The Boneh-Franklin IBE. Simplified Boneh-Franklin IBE 2.
Identity Based Encryption
Boneh-Franklin Identity Based Encryption Scheme
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption Danfeng Yao Nelly Fazio Brown University New.
Presentation transcript:

ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption Danfeng Yao Nelly Fazio Brown University New York University Yevgeniy Dodis Anna Lysyanskaya New York University Brown University

Identity-based Encryption (IBE) and Hierarchical IBE (HIBE) Private Key S Register as  params, secret s  Ciphertext C = (M, Bob Math Alice School CS ss  IBE [Shamir 84] [Boneh Frankline 01] [Cocks 01] [Canetti Halevi Katz 03] [Boneh Boyen 04] [Waters 04]  HIBE [Horwitz Lynn 02] [Gentry Silverberg 02] [Boneh Boyen 04] PKG

Why need forward-secure HIBE?  In HIBE, exposure of parent private keys compromises children’s keys  Forward-secure HIBE mitigates key exposure  Forward security [Gunther 89] [Diffie Oorschot Wiener 92] [Anderson 97] [Bellare Miner 99] [Abdalla Reyzin 00] [Malkin Micciancio Miner 02] [Canetti Halevi Katz 03] [Gunther 89] [Diffie Oorschot Wiener 92] [Anderson 97] [Bellare Miner 99] [Abdalla Reyzin 00] [Malkin Micciancio Miner 02] [Canetti Halevi Katz 03] Secret keys are evolved with time Secret keys are evolved with time Compromising current key does NOT compromise past communications Compromising current key does NOT compromise past communications Bob Math Alice School CS ss Time Safe Compromise

Applications of fs-HIBE  Forward-secure public-key broadcast encryption (fs-BE) BE schemes: [Fiat Naor 93] [Luby Staddon 98] [Garay Staddon Wool 00] [Naor Naor Lotspiech 01] [Halevy Shamir 02] [Kim Hwang Lee 03] [Goodrich Sun Tamassia 04] [Gentry Ramzan 04] BE schemes: [Fiat Naor 93] [Luby Staddon 98] [Garay Staddon Wool 00] [Naor Naor Lotspiech 01] [Halevy Shamir 02] [Kim Hwang Lee 03] [Goodrich Sun Tamassia 04] [Gentry Ramzan 04] HIBE is used in public-key broadcast encryption [Dodis Fazio 02] HIBE is used in public-key broadcast encryption [Dodis Fazio 02] Forward security is especially important in BE Forward security is especially important in BE  Multiple HIBE: Encryption scheme for users with multiple roles Time SafeKey compromised

Hierarchical IBE Root setup Lower-level setup S Bob S Math S CS Params, S School Encrypt Decrypt(S Bob )  HIBE [Horwitz Lynn 02] [Gentry Silverberg 02] [Boneh Boyen 04] (School, Math)(School, CS) (School, CS, Bob)

Forward-secure Public-Key Encryption  fs-PKE (Canetti, Halevi, and Katz 2003) Used to protect the private key of one user Used to protect the private key of one user Based on Gentry-Silverberg HIBE Based on Gentry-Silverberg HIBE A time period is a binary string A time period is a binary string Private key contains decryption key and future secrets Private key contains decryption key and future secrets Erase past secrets in algorithm Update Erase past secrets in algorithm Update secret s  Total time periods: 4 Period 1: (0 0) Period 2: (0 1) Period 3: (1 0) Period 4: (1 1) Encrypt(0 0)  1 S (School,00)

fs-HIBE requirements  Dynamic joins Users can join at any time Users can join at any time  Joining-time obliviousness  Collusion resistance  Security  Do naïve combinations of fs-PKE and HIBE work? John Eve Bob School Alice Math CS User 1User 2

 Each entity node maintains one tree For computing children’s private keys For computing children’s private keys For the forward security of itself For the forward security of itself  Not joining-time-oblivious CS joins at (0 1) with public key (School, 0, 1, CS) CS joins at (0 1) with public key (School, 0, 1, CS) Bob joins at (1 0) with public key (School, 0, 1, CS, 1, 0, Bob) Bob joins at (1 0) with public key (School, 0, 1, CS, 1, 0, Bob) Sender needs to know when CS and Bob joined Sender needs to know when CS and Bob joined School CS Bob An fs-HIBE attempt

Another fs-HIBE attempt  Each node maintains two subtrees Left subtree for forward security and right subtree for adding children Left subtree for forward security and right subtree for adding children  Does not work either   School  CS  01 Math Bob

Overview of our fs-HIBE scheme  Based on HIBE [Gentry Silverberg 02] and fs-PKE (Canetti Halevi Katz 03] schemes  Scalable, efficient, and provable secure Forward security Forward security Dynamic joins Dynamic joins Joining-time obliviousness Joining-time obliviousness Collusion resistance Collusion resistance  Security based on Bilinear Diffie-Hellman assumption [BF 01] and random oracle model [Bellare Rogaway 93] Chosen-ciphertext secure against adaptive-chosen-(ID-tuple, time) adversary Chosen-ciphertext secure against adaptive-chosen-(ID-tuple, time) adversary

fs-HIBE algorithm definitions Root setup (t = 0 0)Encrypt Decrypt(S Bob, 28.Oct.2004 ) Lower-level setup Update S Bob, t’ S Math, t S CS, t S School, 00

fs-HIBE Root setup  Similar to key derivation of fs-PKE  Private key for time (0 0) contains decryption key for (0 0), and future secrets  Generates params, decryption key, and future secrets S (School,00)  1 an intermediate secret decryption key for time (0 0) secrets for future keys || String concatenation + Group addition operation  Group multiplication operation Pick random secrets s  and s’ = s   H (0 || School) = s   H (1 || School) = + s’  H (0 0 || School) = + s’  H (0 1 || School) Erase, s  and s’ Random secret s 

fs-HIBE algorithms cont’d  Lower-level setup is used by a node at time t to compute keys for its children Similar to Root setup Similar to Root setup Computes both decryption key Computes both decryption key at time t, and future secrets  Update Similar as in fs-PKE Similar as in fs-PKE  Encrypt With time (0 0) and ID-tuple (School, CS, Bob) With time (0 0) and ID-tuple (School, CS, Bob)  Decrypt Decryption key is used Decryption key is used School Intermediate secrets 0 0 Suppose CS and Bob join at time period (0 0). BobCS School CS Bob 0 0 Components of ciphertext Intermediate

HIBE in broadcast encryption Valid user Revoked user Center

Forward-secure broadcast encryption  Public-key BE by Dodis and Fazio Uses HIBE to implement a subset-cover framework [Naor Naor Lotspiech 01] Uses HIBE to implement a subset-cover framework [Naor Naor Lotspiech 01]  A scalable fs-BE scheme Dynamic joins and joining-time obliviousness Dynamic joins and joining-time obliviousness Users update secret keys autonomously Users update secret keys autonomously  Algorithms: KeyGen, Reg, Upd, Enc, Dec KeyGen (t = 0) S Center,0 Update Want to join at t S u, t Reg Enc(M, t) Dec( S u, t )

Security of fs-HIBE  “Security definitions” Secure for past communications of compromised nodes Secure for past communications of compromised nodes Secure for ancestor nodes Secure for ancestor nodes Secure for sibling nodes Secure for sibling nodes  Security based on hardness of BDH problem and random oracle model  Theorem Suppose there is an adaptive adversary A  : advantage against one-way secure fs-HIBE  : advantage against one-way secure fs-HIBE h: level of some target ID-tuple h: level of some target ID-tuple l = log 2 N and N is the total number of time periods l = log 2 N and N is the total number of time periods H 1, H 2 : random oracles H 1, H 2 : random oracles q H2 : number of hash queries made to hash function H 2 q H2 : number of hash queries made to hash function H 2 q E : number of hash queries made to lower-level setup queries q E : number of hash queries made to lower-level setup queries then there exists an algorithm B that solves BDH problem with advantage then there exists an algorithm B that solves BDH problem with advantage h + l e(2lq E + h + l) (()(h+l)/2 1 2n2n2n2n – ) q H2 /