1 Hierarchical Identity-Based Encryption with Constant Size Ciphertext Dan Boneh, Xavier Boyen and Eu-Jin Goh Eurocrypt 2005 投影片製作:張淑慧.

Slides:



Advertisements
Similar presentations
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption Allison Lewko Tatsuaki Okamoto Amit Sahai The.
Advertisements

Efficient Lattice (H)IBE in the standard model Shweta Agrawal, Dan Boneh, Xavier Boyen.
Boneh-Franklin Identity-based Encryption. 2 Symmetric bilinear groups G = ágñ, g p = 1 e: G G G t Bilinear i.e. e(u a, v b ) = e(u, v) ab Non-degenerate:
ElGamal Security Public key encryption from Diffie-Hellman
An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
Attribute-based Encryption
See you at the next conference! Hope you like our slides Hello everybody!
11 Efficient and Secure Certificateless Authentication and Key Agreement Protocol for Hybrid P2P Network Authors: Z. B. Xu and Z. W. Li Source: The 2nd.
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, Hung-Ming Sun.
Dan Boneh Public key encryption from Diffie-Hellman ElGamal Variants With Better Security Online Cryptography Course Dan Boneh.
A Pairing-Based Blind Signature
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
Encryption Public-Key, Identity-Based, Attribute-Based.
Dual System Encryption: Realizing IBE and HIBE from Simple Assumptions Brent Waters.
An Introduction to Identity-based Cryptography
1 IDENTITY BASED ENCRYPTION SECURITY NOTIONS AND NEW IBE SCHEMES FOR SAKAI KASAHARA KEY CONSTRUCTION N. DENIZ SARIER.
1 Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the orderQuestions? Review.
Identity Based Encryption
1 Identity-Based Encryption form the Weil Pairing Author : Dan Boneh Matthew Franklin Presentered by Chia Jui Hsu Date :
Practical Techniques for Searches on Encrypted Data Author: Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀銘偉.
A Designer’s Guide to KEMs Alex Dent
Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍.
Identity-based authenticated key agreement protocol based on Weil pairing N.P.Smart ELECTRONICS LETTERS 20 th June 2002 vol.38 No13 p Present by.
Strongly Secure Certificateless Encryption Alexander W. Dent Information Security Group
Broadcast Encryption with Multiple Trust Authorities Alexander W. Dent Information Security Group Royal Holloway, University of London.
1 Secure Indexes Author : Eu-Jin Goh Presented by Yi Cheng Lin.
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
Dan Boneh Public Key Encryption from trapdoor permutations RSA in practice Online Cryptography Course Dan Boneh.
Hybrid Cipher encryption Plain Text Key Cipher Text Key Plain Text IV Hybrid Cipher decryption Hybrid Cipher Note: IV used in encryption is not used in.
By Jyh-haw Yeh Boise State University ICIKM 2013.
(Multimedia University) Ji-Jian Chin Swee-Huay Heng Bok-Min Goi
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption Danfeng Yao Nelly Fazio Brown University New.
Presented by Mike Scott
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
Cyrtographic Security Identity-based Encryption 1Dennis Kafura – CS5204 – Operating Systems.
1 Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal Omkant Pandey Amit Sahai Brent Waters UCLA SRI.
Computer Science CSC 774 Advanced Network Security Topic 2.6 ID Based Cryptography #2 Slides by An Liu.
Center for Information Security Technologies ID-based Authenticated Key Exchange for Low-Power Mobile Devices K. Y. Choi, J. Y. Hwang, D. H. Lee CIST,
Review of Certificateless Cryptography Yu-Chi Chen.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Key-Policy Attribute-Based Encryption Present by Xiaokui.
Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh.
多媒體網路安全實驗室 Anonymous ID Signature Scheme with Provable Identity Date: Reporter :Chien-Wen Huang 出處: 2008 Second International Conference on Future.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
A new provably secure certificateless short signature scheme Authors: K.Y. Choi, J.H. Park, D.H. Lee Source: Comput. Math. Appl. (IF:1.472) Vol. 61, 2011,
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
David Cash (UCSD) Dennis Hofheinz (KIT) Eike Kiltz (CWI) Chris Peikert (GA)
1 Efficient Ring Signatures Without Random Oracles Hovav Shacham and Brent Waters.
Tae-Joon Kim Jong yun Jun
1 Efficient Selective-ID IBE Without Random Oracle Dan Boneh Stanford University Xavier Boyen Voltage Security.
1/28 Chosen-Ciphertext Security from Identity- Based Encryption Jonathan Katz U. Maryland Ran Canetti, Shai Halevi IBM.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
1 Compact Group Signatures Without Random Oracles Xavier Boyen and Brent Waters.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Key Generation Protocol in IBC Author : Dhruti Sharma and Devesh Jinwala 論文報告 2015/12/24 董晏彰 1.
Information Security and Management 10. Other Public-key Cryptosystems Chih-Hung Wang Fall
The Boneh-Franklin IBE. Simplified Boneh-Franklin IBE 2.
Identity Based Encryption
Boneh-Franklin Identity Based Encryption Scheme
Identity-based deniable authentication protocol
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption Danfeng Yao Nelly Fazio Brown University New.
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data An, Sanghong KAIST
Source: Ad Hoc Networks, Vol. 71, pp , 2018
Efficient Identity-Based Encryption Without Random Oracles
Hierarchical Identity Based Encryption with Constant Size Ciphertext
Presentation transcript:

1 Hierarchical Identity-Based Encryption with Constant Size Ciphertext Dan Boneh, Xavier Boyen and Eu-Jin Goh Eurocrypt 2005 投影片製作:張淑慧

2 Outline Notations Scheme 1: With constant size ciphertext based on Decision BDHE assumption Hybrid Scheme Application Conclusion

3 Bilinear map

4 l-Bilinear Diffie-Hellman Exponent (l-BDHE) Assumption

5 KGC (I1)(I1) (I1,I2)(I1,I2) (I 1,I 2,…,I l ) Level 0 Level 1 Level 2 Level l Hierarchical structure (key generation center)

6 Scheme 1 *A HIBE system with constant size ciphertext * A selective-ID secure Setup KeyGen Encrypt Decrypt

7 Scheme 1 (continuous)

8

9

10 Scheme 1 (continuous)

11 Remark If l+1-BDHE assumption holds, then scheme 1 is selective identity, chosen plaintext (IND-sID-CPA) secure. Chosen ciphertext security: refer to Canetti et al. [10] (Eurocrypt 2004) or Boneh and Katz [7] (RSA-CT 2005) (more efficient) Arbitrary identities: hashing each I i where ID=(I 1,…,I k )

12 Hybrid Scheme :

13 Hybrid Scheme :

14 Hybrid Scheme Setup KeyGen Encrypt Decrypt

15 Hybrid Scheme (continuous)

16 Hybrid Scheme (continuous)

17 Hybrid Scheme (continuous)

18 Hybrid Scheme (continuous)

19 Scheme 1Scheme 2Hybrid scheme ω=1/2 Private key size Ciphertext size

20 Applications Forward secure encryption scheme Forward secure HIBE scheme Broadcast encryption scheme

21 Conclusion Is it possible to propose a HIBE scheme with both private key size O(1) and ciphertext size O(1)? To propose a HIBE scheme with constant size ciphertext based on HDHI assumption is the future research..END.

22 Scheme 1: How to generate d ID by d ID|k-1

23 Scheme 2: ( [1] Eurocrypt 2004 ) Efficient selective identity HIBE based on BDH without random oracles Setup KeyGen Encrypt Decrypt

24 Scheme 2 (continuous)

25 Scheme 2 (continuous)

26 Scheme 2 (continuous)

27 Scheme 2 (continuous)

28 Hybrid Scheme: How to generate private key d ID

29 Hybrid Scheme : How to generate private key d ID (continuous)

30 Hybrid Scheme: An example for encryption

31 q-Bilinear Diffie-Hellman Inversion (q-BDHI) problem