Functional Encryption: Beyond Public Key Cryptography

Slides:



Advertisements
Similar presentations
Asymptotically Optimal Communication for Torus- Based Cryptography David Woodruff MIT Joint work with Marten van Dijk Philips/MIT.
Advertisements

Signatures for Network Coding Denis Charles Kamal Jain Kristin Lauter Microsoft Research.
Simulation-sound NIZK Proofs for a Practical Language and Constant Size Group Signatures Jens Groth University of California Los Angeles Presenter: Eike.
Securing Critical Unattended Systems with Identity Based Cryptography A Case Study Johannes Blömer, Peter Günther University of Paderborn Volker Krummel.
Multi-Dimensional Range Query over Encrypted Data Authors: Elaine Shi, Joint work with John Bethencourt, Hubert Chan, Dawn Song, Adrian Perrig Slides originated.
Spreading Alerts Quietly and the Subgroup Escape Problem Aleksandr Yampolskiy (Yale) Joint work with James Aspnes, Zoë Diamadi, Kristian Gjøsteen, and.
Encryption Public-Key, Identity-Based, Attribute-Based.
Access Control & Digital Rights Management KAIST KSE Uichin Lee.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Identity Based Encryption
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
1 Identity-Based Encryption form the Weil Pairing Author : Dan Boneh Matthew Franklin Presentered by Chia Jui Hsu Date :
1 Queries on Encrypted Data Dan Boneh Brent Waters Stanford UniversitySRI.
CS470, A.SelcukElGamal Cryptosystem1 ElGamal Cryptosystem and variants CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
1 Conjunctive, Subset, and Range Queries on Encrypted Data Dan Boneh Brent Waters Stanford University SRI International.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Ciphertext-Policy, Attribute-Based Encryption Brent Waters SRI International John Bethencourt CMU Amit Sahai UCLA.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
ASYMMETRIC CIPHERS.
Computer Science Public Key Management Lecture 5.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
Xiaohua Jia Shen Zhen Graduate School Harbin Institute of Technology Data Security for Cloud Storage Systems 1.
Functional Encryption: An Introduction and Survey Brent Waters.
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
September 20 th, 2006 U-Prove crypto overview Copyright © 2006, Quebec Inc. Proprietary and Confidential.
Cyrtographic Security Identity-based Encryption 1Dennis Kafura – CS5204 – Operating Systems.
An Ad Hoc Group Signature Scheme for Accountable and Anonymous Access to Outsourced Data Chuang Wang a,b and Wensheng Zhang a a Department of Computer.
1 Attribute-Based Encryption Brent Waters SRI International.
1 Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal Omkant Pandey Amit Sahai Brent Waters UCLA SRI.
Attribute-Based Encryption with Non-Monotonic Access Structures
Computer Science CSC 774 Advanced Network Security Topic 2.6 ID Based Cryptography #2 Slides by An Liu.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Key-Policy Attribute-Based Encryption Present by Xiaokui.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Secure Conjunctive Keyword Search Over Encrypted Data Philippe Golle Jessica Staddon Palo Alto Research Center Brent Waters Princeton University.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Attribute-Based Encryption
1 Efficient Selective-ID IBE Without Random Oracle Dan Boneh Stanford University Xavier Boyen Voltage Security.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Online/Offline Attribute-Based Encryption Brent WatersSusan Hohenberger Presented by Shai Halevi.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Cryptography and Network Security Chapter 13
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Cryptography and Computer Security for Undergraduates
Attribute-Based Encryption
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data An, Sanghong KAIST
Functional Encryption: An Introduction and Survey
Attribute-Based Encryption
Verifiable Attribute Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud They really need a shorter title.
Cryptography Lecture 26.
Presentation transcript:

Functional Encryption: Beyond Public Key Cryptography Brent Waters SRI International test

Protect Private Data Payment Card Industry (PCI) Health Care Web Services

Access Control  OK, so, moving on, let’s look out how people control access to remotely stored files. One general way you might handle this is to have a server decide for you. -- So in this case, when we upload a file, we also provide a policy specifying who should be permitted to access the file. -- Now when another user comes along and authenticates herself to the server somehow, the server can evaluate the policy -- along with metadata the server may have about the user in order to -- make a decision about whether allow access. -- So what are the pros and cons of this general class of approaches to access control?

Security Breaches Intrusion: 45 Million Cards Stolen (Dec. 2006) Physical Media Loss: 25 million U.K. citizens (Nov. 2007)

Access Control by Encryption Idea: Need secret key to access data e.g. PCI Standards SK OK, so, moving on, let’s look out how people control access to remotely stored files. One general way you might handle this is to have a server decide for you. -- So in this case, when we upload a file, we also provide a policy specifying who should be permitted to access the file. -- Now when another user comes along and authenticates herself to the server somehow, the server can evaluate the policy -- along with metadata the server may have about the user in order to -- make a decision about whether allow access. -- So what are the pros and cons of this general class of approaches to access control?

Realistic Data Sharing Problem: Disconnect between policy and mechanism ? Burden on provider OR Professor AND CS255-TA PhD OK, so, moving on, let’s look out how people control access to remotely stored files. One general way you might handle this is to have a server decide for you. -- So in this case, when we upload a file, we also provide a policy specifying who should be permitted to access the file. -- Now when another user comes along and authenticates herself to the server somehow, the server can evaluate the policy -- along with metadata the server may have about the user in order to -- make a decision about whether allow access. -- So what are the pros and cons of this general class of approaches to access control? Sarah: “CS255-TA” “PhD” Kelly: “Professor” “Admissions”

A Fundamental Gap Online-Service Key Lookup Complex Several Keys Key Lookup Group Key Management OR Professor AND CS255-TA PhD OK, so, moving on, let’s look out how people control access to remotely stored files. One general way you might handle this is to have a server decide for you. -- So in this case, when we upload a file, we also provide a policy specifying who should be permitted to access the file. -- Now when another user comes along and authenticates herself to the server somehow, the server can evaluate the policy -- along with metadata the server may have about the user in order to -- make a decision about whether allow access. -- So what are the pros and cons of this general class of approaches to access control? Complex Infrastructure

Functional Encryption A New Vision Functional Encryption OR Professor AND CS255-TA PhD OK, so, moving on, let’s look out how people control access to remotely stored files. One general way you might handle this is to have a server decide for you. -- So in this case, when we upload a file, we also provide a policy specifying who should be permitted to access the file. -- Now when another user comes along and authenticates herself to the server somehow, the server can evaluate the policy -- along with metadata the server may have about the user in order to -- make a decision about whether allow access. -- So what are the pros and cons of this general class of approaches to access control? OR Professor AND CS255-TA PhD Complex Infrastructure

Functional Encryption: A New Perspective Public Parameters SK Cred.=X Access Predicate: f( ) OK, so, moving on, let’s look out how people control access to remotely stored files. One general way you might handle this is to have a server decide for you. -- So in this case, when we upload a file, we also provide a policy specifying who should be permitted to access the file. -- Now when another user comes along and authenticates herself to the server somehow, the server can evaluate the policy -- along with metadata the server may have about the user in order to -- make a decision about whether allow access. -- So what are the pros and cons of this general class of approaches to access control? If f(X)=1 f( )

Why Functional Encryption? Late Binding Access Control: e.g. Network Logs

Why Functional Encryption? Late Binding Access Control: SK e.g. Network Logs Src:123.3.4.77 AND Date: 12/5/07 2ef92a295cbb 98bc39dea94c ... SRC IP=123.12.6.8 Date=12/5/07 Encrypt packet payload, tag with metadata Distribute capabilities later

Why Functional Encryption? Scalability and Robustness: Availability vs. Security Personal Storage Devices

Why Functional Encryption? Efficiency: Scales with policy complexity OR Dean Eng. AND Professor C.S. vs.

Why Functional Encryption? Receiver Privacy: ? AND ACLU Salary > 1M OK, so, moving on, let’s look out how people control access to remotely stored files. One general way you might handle this is to have a server decide for you. -- So in this case, when we upload a file, we also provide a policy specifying who should be permitted to access the file. -- Now when another user comes along and authenticates herself to the server somehow, the server can evaluate the policy -- along with metadata the server may have about the user in order to -- make a decision about whether allow access. -- So what are the pros and cons of this general class of approaches to access control?

A New Vision for Encryption Systems Retrospect: Public vs. Secret Key Cryptography Secure Internet Connections (Public Key Exchange) Online Software Updates (Digital Signatures) The next step forward

Functional Encryption for Formulas [SW05] Line of Research: [SW05, GPSW06,PTMW06, BSW07, BW07, OSW07,KSW08]   MSK OR Professor AND CS255-TA PhD   PK  Key Authority    OR Professor AND CS255-TA PhD (point out that attributes of secret key are mathematically incorporated into the key itself) (after file is encrypted, say we put it on the server) (explain that now, the policy checking happens “inside the crypto”. that is, nobody explicitly evaluates the policies and makes an access decision. instead, if the policy is satisfied, decryption will just work, otherwise it won’t.) SK SK “CS255-TA” “PhD” “CS255-TA” “Undergrad”

Functional Encryption for Formulas PK MSK Setup: “CS255-TA” “PhD” SK KeyGen(MSK, Attrs.): Encrypt(PK ,M, f() ): OR Professor AND CS255-TA PhD “CS255-TA” “PhD” SK Decrypt(SK, CT): OR Professor. AND CS255-TA PhD

A First Approach Question: Can we build functional encryption from standard techniques? Attempt: Public Key Encryption + Secret Sharing

Secret Sharing [S78,B78,BL86] s s ¸A = s A B C ¸B = r ¸C = s-r Use finite field e.g. Zp ¸A = s OR A AND B C ¸B = r ¸C = s-r Ideas extend to more complex sharing

? A First Approach A EA(R) EB(M-R) PKA PKB SKA SKB R M-R Combine S.S. and PKE AND A B EA(R) EB(M-R) PKA PKB ? SKA SKB R SKKevin: “B” M-R SKSarah: “A” Collusion Attack! M

Collusion Attacks: The Key Threat OR Professor AND CS255-TA PhD Need: Key “Personalization” Tension: Functionality vs. Personalization Kevin: “CS255-TA” “Undergrad” James: “PhD” “Graphics”

Elliptic Curve Techniques G : multiplicative of prime order p. (Analogy: Zq*) Intuitive Hardness Discrete Log: Given: g, ga Hard to get: a Bilinear map e: GG  GT e(ga, gb) = e(g,g)ab a,bZp, gG High Level: Single Multiplication Key for satisfying functionality + personalization

System Setup

Key Generation Personalization! SK ‘t’ ties components together

Key Personalization (Intuition) Kevin: “CS255-TA” … SK Random t James: “PhD” … SK Components are incompatible (Formal security proofs in papers) Random t’

Encryption s y1 y2 y3 f ( ) = M ¸1=s ¸2=r ¸3=s-r CT: OR AND y1, ... yn n leaf nodes y1, ... yn f ( ) = M ¸1=s ¸2=r ¸3=s-r CT:

Making it work CT: Goal: Compute and cancel to get M “CS255-TA” “PhD” Message Randomization Goal: Compute and cancel to get M

Making it work CT: SK: Use Bilinear Map for Decryption “CS255-TA” “PhD” Message Randomization Personalized Randomization Use Bilinear Map for Decryption New goal: Personalized to user

Making it work OR AND Shares are personalized (Use Bilinear-Map) “CS255-TA” “PhD” Personalized Randomization OR Professor AND CS255-TA PhD Shares are personalized (Use Bilinear-Map) Linearly Combine

Security Theorem: System is (semantically) secure under chosen key attack Number Theoretic Assumption: Bilinear Diffie-Hellman Exponent [BBG05]

Impact Line of Research: [SW05, GPSW06,PTMW06, BSW07, BW07, OSW07,KSW08] Other Functional Encryption Work: [ACDMS06,C07,CCKN07,CN07,SBCDP07, TBEM08] IBE: [S84,BF01,C01] OK, so, moving on, let’s look out how people control access to remotely stored files. One general way you might handle this is to have a server decide for you. -- So in this case, when we upload a file, we also provide a policy specifying who should be permitted to access the file. -- Now when another user comes along and authenticates herself to the server somehow, the server can evaluate the policy -- along with metadata the server may have about the user in order to -- make a decision about whether allow access. -- So what are the pros and cons of this general class of approaches to access control?

Impact Advanced Crypto Software Collection $ cpabe-setup $ cpabe-keygen -o sarah_priv_key pub_key master_key \ sysadmin it_dept 'office = 1431' 'hire_date = 2002' Advanced Crypto Software Collection Attribute-Based Messaging (UIUC) Group Key Management [CCKN07] Large Scale Content Distribution [TBEM08] Future NIST Standardization

Beyond Access Control Bigger Idea: Functions over encrypted data Only learn function’s output Access Control: All or nothing access OR Professor AND CS255-TA PhD Compute Average 15th highest score Challenge: Oblivious Evaluation Only single keyword predicates [SWP00, BDOP04, BW06]

Beyond Access Control Complex Predicates over data [KSW08] : From = bob@yahoo.com OR From = alice@yahoo.com Can’t tell why matched! Idea: Inner Product Functionality (Multiplication of Bilinear Map) SK CT: Functionality: Polynomial Equations

Medical Studies Collect DNA + medical information Future: Database of sequenced genome AGTACCA... Limit Privacy Loss Gene:TCF2 = AT AND Prostate Cancer

Functional Encryption Summary OR Professor AND CS255TA PhD Complex Infrastructure Tension: Functionality vs. Personalization [SW05, GPSW06,PTMW06, BSW07, OSW07] Going Beyond Access Control [BW06,BW07,KSW08] Fundamental Change: Public Key Cryptography

Thank you