Updates on Signcryption Yuliang Zheng UNC Charlotte IEEE P1363 Meeting, UCSB 8/22/2002.

Slides:



Advertisements
Similar presentations
April 19-22, 2005SecureIT-2005 How to Start a PKI A Practical Guide Dr. Javier Torner Information Security Officer Professor of Physics.
Advertisements

Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
PKI Introduction Ravi Sandhu 2 © Ravi Sandhu 2002 CRYPTOGRAPHIC TECHNOLOGY PROS AND CONS SECRET KEY SYMMETRIC KEY Faster Not scalable No digital signatures.
Public Key Infrastructure and Applications
PAR for P Title: Standard for Pairing based Cryptographic Techniques June 4, 2005 PAR for IEEE P
Public Key Cryptosystem
UNC Charlotte Purchasing Card Program Annette Heller.
Rennes, 24/10/2014 Cristina Onete CIDRE/ INRIA Privacy in signatures. Hiding in rings, hiding in groups.
MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
BY JYH-HAW YEH COMPUTER SCIENCE DEPT. BOISE STATE UNIVERSITY Proxy Credential Forgery Attack to Two Proxy Signcryption Schemes.
XML Encryption Prabath Siriwardena Director, Security Architecture.
Name:_______________ UNIT 2 TEST (Review / Reteach) DIRECTIONS: Simplify each term. Circle final answers x 3+7 5x x
Hybrid Signcryption with Insider Security Alexander W. Dent.
Software based Acceleration Methods for XML Signature (Or: is there such a method) Youjin Song DongGuk University, Korea Yuliang Zheng University of North.
Secure Group Communications Using Key Graphs Chung Kei Wong, Member, IEEE, Mohamed Gouda Simon S. Lam, Fellow, IEEE Evgenia Gorelik Yuksel Ucar.
Introduction to Signcryption November 22, /11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made.
Hybrid Signcryption with Outsider Security
The Idea of Public Key Cryptography Cunsheng Ding HKUST, Hong Kong.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Building Better Signcryption Schemes with Tag-KEMs Tor E. Bjørstad and Alexander W. Dent University of Bergen, Norway Royal Holloway, University of London,
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Galileo - Knowledge Testing Service e-MSoft Artur Majuch.
Digital signature in automatic analyses for confidentiality against active adversaries Ilja Tšahhirov, Peeter Laud.
1 Lesson Internet Organization network Fire wall.
An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang.
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
×Key Distribution : Negotiation ×Key Management : N*(N-1)/2.
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
 A Web service is a method of communication between two electronic devices over World Wide Web.
IEC TC57 WG15 - Security Status & Roadmap, TC57 Plenary, May 2007
1 Integrating digital signatures with relational database: Issues and organizational implications By Randal Reid, Gurpreet Dhillon. Journal of Database.
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
MARK B. JONES PKI DEPLOYMENT FORUM MADISON, WI APRIL 16 TH, 2008 Why do I need a Digital ID?
Coded Modulation and the Arrival of Signcryption Yuliang Zheng University of North Carolina at Charlotte Enhancing Crypto-Primitives with.
Elliptic Curve Cryptography
COMP 424 Computer Security Lecture 09 & 10. Protocol ● An orderly sequence of steps agreed upon by two or more parties in order to accomplish a task ●
Appendix 5 Peer Institution Comparisons. UNC Charlotte Versus Peer Institutions Mean Total Score Comparison Possible Score Range (400 – 500)
Doc.: IEEE /1147r1 Submission November 2009 David Halasz, AclaraSlide 1 Path Protection Date: Authors:
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
Chapter 5a - Pretty Good Privacy (PGP)
Significant Figures & Scientific Notation
Understanding Significant Figures
SIGNIFICANT DIGITS INTRODUCTION
Rounding to Significant Figures
Cryptography and Network Security
Presented by: Dr. Munam Ali Shah
تحليل يك طرح جديد امضارمز
Digital Signatures Last Updated: Oct 14, 2017.
Class 2 Digital Signature Certificate Noida
Significant Figures.
©2009 – Not to be sold/Free to use
Secure Electronic Transaction (SET)
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
Certificate Enrollment Process
IEEE MEDIA INDEPENDENT HANDOVER DCN: MuGM
SIGNCRYPTION Dr. Attila A. Yavuz.
CDK: Chapter 7 TvS: Chapter 9
Digital Signatures Reference: Pfleeger , Charles P., Security in Computing, 2nd Edition, Prentice Hall, /7/2019 Ref: Pfleeger96, Ch.4.
Handbook of Applied Cryptography - CH11, from 11.5~11.8
e-Security Solutions Penki Kontinentai Vladas Lapinskas
Breaking Factors into Smaller Factors
Published in 2016 International Computer Symposium (ICS) Authors
Breaking Each Number Into Its Place Value
A Distributed Sign-and-Encryption for Anonymity
Introduction to Encryption Technology
National Trust Platform
Presentation transcript:

Updates on Signcryption Yuliang Zheng UNC Charlotte IEEE P1363 Meeting, UCSB 8/22/2002

Signcryption Provides the functions of –digital signature unforgeability & non-repudiation –public key encryption confidentiality Has a significantly smaller comp. & comm. cost Cost (signcryption)<<Cost (signature) + Cost (encryption)

Signcryption -- public & secret parameters Public to all –p : a large prime –q : a large prime factor of p-1 –g : 0<g<p & with order q mod p –G: 1-way hash –H: 1-way hash –(E,D) : private-key encryption & decryption algorithms

Signcryption -- 1st example m(c,r,s)m

Signcryption – 2nd example m(c,r,s)m

Signcryption – 3rd example m(c,r,s)m

Major instantiations of signcryption based on DL on an Elliptic Curve –Zheng, CRYPTO97 –Zheng & Imai IPL 1998 based on other sub-groups (e.g. XTR) –Lenstra & Verheul, CRYPTO2000 –Gong & Harn, IEEE-IT 2000 –Zheng, CRYPTO97 based on DL on finite field –Zheng, CRYPTO97 based on factoring / residuosity –Steinfeld & Zheng, ISW2000 –Zheng, PKC2001 More efficient

Signcryption v.s. Signature-then- Encryption (a) Signcryption based on DL m sig EXP= (c) Signature-then-Encryption based on DL m sig gxgx EXP= (b) Signature-then-Encryption based on RSA m sig EXP=2+2

DL Signcryption v.s. sign-then-encrypt |p|=|n| # of multiplications

DL Signcryption v.s. sign-then-encrypt comm. overhead (# of bits) |p|=|n|

Security Proofs Analysis given in the Crypto97 paper was informal In 2001, –Rigorous proofs (reductions) established –Results presented at PKC02 in Paris, Feb –Proof techniques applicable to signcryption schemes based on DL and EC

Standard assumptions Proofs for the confidentiality and unforgeability of signcryption – Confidentiality --- Providing a reduction from breaking the security of signcryption with respect to adaptive chosen ciphertext attacks in the flexible public key model to breaking the GAP Diffie-Hellman assumption, in the random oracle model –Unforgeability --- Providing a reduction from breaking the unforgeability of signcryption against adaptive chosen message attacks to the Discrete Logarithm problem, in the random oracle model

Updated documents Full version of the proof paper and updated descriptions of concrete signcryption schemes will be submitted to the IEEE P1363 website

Other developments Security proofs for combined signature and encryption including signcryption Parallel signcryption ID-based signcryption Threshold signcryption

Suggestions IEEE P1363 consider to standardize signcryption and other hybrid/combined schemes IEEE P ?