The Dual Receiver Cryptosystem and its Applications Presented by Brijesh Shetty.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Signatures for Network Coding Denis Charles Kamal Jain Kristin Lauter Microsoft Research.
Public Key Infrastructure and Applications
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Boneh-Franklin Identity-based Encryption. 2 Symmetric bilinear groups G = ágñ, g p = 1 e: G G G t Bilinear i.e. e(u a, v b ) = e(u, v) ab Non-degenerate:
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Public Key Cryptosystem
An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
Lect. 11: Public Key Cryptography. 2 Contents 1.Introduction to PKC 2.Hard problems  IFP  DLP 3.Public Key Encryptions  RSA  ElGamal 4.Digital Signatures.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
1 Identity-Based Encryption form the Weil Pairing Author : Dan Boneh Matthew Franklin Presentered by Chia Jui Hsu Date :
Introduction to Modern Cryptography Homework assignments.
Overview of Cryptography Anupam Datta CMU Fall A: Foundations of Security and Privacy.
CS470, A.SelcukElGamal Cryptosystem1 ElGamal Cryptosystem and variants CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Public Key Model 8. Cryptography part 2.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
Bob can sign a message using a digital signature generation algorithm
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
James Higdon, Sameer Sherwani
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Computer Science CSC 774 Advanced Network Security Topic 2.6 ID Based Cryptography #2 Slides by An Liu.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Digital Signatures, Message Digest and Authentication Week-9.
Lecture 2: Introduction to Cryptography
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Elliptic Curve Cryptography
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
COEN 351 E-Commerce Security
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Identity Based Encryption
Information Security message M one-way hash fingerprint f = H(M)
Public Key Encryption and Digital Signatures
RSA and El Gamal Cryptosystems
IEEE TRANSACTIONS ON INFORMATION THEORY, JULY 1985
Information Security message M one-way hash fingerprint f = H(M)
Real-world Security of Public Key Crypto
Information Security message M one-way hash fingerprint f = H(M)
El Gamal and Diffie Hellman
One Way Functions Motivation Complexity Theory Review, Motivation
How to Use Charm Crypto Lib
Presentation transcript:

The Dual Receiver Cryptosystem and its Applications Presented by Brijesh Shetty

Overview  Dual Receiver Cryptosystem – Concept  Interesting Applications  Combined Cryptosystem  Useful Puzzle Solving

Dual Receiver Cryptosystem  Encryption Scheme  Ciphertext can be decrypted by two independent receivers!  Bilinear Diffie Hellman Assumption (based on elliptic curves)

Elliptic Curve based Discrete Log problem  Given Y = k. P and Y,P (i.e P added to itself k times) Find k ????  (P,P)---  g (Y,P)---  h  By definition of Bilinear Curve, we get h = g k [since (aP,bQ)=(P,Q) ab ] (Y,P)=(kP,P)=(P,P) k =g k

“ Key Escrow ” (in the context of Dual receiver)  An arrangement where keys needed to decrypt encrypted data must be held in escrow by a third party.  Eg. Govt. agencies can use it to decrypt messages which they suspect to be relevant to national security.

Dual Receiver Cryptosystem Ciphertext C Message m Encrypt using public keys of B and C B C A Decrypts to m C can also decrypt! C does not learn about the private keys of B or A !!

Dual Receiver Cryptosystem - The Scheme  Some Definitions  (Semantically secure) Dual Receiver Cryptosystem scheme

Definitions (Randomised algorithms)  Key Generation algorithm K(k) = (e,d) & (f,g)  Encryption algorithm E e,f (m) = c

Definitions (contd..)  Decryption Algorithm D D d,f (c) = m  Recovery Algorithm R R e,g (c) = m

Dual Receiver Cryptosystem - The Scheme  Some Definitions  (Semantically secure) Dual Receiver Cryptosystem scheme

Semantically secure Dual Receiver Cryptosystem B C A (x, xP) (y, yP) Message m Random r (u1,u2,u3) private H x is a hash fn associated with public key xP

Semantically secure Dual Receiver Cryptosystem B C A (x, xP) (y, yP) Message m Random r u1 = rP u2 = yP u3 = m+ H x ( r )

Decryption B x = x = r = xyr U3 + Hx( r ) = m

Recovery (Second Receiver) C y = y = r = xyr U3 + Hx( r ) = m

Dual Receiver Cryptosystem - The Scheme  Some Definitions  (Semantically secure) Dual Receiver Cryptosystem scheme

Overview  Dual Receiver Cryptosystem – Concept  Interesting Applications  Combined Cryptosystem  Useful Puzzle Solving

Combined Cryptosystem  We combine using a single key x  Dual Receiver Encryption  Signature

Signature (in Combined scheme)  Same key x. Hash I:{0,1} n -> G1 A B Sign the hash Message m σ = x. I(m)

Verification.. B Verify = B has m, σ If they are same both must be equal x

Combined Cryptosystem  What is so special?  Dual receiver encryption facilitates escrow of the decryption capability & non escrow of the signature capability using the same key!!  The security of either of the schemes is not compromised

Overview  Dual Receiver Cryptosystem – Concept  Interesting Applications Combined Cryptosystem  Useful Security Puzzles

Useful Security Puzzles  Application Areas When Server wants to rate-limit the clients (against DOS attacks) Lighten the server’s computational burden  Example : File Server

File Server (Security Puzzle) Client Abcde …… File Server ¤¥§~¶ ……. Ks E ke,Ka (Ks) (C1,C2) [ ] STORING FILE

File Server … (Request File) ¤¥§~¶ ……. (C1,C2) [ ] C1, P a Compute D Pa,Ke (C1) Random p C1 = E ke,Ka (p) u1 = Ks+ G(p) u2 = F(p,Ks,C1,u1) C2 = [u1,u2] G, F are hashes TD1 G(TD1)+u1 = m Check u2=F(p,m,c,u1) Client Decryption.. Computation intensive XOR and hash Dual Receiver Encrytpion

Thank you