Controlled Algebras and GII’s Ronald L. Rivest MIT CSAIL IPAM Workshop October 9, 2006.

Slides:



Advertisements
Similar presentations
ONE WAY FUNCTIONS SECURITY PROTOCOLS CLASS PRESENTATION.
Advertisements

1 Complexity ©D.Moshkovitz Cryptography Where Complexity Finally Comes In Handy…
Many-to-one Trapdoor Functions and their Relations to Public-key Cryptosystems M. Bellare S. Halevi A. Saha S. Vadhan.
An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
Scott CH Huang COM5336 Cryptography Lecture 14 XTR Cryptosystem Scott CH Huang COM 5336 Cryptography Lecture 10.
7. Asymmetric encryption-
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
ELECTRONIC PAYMENT SYSTEMSFALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the orderQuestions? Review.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Identity Based Encryption
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
1 Identity-Based Encryption form the Weil Pairing Author : Dan Boneh Matthew Franklin Presentered by Chia Jui Hsu Date :
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
Pass in HW6 now Can use up to 2 late days Can use up to 2 late days But one incentive not to burn them all: teams will get to pick their presentation day.
Chapter 7-1 Signature Schemes.
Hidden pairings and trapdoor DDH groups Alexander W. Dent Joint work with Steven D. Galbraith.
Strongly Secure Certificateless Encryption Alexander W. Dent Information Security Group
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Introduction to Modern Cryptography Lecture 7 1.RSA Public Key CryptoSystem 2.One way Trapdoor Functions.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
Lecture 6: Public Key Cryptography
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Digital Signatures (DSs) The digital signatures cannot be separated from the message and attached to another The signature is not only tied to signer but.
Realizing Hash and Sign Signatures under Standard Assumptions Realizing Hash and Sign Signatures under Standard Assumptions Susan Hohenberger Johns Hopkins.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
The RSA Algorithm Rocky K. C. Chang, March
10.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Symmetric-Key Cryptography.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
An Efficient Identity-based Cryptosystem for
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
A New Approach on Bilinear Pairings and Its Applications Tatsuaki Okamoto.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
1 Lect. 13 : Public Key Encryption RSA ElGamal. 2 Shamir Rivest Adleman RSA Public Key Systems  RSA is the first public key cryptosystem  Proposed in.
Improved Non-Committing Encryption with Application to Adaptively Secure Protocols joint work with Dana Dachman-Soled (Columbia Univ.), Tal Malkin (Columbia.
Cryptography Lecture 9 Stefan Dziembowski
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
1 Network and Computer Security (CS 475) Modular Arithmetic and the RSA Public Key Cryptosystem Jeremy R. Johnson.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
CS Modular Division and RSA1 RSA Public Key Encryption To do RSA we need fast Modular Exponentiation and Primality generation which we have shown.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
On the Notion of Pseudo-Free Groups Ronald L. Rivest MIT Computer Science and Artificial Intelligence Laboratory TCC 2/21/2004.
11 RSA Variants.  Scheme ◦ Select s.t. p and q = 3 mod 4 ◦ n=pq, public key =n, private key =p,q ◦ y= e k (x)=x (x+b) mod n ◦ x=d k (y)=  y mod n.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Impossibility proofs for RSA signatures in the standard model Pascal Paillier Topics in Cryptology – CT-RSA 2007.
1 Introduction to Information Security , Spring 2016 Lecture 4: Applied cryptography: asymmetric Zvi Ostfeld Slides credit: Eran Tromer.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Elliptic Curve Public Key Cryptography Why ? ● ECC offers greater security for a given key size. ● The smaller key size also makes possible much more compact.
Public Key Encryption Major topics The RSA scheme was devised in 1978
Asymmetric-Key Cryptography
On the Notion of Pseudo-Free Groups
Boneh-Franklin Identity Based Encryption Scheme
B504/I538: Introduction to Cryptography
Cryptographic protocols 2014, Lecture 2 assumptions and reductions
Digital Signatures.
Where Complexity Finally Comes In Handy…
Where Complexity Finally Comes In Handy…
The power of Pairings towards standard model security
Where Complexity Finally Comes In Handy…
Presentation transcript:

Controlled Algebras and GII’s Ronald L. Rivest MIT CSAIL IPAM Workshop October 9, 2006

Outline u Controlled algebras u Trapdoor discrete log groups u Black box & pseudo-free groups u Groups with infeasible inverses u Transitive signatures u Trapdoor pairings

Algebra u ( S 1, S 2, op 1, op 2, …, op n ) u Algebra is set(s) with operation(s). u Abstract algebra is mathematical object. u Instantiation is computational object: –Each element of set has one or more representations. –Each operation has associated computational procedure.

Controlled Algebra u ( S, op 1, op 2, op 3, op 4, …, op n )  F F I T T u Control computation of each operation: – F (feasible or public: public poly-time algorithm) – I (infeasible: no poly-time alg. exists) – T (trapdoor: polytime only with trapdoor information) u Which controlled algebras can we make?

Controlled Groups u Group operations: –Identity: produces identity element e –Generator(s): produces generator(s) –Sample: produces random element –Multiply: group operation –Invert: given x, compute x -1 –Equal: test equality of elements –Canonical: give canonical rep of element –Discrete log, root, DDH, CDH, hash, … u Each separately controlled…

Analogy: gene expression u One of the marvelous features of the way DNA works is that the semantics of the gene (i.e., what protein is made) is decoupled from the control of its expression. Semantics and control may evolve separately. control protein

Example: Trapdoor DL groups u (See Dent and Galbraith 2006) u Generator g: public, generates G = u Multiplication (group opn): public u Discrete logarithm: trapdoor u Applications: key agreement, encryption. (Publish group description as public key…)

Trapdoor DL groups u Open problem to construct practical trapdoor DL groups. u Paillier cryptosystem comes close. u Dent & Galbraith also propose pairing-based approach; large tables required.

Black box group u Controlled group related to notion of black box group (group operation efficient; others, such as discrete log, may not be) which is “essentially the same” as (“just”) the mathematical object. u Some attempts to have “computational black box group” (Frey; Galbraith) via “disguised elliptic curves” or other techniques, for specific groups.

“Pseudo-free” Group u Notion introduced by Hohenberger (2003), refined by Rivest (2004). u Group is (strongly) “pseudo-free” if adversary can’t find solution to any “non-trivial” equation (i.e. one that has no solution in free group). u Micciancio (2005) showed that Z n * where n=pq is pseudo-free (given “strong RSA assumption”).

Groups with Infeasible Inverses (GII’s) u Want group operation to be easy, but computing inverses to be hard (for everyone). u GII’s introduced by Susan Hohenberger in her MS thesis; also studied by David Molnar, Vinod Vaikuntanathan. u Open problem to make GII’s under reasonable assumptions.

GII’s imply Key Agreement u (Hohenberger; Rabi/Sherman) u Alice draws random elts: x, y u Alice sends Bob: xy, y u Bob draws random elt: z u Bob sends Alice yz u Both compute K = (xy)z = x(yz)

Security Argument [H] u An Eve who can guess K=xyz from (xy,y,yz) can invert random elts. u Choose a at random u Give Eve xy = a i, y = a j, yz = a k where i-j+k=-1. u Then K = a i-j+k = a -1.

Strongly Associative OWF’s u (Introduced by Rabi/Sherman) u Associative function f(.,.) on set S u Easy to compute f(x,y) given x, y u Given f(x,y) and y, hard to compute any x’ such that f(x’,y) = f(x,y). u Hemaspaandra and Rothe show that SAOWF and OWF are black-box equivalent on non-structured domains. u But on a group, SAOWF = GII’s.

Trapdoor GII’s (TGII’s) u GII except some trapdoor information allows computation of inverses. u Any finite GII is really TGII, since knowing group order allows computation of inverses. However, it may be possible to generate a GII without anyone knowing group order…

Applications of TGII’s u Vaikuntanathan (2003) has shown how to implement IBE using any TGII that has an efficient algorithm for sampling a random element together with its inverse. u Is this only known sufficient condition for IBE outside of bilinear maps?

Vaikuntanathan’s IBE construction u Let G be a TGII, h 1 h 2 hash functions. u Given ID, define g ID = h 1 (ID) u Define sk ID = g ID -1 (using trapdoor) u To encrypt m, pick r randomly, then: C = (r g ID, m  h 2 (r)) u To decrypt (s,t) compute m = t  h 2 (s sk ID ) u (Sampling of pairs (a,a -1 ) needed, but only in reduction proof, for ID-CPA security.)

How to construct GII or TGII?? u Order of group must be hidden. u RSA group (Z n * ) has hidden order, but inverses are unfortunately easy. u Maybe use “trusted oracle” to provide interface for composition / sampling / comparing elements, but not inversion. All reps are encrypted. (Saxena and Soh) u Open problem!

Transitive Signatures u (due to Micali/Rivest) u Signature scheme on pairs of elts (think of σ(a,b) as sig on edge (a,b) ) u DTS (Directed Transitive Signatures) Given σ(a,b) and σ(b,c), anyone can compute σ(a,c) u UTS (Undirected TS) Given σ(a,b), easy to compute σ(b,a)

Transitive signatures a c b σ(a,b)σ(b,c) σ(a,c) Potential applications to cert chains…

Some relationships (see [H]) KA GII TGIITDP PKE OWF OT DTS UTS SDS TDL BM

Constructing a DTS from TGII u Simple way to build a directed transitive signature scheme from a TGII: –Signature on (a,b) is just a/b u But is this secure???

Trapdoor pairings u A group with a bilinear map, except that one needs trapdoor information to compute the pairing function. (Rivest (2004), Dent & Galbraith (2006))

Applications of trapdoor pairings u ID scheme (Dent & Galbraith): Alice is only one who can correctly compute DDH results on challenges (g a, g b, g ab ) or (g a, g b, g c ) u Making various flavors of signature schemes (ID-based, aggregate, ring, …) into “designated verifier” schemes

Construction of trapdoor pairings u Use elliptic curve over Z n where n=pq (Dent & Galbraith 2006) u “Disguised elliptic curves” (Dent & Galbraith, Galbraith 2006) Parameters may have to be extremely large…

Summary – Open problems 1. Construct practical trapdoor DL groups. 2. Make groups with infeasible inversion (GII’s), under reasonable assumptions. 3. Make better trapdoor pairings. 4. Prove that simple TGII---->DTS construction is secure (or fix it).

Acknowledgments u Thanks to Susan Hohenberger, David Molnar, and Vinod Vaikuntanathan for helpful suggestions and comments….

(The End)