Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.

Slides:



Advertisements
Similar presentations
Efficient Lattice (H)IBE in the standard model Shweta Agrawal, Dan Boneh, Xavier Boyen.
Advertisements

Boneh-Franklin Identity-based Encryption. 2 Symmetric bilinear groups G = ágñ, g p = 1 e: G G G t Bilinear i.e. e(u a, v b ) = e(u, v) ab Non-degenerate:
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Many-to-one Trapdoor Functions and their Relations to Public-key Cryptosystems M. Bellare S. Halevi A. Saha S. Vadhan.
An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
Dan Boneh Public key encryption from Diffie-Hellman ElGamal Variants With Better Security Online Cryptography Course Dan Boneh.
Encryption Public-Key, Identity-Based, Attribute-Based.
Foundations of Cryptography Lecture 13 Lecturer: Moni Naor.
New Efficient Searchable Encryption Schemes from Bilinear Pairings Author:Chunxiang Gu and Yuefei Zhu International Journal of Network Security, 2007 Presenter:
7. Asymmetric encryption-
1 IDENTITY BASED ENCRYPTION SECURITY NOTIONS AND NEW IBE SCHEMES FOR SAKAI KASAHARA KEY CONSTRUCTION N. DENIZ SARIER.
YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
1 Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the orderQuestions? Review.
Identity Based Encryption
The RSA Cryptosystem and Factoring Integers (II) Rong-Jaye Chen.
1 Conjunctive, Subset, and Range Queries on Encrypted Data Presenter: 陳國璋 Lecture Notes in Computer Science, 2007 Dan Boneh and Brent Waters.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
1 Identity-Based Encryption form the Weil Pairing Author : Dan Boneh Matthew Franklin Presentered by Chia Jui Hsu Date :
Practical Techniques for Searches on Encrypted Data Author: Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀銘偉.
A Designer’s Guide to KEMs Alex Dent
1 Queries on Encrypted Data Dan Boneh Brent Waters Stanford UniversitySRI.
Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍.
Pass in HW6 now Can use up to 2 late days Can use up to 2 late days But one incentive not to burn them all: teams will get to pick their presentation day.
1 Conjunctive, Subset, and Range Queries on Encrypted Data Dan Boneh Brent Waters Stanford University SRI International.
Practical Techniques for Searches on Encrypted Data Author:Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀汶承.
Strongly Secure Certificateless Encryption Alexander W. Dent Information Security Group
1 Secure Indexes Author : Eu-Jin Goh Presented by Yi Cheng Lin.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Improved Searchable Public Key Encryption with Designated Tester Author : Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee Presenter: Li-Tzu.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
1 CIS 5371 Cryptography 9. Data Integrity Techniques.
Building an Encrypted and Searchable Audit Log 11th Annual Network and Distributed Security Symposium (NDSS '04); 2004 February 5-6; San Diego; CA. Presented.
Public Key Encryption that Allows PIR Queries Dan Boneh 、 Eyal Kushilevitz 、 Rafail Ostrovsky and William E. Skeith Crypto 2007.
1 Introduction to Information Security , Spring 2015 Lecture 7: Applied cryptography: asymmetric Eran Tromer Slides credit: John Mitchell, Stanford.
Dan Boneh Public Key Encryption from trapdoor permutations Public key encryption: definitions and security Online Cryptography Course Dan Boneh.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
8. Data Integrity Techniques
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2014 Nitesh Saxena.
1 Hierarchical Identity-Based Encryption with Constant Size Ciphertext Dan Boneh, Xavier Boyen and Eu-Jin Goh Eurocrypt 2005 投影片製作:張淑慧.
An Efficient Identity-based Cryptosystem for
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
Cyrtographic Security Identity-based Encryption 1Dennis Kafura – CS5204 – Operating Systems.
1 Lect. 13 : Public Key Encryption RSA ElGamal. 2 Shamir Rivest Adleman RSA Public Key Systems  RSA is the first public key cryptosystem  Proposed in.
Computer Science CSC 774 Advanced Network Security Topic 2.6 ID Based Cryptography #2 Slides by An Liu.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
Cryptography Lecture 9 Stefan Dziembowski
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Secure Conjunctive Keyword Search Over Encrypted Data Philippe Golle Jessica Staddon Palo Alto Research Center Brent Waters Princeton University.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
Prepared by Dr. Lamiaa Elshenawy
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Public Key Encryption with Keyword Search
1 Efficient Selective-ID IBE Without Random Oracle Dan Boneh Stanford University Xavier Boyen Voltage Security.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
Homework #2 J. H. Wang Oct. 31, 2012.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Information Security and Management 10. Other Public-key Cryptosystems Chih-Hung Wang Fall
1 Introduction to Information Security , Spring 2016 Lecture 4: Applied cryptography: asymmetric Zvi Ostfeld Slides credit: Eran Tromer.
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Searchable Encryption in Cloud
Identity Based Encryption
Boneh-Franklin Identity Based Encryption Scheme
J. Byun et al. In Secure Data Management, LNCS 4165,
Presentation transcript:

Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻

Problem(1/2) Pre-stored data Search Ciphertext user untrusted server

Problem(2/2) User1(Alice) User2(Bob) receive send mail server

Properties Query isolation: The un-trusted server can not learn anything more about the plaintext than the search result. Controlled searching: The un-trusted server can not search for an arbitrary word without the user’s authorization. Hidden queries: The user may ask the un- trusted server to search for a secret word without revealing the word to the server.

Public key encryption with search: definitions (1/4) Bob wants to mail to Alice, then he sends the following message: Our goal is to enable Alice to send Tw to mail server that will enable the server to all messages containing the keyword W. And server simply sends the relevant back to Alice. We call it “search public-key encryption”.

Public key encryption with search: definitions (2/4) User1(Alice) User2(Bob) receive Send mail server Search Bob’s

Public key encryption with search: definitions (3/4) Def. A non-interactive public key encryption with keyword search scheme consists of the following polynomial time randomized algorithms:

Public key encryption with search: definitions (4/4)

PEKS implies Identity Based Encryption Public key encryption with keyword search is related to Identity Based Encryption (IBE). Constructing a secure PEKS appears to be a harder problem than constructing an IBE. Lemma 2.3 A non-interactive searchable encryption scheme (PEKS) that is semantically secure against an adaptive chosen keyword attack gives rise to a chosen ciphertext secure IBE system (IND-ID-CCA).

PEKS implies Identity Based Encryption Proof sketch: Given a PEKS (KeyGen, PEKS, Trapdoor, Test) the IBE system is as follow: 1. Setup: Run the PEKS KeyGen algorithm to generate. The IBE system parameter are. The master-key is. 2.KeyGen: the IBE private key associated with a public key is

PEKS implies Identity Based Encryption 3.Encrypt: Encrypt a bit using a public key as: 4.Decrypt: To decrypt using the private. Output ‘0’ if and output ‘1’ if

PEKS implies Identity Based Encryption The resulting system is IND-ID-CCA assuming the PEKS is semantically secure against an adaptive chosen message attack. Building non-interactive public-key searchable encryption is at least as hard as building an IBE system.

Constructions Two constructions for public-key searchable encryption: (1) an efficient system based on a variant of Decision Diffie-Hellman assumption. (assuming a random oracle) (2) a limited system based on general trapdoor permutations, but less efficient. (without assuming the random oracle)

Diffie-Hellman 鑰匙交換的運作程序 n 與 g 為公開值 雙方各選一個較大的數值 x 與 y 計算出『秘密鑰匙』: g xy mod n

驗證 Diffie-Hellman 演算法 Alice 選定: n = 47, g =3, x=8, 計算出:  g x mod n = 3 8 mod 47 = 28 mod 47  訊息 (1) = {47, 3, 28} Bob 選定: y =10, 計算出:  g y mod n = 3 10 mod 47 = 17 mod 47  訊息 (2) = {17} Alice 計算會議鑰匙:  (g x mod n) y = g xy mod n = mod 47 = 4 mod 47 Bob 計算會議鑰匙:  (g y mod n) x = g xy mod n = 17 8 mod 47 = 4 mod 47 會議鑰匙 k= 4

Construction using bilinear maps(1/5) Our first construction is based on a variant of the Computational Diffie-Hellman problem. Boneh and Franklin [2] used bilinear maps on elliptic curves to build an efficient IBE system.

Construction using bilinear maps(2/5) Using two groups of prime order p and a bilinear map between them. The map satisfies : 1.Computable: given there is a polynomial time algorithms to compute 2.Bilinear: for any integer then 3.Non-degenerate: if g is a generator of then is a generator of

Construction using bilinear maps(3/5) We build a non-interactive searchable encryption scheme from such a bilinear map. hash functions H1 : {0, 1} *→ G1 and H2 : G2 → KeyGen:Input security parameter determines the size, p, of the groups G1 and G2. Picking a random and generator g of G1. Output

Construction using bilinear maps(4/5) PEKS : compute for a random. Output PEKS = Trapdoor Test Test if If so, output ‘yes’ ; otherwise, output ‘no’.

Construction using bilinear maps(5/5) Compute Since, right=left. if Test outputs ‘yes’ then the mail server sends the Bob’s mail to Alice.

Conclusion Constructing a PEKS is related to Identity Based Encryption (IBE), though PEKS seems to be harder to construct. Our constructions for PEKS are based on recent IBE constructions. We are able to prove security by exploiting extra properties of these schemes. How to use to the following idea?

idea User1(Alice) User2(Bob) Store Search Ciphertext Untrusted server

加密搜尋系統 user 陳昱圻

Introduction 單一 user 資料只有自己可以取得 Server 只負責比對 視窗介面 ( 預計先設計單機 )

Outline 身份認證 ( 確定為有權限 user) 讀取明文 顯示文字 執行加密 輸出密文 並得到 trapdoor 搜尋時讓 server 去做比對 進而到多機版本

Construction 中間過程方法採用 Practical Techniques for Searches on Encrypted Data 這篇所提到的方 法, 而後如果有增加可在做修改 文字處理 : 每個 word 皆轉成 ASCII code 並在 加密後長度一樣 ( asm/ap04.html) asm/ap04.html Server 只存資料 而 user 要知道 keyword 才能丟 給伺服器做搜尋動作

Construction(cont.) Pre-stored data, with E(W) Search, with Trapdoor Ciphertext user untrusted server User(Document, Word, Trapdoor) Server(E(W), Trapdoor)