Single-bit Re-encryption with Applications to Distributed Proof Systems Nikita Borisov and Kazuhiro Minami University of Illinois at Urbana-Champaign.

Slides:



Advertisements
Similar presentations
Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
Advertisements

Mental Poker The SRA Protocol. What is Mental Poker? Playing poker without cards (ie over telephone or internet). No Trusted Third Party or source of.
Secure Context-sensitive Authorization Kazuhiro Minami and David Kotz Dartmouth College.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Encryption Public-Key, Identity-Based, Attribute-Based.
Digital Signatures and Hash Functions. Digital Signatures.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
7. Asymmetric encryption-
Reusable Anonymous Return Channels
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
Foundations of Network and Computer Security J J ohn Black Lecture #10 Sep 18 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
UCB Security Jean Walrand EECS. UCB Outline Threats Cryptography Basic Mechanisms Secret Key Public Key Hashing Security Systems Integrity Key Management.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
Introduction to Modern Cryptography Homework assignments.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Introduction to Modern Cryptography Lecture 7 1.RSA Public Key CryptoSystem 2.One way Trapdoor Functions.
Theory I Algorithm Design and Analysis (9 – Randomized algorithms) Prof. Dr. Th. Ottmann.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
1 CIS 5371 Cryptography 9. Data Integrity Techniques.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
1 Introduction to Information Security , Spring 2015 Lecture 7: Applied cryptography: asymmetric Eran Tromer Slides credit: John Mitchell, Stanford.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Introduction to Public Key Cryptography
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.
Quadratic Residuosity and Two Distinct Prime Factor ZK Protocols By Stephen Hall.
8. Data Integrity Techniques
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
The RSA Algorithm Rocky K. C. Chang, March
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Cryptography Lecture 8 Stefan Dziembowski
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Great Theoretical Ideas in Computer Science.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
Cryptography, Authentication and Digital Signatures
Lecture 11: Strong Passwords
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
By Yernar.  Background  Key generation  Encryption  Decryption  Preset Bits  Example.
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
1 Public-Key Cryptography and Message Authentication.
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Confidentiality-preserving Proof Theories for Distributed Proof Systems Kazuhiro Minami National Institute of Informatics FAIS 2011.
Scalability in a Secure Distributed Proof System Kazuhiro Minami and David Kotz May 9, 2006 Institute for Security Technology Studies Dartmouth College.
Lightweight Consistency Enforcement Schemes for Distributed Proofs with Hidden Subtrees Adam J. Lee, Kazuhiro Minami, and Marianne Winslett University.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
Network Security Lecture 18 Presented by: Dr. Munam Ali Shah.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Private key
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Breaking Cryptosystems Joshua Langford University of Texas at Tyler Fall 2007 Advisor: Dr. Ramona Ranalli Alger.
1 Introduction to Information Security , Spring 2016 Lecture 4: Applied cryptography: asymmetric Zvi Ostfeld Slides credit: Eran Tromer.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Chapter 29 Cryptography and Network Security
Presentation transcript:

Single-bit Re-encryption with Applications to Distributed Proof Systems Nikita Borisov and Kazuhiro Minami University of Illinois at Urbana-Champaign

Distributed Proof System (DPS) Construct a proof in a peer-to-peer way Useful for distributed authorization: –E.g., SD3, Binder, Grey system, PeerAccess, MK system etc. ?grant(Alice) Location Server Role Server ?doctor_present (room112) ?role(Alice, doctor) True Hospital Alice MRI 112

Integrity and Confidentiality Each peer specifies trust in the correctness of remote facts using rules with quoted facts Each peer protects its private facts with confidentiality policies MRI 112 Location Server ?doctor_present (room112) True grant(P) :- LocationServer says doctor_present(room112) acl(doctor_present(room112)) = {MRI112} MRI112  acl(location(P, room112))

Minami-Kotz (MK) algorithm A peer sends an encrypted fact to a principal who is not authorized to see it BobAlice Dave ?grant(Tom)?role(Tom, doctor) E Bob (True) grant(P) :- Dave says role(P,doctor)role(Tom, doctor) Use a randomized encryption scheme (RSA- OAEP) to prevent dictionary attacks acl(role(P,R)) = {Bob}

Safety of the MK algorithm High level analysis No disclosure of confidential facts to unauthorized parties Implementation-level analysis A covert channel using a random padding in an encrypted value

Our Solution Re-encrytion with Goldwasser-Micali (GM) public-key cryptosystem –Transform the encryption of a single bit into another, while preserving the bit value Commutative encryption scheme –Essentially a n-out-of-n threshold encryption necessary in distributed proof systems

MK Algorithm p 1 ’s knowledgep 2 ’s knowledge acl(f 3 ) = {p 1 }

MK Algorithm p 1 ’s knowledge p 2 ’s knowledge acl(f 3 ) = {p 1 }

Attack on the MK Algorithm p 1 ’s knowledge p 2 ’s knowledge T + ‘013342’ acl(f 3 ) = {p 1 } p 3 is in my proof ! p 4 must be in that proof, too Then, p 4 must have fact f 3 ! 

Attack on the MK Algorithm p 1 ’s knowledge p 2 ’s knowledge ‘Hi’ + ‘013342’ acl(f 3 ) = {p 1 }

Goldwasser-Micali (GM) Scheme with Re-encryption Represent a boolean value based on quadratic residuosity (QR) –True if a (mod n) = b 2 (mod n) –False otherwise Use re-encryption to convert an encrypted value to another BobAlice David a (= b 2 mod n)a’ (= b’ 2 mod n) n = pq

GM Encryption Scheme Public key: (n, x) where x is an NQR modulo n Private key: (p, q) where n = pq Encryption of a bit b: y 2 x b (mod n) where y is a random number With p and q, easy to check whether an encrypted value is a QR or an NQR

Unlinkability via Re-encryption BobAlice Dave a ay 2 mod n n = pq Pick y at random For all QR a and y, there exist QR a’ and y’ such that ay 2 = a’y’ 2 Tom a’

Commutative Encryption We cannot support nested encryption in the MK algorithm (e.g., E i (E j (T)) ) Instead, we support commutative encryption (e.g., E {i,j} (T) ) –Gives more proving power –Preserves the same safety property of the MK algorithm

Construction of Commutative Encryption Represented as a list of encrypted bits E.g., E {0,1,...,n} (b) = (E 1 (b 1 ),E 2 (b 2 ),...,E n (b n )) where b = b 1  b 2 ...  b n To obtain E {i,j} (b) from E {i} (b) 1.Form a pair (E {i} (b), E {j} (0)) 2.Re-randomize the pair by picking a random bit b’, and if b’ = 1 then obtain (E {i} (  b), E {j} (1)) where E {i} (  b) = x i E {i} (b)

Conclusion Identify a covert channel in the MK algorithm Apply single-bit re-encryption based on GM scheme Design a commutative encryption compatible with single-bit re-encryption Future work includes exploration of other applications such as e-voting and online games

Questions?