Fuzzy Identity Based Encryption Brent Waters Current Research with Amit Sahai.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Boneh-Franklin Identity-based Encryption. 2 Symmetric bilinear groups G = ágñ, g p = 1 e: G G G t Bilinear i.e. e(u a, v b ) = e(u, v) ab Non-degenerate:
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Securing Critical Unattended Systems with Identity Based Cryptography A Case Study Johannes Blömer, Peter Günther University of Paderborn Volker Krummel.
Attribute-based Encryption
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Building an Encrypted and Searchable Audit Log Brent Waters Dirk Balfanz Glenn Durfee D.K. Smetters.
Information Assurance Management Key Escrow Digital Cash Week 12-1.
Encryption Public-Key, Identity-Based, Attribute-Based.
Public Key Management and X.509 Certificates
Digital Signatures. Anononymity and the Internet.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
RIKE Using Revocable Identities to Support Key Escrow in PKIs Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao State Key Laboratory of Information Security,
Copyright Justin Klein Keane InfoSec Training Encryption.
FIT3105 Smart card based authentication and identity management Lecture 4.
Improving Privacy and Security in Multi- Authority Attribute-Based Encryption Advanced Information Security April 6, 2010 Presenter: Semin Kim.
Identity Based Encryption
1 Identity-Based Encryption form the Weil Pairing Author : Dan Boneh Matthew Franklin Presentered by Chia Jui Hsu Date :
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
1 An ID-based multisignature scheme without reblocking and predetermined signing order Chin-Chen Chang, Iuon-Chang Lin, and Kwok-Yan Lam Computer Standards.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 CPSC156: The Internet Co-Evolution of Technology and Society Lectures 19,20, and 21: April 5, 10, and 12, 2007 Cryptographic Primitives.
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
1 Mon. December 3, 2001A Secure National ID Card Group 8 Chris Marinak Mike Cuvelier Adam Sowers Saud Bangash.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Identity Based Encryption Debdeep Mukhopadhyay Associate Professor Dept of Computer Sc and Engg, IIT Kharagpur.
An Efficient Identity-based Cryptosystem for
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Passwords are not able to keep user safe.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
James Higdon, Sameer Sherwani
1 Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal Omkant Pandey Amit Sahai Brent Waters UCLA SRI.
1 A Secure System Based on Fingerprint Authentication Scheme Author : Zhe Wu,Jie Tian,Liang Li, Cai-ping Jiang,Xin Yang Prestented by Chia Jui Hsu.
Attribute-Based Encryption with Non-Monotonic Access Structures
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
1 Applied Cryptography in CyberTA Brent Waters Work with Dan Boneh and Amit Sahai.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Authentication of Signaling in VoIP Applications Authors: Srinivasan et al. (MIT Campus of Anna University, India) Source: IJNS review paper Reporter:
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
DIGITAL SIGNATURE.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
Attribute-Based Encryption
Pairing based IBE. Some Definitions Some more definitions.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
1 Certification Issue : how do we confidently know the public key of a given user? Authentication : a process for confirming or refuting a claim of identity.
CIA AAA. C I A Confidentiality I A Confidentiality Integrity A.
Secure Socket Layer SSL and TLS. SSL Protocol Peer negotiation for algorithm support Public key encryptionPublic key encryption -based key exchange and.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Lecture 14 Public Key Cryptography and RSA. Summary principles of public-key cryptography principles of public-key cryptography RSA algorithm, implementation,
S/MIME IBE Submissions Terence Spies Voltage Security.
SDSM IN MOBILE CLOUD COMPUTING By- ID NO-1069 K.C. SHARMILAADEVI Sethu Institute Of Tech IV year-ECE Department CEC Batch: AUG 2012.
Boneh-Franklin Identity Based Encryption Scheme
Jim Schaad Soaring Hawk Security
Identity-based deniable authentication protocol
Cryptographic Algorithms for Privacy in an Age of Ubiquitous Recording
Fuzzy Identity Based Encryption
Building an Encrypted and Searchable Audit Log
An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.
Install AD Certificate Services
Transport Layer Security (TLS)
Biometric Wellness Screenings Coming Soon
Attribute-Based Encryption
Electronic Payment Security Technologies
Chapter Goals Define cryptography
Presentation transcript:

Fuzzy Identity Based Encryption Brent Waters Current Research with Amit Sahai

Brent WatersCryptographic Protocols for Memex2 An Emergency Medical Appointment Record visit, test results, etc. Encryption No portable device requirement (can’t carry RSA public key)

Brent WatersCryptographic Protocols for Memex3 Use Identity Based Encryption (IBE) My key is “Aaron Smith”  Public Key is an identifier string  Use global public parameters  Master secret holder(s) can give out private keys to an individual that authenticates themselves  Boneh and Franklin ‘01

Brent WatersCryptographic Protocols for Memex4 Problems with Standard IBE  What should the identities be? Names are not unique Don’t necessarily want to tie to SS#, Driver’s License…  First time users Don’t have identities yet  Certifying oneself to authority can be troublesome Need documentation, etc.

Brent WatersCryptographic Protocols for Memex5 Biometric as an Identity  Biometric stays with human  Should be unique (depends on quality of biometric)  Have identity before registration  Certification is natural

Brent WatersCryptographic Protocols for Memex6 Biometric as an Identity  Biometric measure changes a little each time Environment Difference in Sensors Small change in trait  Cannot use a biometric as an identity in current IBE schemes

Brent WatersCryptographic Protocols for Memex7 Fuzzy Identity Based Encryption A secret key for ID can decrypt a ciphertext encrypted with ID’ iff Hamming Distance(ID,ID’)  d M Private Key for ID Encrypted with ID’

Brent WatersCryptographic Protocols for Memex8 Fuzzy Identity Based Encryption A secret key for ID can decrypt a ciphertext encrypted with ID’ iff Hamming Distance(ID,ID’)  d Private Key for ID Encrypted with ID’

Brent WatersCryptographic Protocols for Memex9 Final points  The biometric input is a public key, not a secret  Work is available on e-print and