Download presentation
Presentation is loading. Please wait.
Published byRandi Carstensen Modified over 5 years ago
1
Identity Based Encryption from the Diffie-Hellman Assumption
Sanjam Garg University of California, Berkeley (Joint work with Nico DΓΆttling)
2
Private-Key Encryption
πΎ πΎ π π Alice Bob π= πΈππ(πΎ, π)
3
Public-Key Encryption [DH76,RSA78,GM82]
Obtain π π π΅ππ π π π΅ππ πΈππ(π π π΅ππ , π) π Alice Bob
4
Identity-Based Encryption (IBE) [Shamir84, BF01]
Identity of the recipient used as the public key π) π pp Alice Bob First construction based on pairings [BF01] CA/PKG π πΎ
5
Reduce the Gap! ABE [SW05] Hierarchical IBE IBE [Pairing, Lattices]
Public-key crypto Public-Key Encryption Trapdoor Functions Private-key crypto Signatures OWF PRG PRF
6
Our Results Main result: IBE from Computational Diffie-Hellman Assumption (Fully-secure) Or, the hardness of Factoring Avoid impossibilities using non-black-box techniques.
7
Challenge? How do we it?
8
Compress two keys ππ = π π 0 = π π 1
Alice Bob ππ = π π 0 = π π 1 Encryption can be done to either π π 0 or π π 1 knowing just ππ Decryption can be done using π π 0 , π π 1 and the right secret key ππ looses information about π π 0 or π π 1 π π 0 π π 1 ππ Cara π= πΈπ π 2 (ππ, π, π) π
9
How known schemes from stronger assumptions compress two keys?
π π 0 or π π 1 are correlated Structured assumptions Impossibility results: Similar intuition π π 0 π π 1 ππ Our goal: Compress Uncorrelated Keys!
10
Our Construction: Tools
+ Yaoβs Garbled Circuits Hash with Encryption
11
Tool I: Hash with Encryption
Three Algorithms: (π»,πΈ, π·) H π₯ ββ β is short (say π-bits) π₯ is 2π-bits πΈ (β,π,π), π βπ where π β 2π and π β 0,1 π· π, π₯ βπ if π» π₯ =β and π₯ π = π Security: Hard to compute π₯, π₯ β² such that π» π₯ = π» π₯β Security: π₯, πΈ (β,π,1β π₯ π ), 0 βπ₯, πΈ (β,π,1β π₯ π ), 1 Reminiscent of Witness Encryption [GGSW13] or laconic OT [CDGGMP17].
12
Tool I: Hash with Encryption
Hash Parameters π΄ 1,0 π΄ 2,0 π΄ 1,1 π΄ 2,1 β¦ π΄ π,0 π΄ π,1 H π₯ ββ β= πβ[π] π΄ π, π₯ π πΈ (β,π,π), π βπ= π΄ 1,0 π π΄ 2,0 π π΄ 1,1 π π΄ 2,1 π β¦ π΄ π,0 π π΄ π,1 π , β π βπ D π, π₯ : Set β π = πβ[π] π΄ π, π₯ π π Security can be argued based on DDH π π₯ , π π¦ , π π₯π¦ β π π₯ , π π¦ , π π π΄ π,1βπ π
13
Security: ( πΆ , πππ π, π₯ π )βπππ(πΆ π₯ )
Tool 2: Yaoβs Garbled Circuits (πΊπππππ,πΈπ£ππ) [Yao86, AIK04, AIK05, LP09, BHR12] πΊπππππ πΆ β πΆ , ππ π π,0 , ππ π π,1 π πΈπ£ππ πΆ , πππ π, π₯ π βπΆ(π₯) Security: ( πΆ , πππ π, π₯ π )βπππ(πΆ π₯ )
14
How do we compress? ππ = π» π π 0 π π 1 π π 0 π π 1 ππ
15
How do we encrypt? π= πΈπ π 2 (ππ, π, π) π π 0 π π 1 ππ π ππ, π, π π₯
Obfuscation Lens! How do we encrypt? Alice Bob ππ = π» π π 0 π π 1 π π 0 π π 1 ππ π ππ, π, π π₯ Abort if ππ β π» π₯ . If π = 0 then ππ = π₯ 1β¦π else ππ = π₯ π+1β¦ 2π Output πΈππ(ππ, π) Cara π= πΈπ π 2 (ππ, π, π) π
16
How do we encrypt? π= πΈπ π 2 (ππ, π, π) π π 0 π π 1 ππ
Alice Bob ππ = π» π π 0 π π 1 π π 0 π π 1 ππ πΈπ π 2 (ππ, π, π) Circuit πΆ π (ππ) = πΈππ ππ, π πΊπππππ πΆ π β πΆ , ππ π π,0 , ππ π π,1 π β πβ {ππ+1, ππ+π}, πΎβ{0,1} π π,πΎ = πΈ ππ,π,πΎ , ππ π π,πΎ π= πΆ , π π,πΎ Cara π= πΈπ π 2 (ππ, π, π) π
17
How to decrypt? Decrypt π= πΆ , π π,πΎ using π π 1 , π π 2 and π π πΎ
Recall π 1,0 = πΈ ππ,πΎπ+1,0 , ππ π 1,0 and π 1,1 =πΈ ππ,πΎπ+1,1 , ππ π 1,1 which one can be decrypted? π 1,π π πΎ,1 which decrypts to πππ 1,π π πΎ,1 Similarly, for each π decrypt π π,0 or π π,1 Evaluate( πΆ , {πππ π,π π πΎ,π }) outputs πΈππ π π πΎ , π
18
Many new Applications New constructions of cryptographic primitives from weaker computation assumptions Two round MPC [GS17,GS18,BL18,GIS18] TDF [GD18] from CDH Deterministic Encryption [GGH18] from CDH Beats the efficiency of prior works even under DDH Two-round OT [DGHMW19] form CDH First PIR with polylogarithmic communication under DDH [DGMMIO19] (also rate 1-OT and more) Many new techniques: Can lead to several other improvements!
19
Thank You! Questions? ? ?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.