Identity Based Encryption

Slides:



Advertisements
Similar presentations
Boneh-Franklin Identity-based Encryption. 2 Symmetric bilinear groups G = ágñ, g p = 1 e: G G G t Bilinear i.e. e(u a, v b ) = e(u, v) ab Non-degenerate:
Advertisements

An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
Encryption Public-Key, Identity-Based, Attribute-Based.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Identity Based Encryption
1 Identity-Based Encryption form the Weil Pairing Author : Dan Boneh Matthew Franklin Presentered by Chia Jui Hsu Date :
Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
Identity-based authenticated key agreement protocol based on Weil pairing N.P.Smart ELECTRONICS LETTERS 20 th June 2002 vol.38 No13 p Present by.
Public Key Cryptography
Public Encryption: RSA
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
An Efficient Identity-based Cryptosystem for
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
Cyrtographic Security Identity-based Encryption 1Dennis Kafura – CS5204 – Operating Systems.
James Higdon, Sameer Sherwani
Public-Key Cryptography CS110 Fall Conventional Encryption.
The Dual Receiver Cryptosystem and its Applications Presented by Brijesh Shetty.
Computer Science CSC 774 Advanced Network Security Topic 2.6 ID Based Cryptography #2 Slides by An Liu.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
By Yernar.  Background  Key generation  Encryption  Decryption  Preset Bits  Example.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Center for Information Security Technologies ID-based Authenticated Key Exchange for Low-Power Mobile Devices K. Y. Choi, J. Y. Hwang, D. H. Lee CIST,
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Linkability of Some Blind Signature Schemes Swee-Huay Heng 1, Wun-She Yap 1 Khoongming Khoo 2 1 Multimedia University, 2 DSO National Laboratories.
Cryptanalysis of Some Proxy Signature Schemes without Certificates Wun-She Yap, Swee-Huay Heng Bok-Min Goi Multimedia University.
Pairing Based Cryptography Standards Terence Spies VP Engineering Voltage Security
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Pairing based IBE. Some Definitions Some more definitions.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
What is in a name? Identity-based cryptography. How public-key crypto works When you use public key cryptography, you can publish a value (public key)
Public Key Cryptography
Public Key Encryption.
An Introduction to Pairing Based Cryptography
Public Key Cryptosystem
Asymmetric-Key Cryptography
1. Public Key Encryption (A Simple Case)
Boneh-Franklin Identity Based Encryption Scheme
Network Security Unit-III
Certificateless signature revisited
Public Key Encryption and Digital Signatures
SAKAWP: Simple Authenticated Key Agreement Protocol Based on Weil Pairing Authors: Eun-Jun Yoon and Kee-Young Yoo Src: International Conference on Convergence.
Attribute Based Encryption
Taehyung Kim HPC Lab. POSTECH
Identity-based deniable authentication protocol
An Introduction to Pairing Based Cryptography
CS/COE 1501 Recitation RSA Encryption/Decryption
Public Key Infrastructure
Fuzzy Identity Based Encryption
Elliptic Curve Cryptography (ECC)
Intro to Cryptography Some slides have been taken from:
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Introduction to Elliptic Curve Cryptography
Where Complexity Finally Comes In Handy…
CSCE 715: Network Systems Security
Symmetric-Key Cryptography
Where Complexity Finally Comes In Handy…
The power of Pairings towards standard model security
Where Complexity Finally Comes In Handy…
How to Use Charm Crypto Lib
Presentation transcript:

Identity Based Encryption Cosc 6111/6121 Presentation York University Dusty Phillips November 8, 2005

Overview Review Public Key Encryption Introduce Identity Based Encryption Identity Based Encryption Basics Examples Algorithm Details

Public Key Encryption Setup Algorithm creates two randomized keys One key made public, one made secret Encrypt with public, Decrypt with secret Problems: Public Key Distribution Key is long random string

Introduction to IBE Proposed by Adi Shamir in 1984 Viable Design in 2001 by Boneh and Franklin Public Key is arbitrary string (ie: e-mail) Third party server distributes private keys Advantages: Memorable public key Encryption before key generation

IBE Basics Four Algorithms Setup Extract Generates master key for PKG Generates public parameters Extract Extracts private key for arbitrary public key Run on PKG Encrypt with arbitrary public key and parameters Decrypt with PKG-generated private key

Encryption Example PKG calls setup to create master secret key s – kept secret parameters params – made public Alice sending encrypted message to Bob Alice gets params from PKG (if necessary) Encrypt message M using params and Bob's ID

Decryption Example Bob receives cyphertext C Bob retrieves params from PKG (if necessary) Bob authenticates to PKG (if necessary) PKG runs extract on ID Returns private key d Bob applies d and params to C and gets M

Setup Algorithm Secret key s is a random integer (< q) Public params are: q: a random prime G1, G2: Two groups, order q e: Bilinear map G1 × G1 → G2 P: Random generator of G1 Ppub created by s⋅P H1, H2: Crypto hashes: string → G1, G2 → string

The Bilinear Map e: G1 × G1 → G2 Definition of Bilinear: e(aP,bQ) = e(P,Q)ab a,b are integers P,Q ∈ G1 e(P,Q), e(aP,bQ) ∈ G2 Other definitions map that satisfies the distributive law map is a linear combination in both directions

Extraction Given a string public key ID Hash ID to Q ∈ G1 using H1 PKG has master key s return private key d = s⋅Q

Encryption Given string public key ID, message M Hash ID to Q ∈ G1 using H1 Map (Q, Ppub) to g ∈ G2 using e Choose random integer r < q Hash gr to a string X using H2 return ciphertext C = (r⋅P, M ⊕ X) = (U, V)

Decryption Given a private key d and ciphertext, C=(U,V) Map (d,U) to x ∈ G2 using e Hash x to a string X using H2 Return M = X ⊕ V

Why It Works Cryptography seems like magic! In encryption, M is xor'd with hash of gr In decryption, V is xor'd with hash of e(d, U) If gr = e(d, U) then xoring the xor gives original

e(d, U) = gr In extraction, d is set to s⋅Q In encryption U is set to r⋅P So e(d, U) = e(s⋅Q, r⋅P) By bilinearity of e: e(d,U) = e(Q,P)sr In encryption, g is set to e(Q, Ppub) In setup, Ppub is set to s⋅P So gr = e(Q, s⋅P)r By bilinearity of e: gr = e(Q,P)sr

References D. Boneh, M. Franklin, B. Lynn, M. Pauker, R. Kacker, G. Tsudik. "IBE Secure E-mail". 2002. http://crypto.stanford.edu/ibe/ D. Boneh, M. Franklin. "Identity-Based Encryption from the Weil Pairing". 2003. SIAM Journal of Computing. Vol 32, No 3. pp. 586-615. "Group Theory." http://en.wikipedia.org/wiki/Group_Theory "Elliptic Curves" http://en.wikipedia.org/wiki/Elliptical_curve R. Dean. "Elements of Abstract Algebra" `1966. John Wiley & Sons, Inc.