ElGamal Security Public key encryption from Diffie-Hellman

Slides:



Advertisements
Similar presentations
Boneh-Franklin Identity-based Encryption. 2 Symmetric bilinear groups G = ágñ, g p = 1 e: G G G t Bilinear i.e. e(u a, v b ) = e(u, v) ab Non-degenerate:
Advertisements

Dan Boneh Message integrity Message Auth. Codes Online Cryptography Course Dan Boneh.
Dan Boneh Using block ciphers Modes of operation: one time key Online Cryptography Course Dan Boneh example: encrypted , new key for every message.
Trusted 3rd parties Basic key exchange
Probabilistic Public Key Encryption with Equality Test Duncan S. Wong Department of Computer Science City University of Hong Kong Joint work with Guomin.
Online Cryptography Course Dan Boneh
Dan Boneh Public key encryption from Diffie-Hellman ElGamal Variants With Better Security Online Cryptography Course Dan Boneh.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
Cryptography Lecture 9 Arpita Patra.
Dan Boneh Message Integrity A Parallel MAC Online Cryptography Course Dan Boneh.
Cramer & Shoup Encryption Cramer and Shoup: A practical public key crypto system provably secure against adaptive chosen ciphertext attack. Crypto 1998.
7. Asymmetric encryption-
Identity Based Encryption
1 Queries on Encrypted Data Dan Boneh Brent Waters Stanford UniversitySRI.
1 CIS 5371 Cryptography 9. Data Integrity Techniques.
Slide 1 Vitaly Shmatikov CS 380S Semantic Security.
Dan Boneh Basic key exchange Public-key encryption Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations The RSA trapdoor permutation Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations RSA in practice Online Cryptography Course Dan Boneh.
0x1A Great Papers in Computer Security
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Dan Boneh Authenticated Encryption Definitions Online Cryptography Course Dan Boneh.
Dan Boneh Authenticated Encryption Chosen ciphertext attacks Online Cryptography Course Dan Boneh.
Dan Boneh Intro. Number Theory Intractable problems Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations Public key encryption: definitions and security Online Cryptography Course Dan Boneh.
Dan Boneh Odds and ends Key Derivation Online Cryptography Course Dan Boneh.
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
8. Data Integrity Techniques
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
1 Hierarchical Identity-Based Encryption with Constant Size Ciphertext Dan Boneh, Xavier Boyen and Eu-Jin Goh Eurocrypt 2005 投影片製作:張淑慧.
Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh.
Cryptography Lecture 10 Arpita Patra. Quick Recall and Today’s Roadmap >> CPA & CPA-mult security >> Equivalence of CPA and CPA-mult security >> El Gamal.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
Cryptography Lecture 9 Stefan Dziembowski
Dan Boneh Introduction Discrete Probability (crash course) Online Cryptography Course Dan Boneh See also:
Dan Boneh Introduction Discrete Probability (crash course) Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations PKCS 1 Online Cryptography Course Dan Boneh.
Dan Boneh Stream ciphers Pseudorandom Generators Online Cryptography Course Dan Boneh.
Cryptography Lecture 2 Arpita Patra. Summary of Last Class  Introduction  Secure Communication in Symmetric Key setting >> SKE is the required primitive.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh.
Odds and ends Tweakable encryption
Dan Boneh Stream ciphers Stream ciphers are semantically secure Online Cryptography Course Dan Boneh Goal: secure PRG ⇒ semantically secure stream cipher.
1 Efficient Selective-ID IBE Without Random Oracle Dan Boneh Stanford University Xavier Boyen Voltage Security.
Cryptography Lecture 11 Arpita Patra. Generic Results in PK World  CPA-secure KEM  SKE COA-secure SKE  Hyb CPA-secure CPA SecurityCCA Security Bit.
1/28 Chosen-Ciphertext Security from Identity- Based Encryption Jonathan Katz U. Maryland Ran Canetti, Shai Halevi IBM.
Dan Boneh Stream ciphers PRG Security Defs Online Cryptography Course Dan Boneh.
Dan Boneh Intro. Number Theory Fermat and Euler Online Cryptography Course Dan Boneh.
Dan Boneh Intro. Number Theory Arithmetic algorithms Online Cryptography Course Dan Boneh.
Dan Boneh Odds and ends Deterministic Encryption Online Cryptography Course Dan Boneh.
Online Cryptography Course Dan Boneh
Dan Boneh Public Key Encryption from trapdoor permutations Constructions Online Cryptography Course Dan Boneh Goal: construct chosen-ciphertext secure.
Dan Boneh Authenticated Encryption Constructions from ciphers and MACs Online Cryptography Course Dan Boneh.
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
多媒體網路安全實驗室 Variations of Diffie-Hellman Problem Proceedings of ICICS 2003, LNCS 2836, Springer-Verlag, 2003, pp. 301–312 Feng Bao, Robert H. Deng, Huafei.
Dan Boneh Public Key Encryption from trapdoor permutations Public key encryption: definitions and security Online Cryptography Course Dan Boneh.
Topic 26: Discrete LOG Applications
B504/I538: Introduction to Cryptography
Group theory exercise.
Topic 25: Discrete LOG, DDH + Attacks on Plain RSA
Topic 30: El-Gamal Encryption
Cryptography Lecture 25.
Cryptographic protocols 2015, Lecture 3 Key Exchange, CDH, DDH
The power of Pairings towards standard model security
Cryptography Lecture 21.
Cryptography Lecture 24.
Cryptography Lecture 23.
The “Modular” Approach
Presentation transcript:

ElGamal Security Public key encryption from Diffie-Hellman Online Cryptography Course Dan Boneh Public key encryption from Diffie-Hellman ElGamal Security

Computational Diffie-Hellman Assumption G: finite cyclic group of order n Comp. DH (CDH) assumption holds in G if: g, ga , gb ⇏ gab for all efficient algs. A: Pr[ A(g, ga, gb ) = gab ] < negligible where g ⟵ {generators of G} , a, b ⟵ Zn

Hash Diffie-Hellman Assumption G: finite cyclic group of order n , H: G2 ⟶ K a hash function Def: Hash-DH (HDH) assumption holds for (G, H) if: (g, ga, gb , H(gb,gab) ) ≈p (g, ga, gb , R ) where g ⟵ {generators of G} , a, b ⟵ Zn , R ⟵ K H acts as an extractor: strange distribution on G2 ⇒ uniform on K

Suppose K = {0,1}128 and H: G2 ⟶ K only outputs strings in K that begin with 0 ( i.e. for all x,y: msb(H(x,y))=0 ) Can Hash-DH hold for (G, H) ? Yes, for some groups G No, Hash-DH is easy to break in this case Yes, Hash-DH is always true for such H

ElGamal is sem. secure under Hash-DH KeyGen: g ⟵ {generators of G} , a ⟵ Zn output pk = (g, h=ga) , sk = a E( pk=(g,h), m) : b ⟵ Zn k ⟵ H(gb,hb) , c ⟵ Es(k, m) output (gb, c) D( sk=a, (u,c) ) : k ⟵ H(u,ua) , m ⟵ Ds(k, c) output m

ElGamal is sem. secure under Hash-DH chal. adv. A pk,sk m0 , m1 gb, Es(H(), m0) b’≟1 pk = (g,ga) chal. adv. A pk,sk m0 , m1 gb, Es(k, m0) b’≟1 pk = (g,ga) kK ≈p (gb , gab) ≈p ≈p chal. adv. A pk,sk m0 , m1 gb, Es(H(), m1) b’≟1 pk = (g,ga) chal. adv. A pk,sk m0 , m1 gb, Es(k, m1) b’≟1 pk = (g,ga) kK ≈p Input to hash: g^a, g^ab (gb , gab)

ElGamal chosen ciphertext security? To prove chosen ciphertext security need stronger assumption Interactive Diffie-Hellman (IDH) in group G: IDH holds in G if: ∀efficient A: Pr[ A outputs gab] < negligible g, h=ga, u=gb Chal. Adv. A (u1,v1) g⟵{gen} a,b⟵Zn v wins if v=gab if (u1)a = v1 0 otherwise

ElGamal chosen ciphertext security? Security Theorem: If IDH holds in the group G, (Es, Ds) provides auth. enc. and H: G2 ⟶ K is a “random oracle” then ElGamal is CCAro secure. Questions: (1) can we prove CCA security based on CDH? (2) can we prove CCA security without random oracles?

End of Segment