Normal : Simi-fuctional :. Normal : Simi-fuctional :

Slides:



Advertisements
Similar presentations
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption Allison Lewko Tatsuaki Okamoto Amit Sahai The.
Advertisements

Boneh-Franklin Identity-based Encryption. 2 Symmetric bilinear groups G = ágñ, g p = 1 e: G G G t Bilinear i.e. e(u a, v b ) = e(u, v) ab Non-degenerate:
Probabilistic Public Key Encryption with Equality Test Duncan S. Wong Department of Computer Science City University of Hong Kong Joint work with Guomin.
Lee Jae-song 1.  How to cryptanalysis DES?  C = E K (P)  E is DES encryption funtion  K is a key, 56-bit.  P is a plaintext, C is a ciphertext, both.
New Results on PA/CCA Encryption Carmine Ventre and Ivan Visconti Università di Salerno.
Encryption Public-Key, Identity-Based, Attribute-Based.
Dual System Encryption: Concept, History and Recent works Jongkil Kim.
S EMANTICALLY - SECURE FUNCTIONAL ENCRYPTION : P OSSIBILITY RESULTS, IMPOSSIBILITY RESULTS AND THE QUEST FOR A GENERAL DEFINITION Adam O’Neill, Georgetown.
Dennis Hofheinz, Jessica Koch, Christoph Striecks
Identity Based Encryption
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
1 Identity-Based Encryption form the Weil Pairing Author : Dan Boneh Matthew Franklin Presentered by Chia Jui Hsu Date :
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
1 Conjunctive, Subset, and Range Queries on Encrypted Data Dan Boneh Brent Waters Stanford University SRI International.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
Strongly Secure Certificateless Encryption Alexander W. Dent Information Security Group
RSA Exponentiation cipher
Hybrid Signcryption with Outsider Security
1 CIS 5371 Cryptography 9. Data Integrity Techniques.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Circular-Secure Encryption from Decision Diffie-Hellman Dan Boneh Shai Halevi Mike Hamburg Rafail Ostrovsky.
Dan Boneh Public Key Encryption from trapdoor permutations Public key encryption: definitions and security Online Cryptography Course Dan Boneh.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
8. Data Integrity Techniques
Cryptography Lecture 8 Stefan Dziembowski
Public-Key Encryption with Lazy Parties Kenji Yasunaga Institute of Systems, Information Technologies and Nanotechnologies (ISIT), Japan Presented at SCN.
1 Hierarchical Identity-Based Encryption with Constant Size Ciphertext Dan Boneh, Xavier Boyen and Eu-Jin Goh Eurocrypt 2005 投影片製作:張淑慧.
CSCI 5857: Encoding and Encryption
Confusion and Diffusion1 Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003.
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures Bei Liang, Hongda Li, Jinyong Chang.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
The Dual Receiver Cryptosystem and its Applications Presented by Brijesh Shetty.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Software Security Seminar - 1 Chapter 5. Advanced Protocols 조미성 Applied Cryptography.
IND-CPA and IND-CCA Concepts Summary  Basic Encryption Security Definition: IND-CPA  Strong Encryption Security Definition: IND-CCA  IND-CPA, IND-CCA.
Giuseppe Bianchi Warm-up example 1 found on a real paper! Warm-up example 1 found on a real paper!
(c) Mitsubishi Electric Corp. 1 User Scenarios & Security Considerations in APPAGG part 2/ Nobuhiro Electric.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
Digital Signatures, Message Digest and Authentication Week-9.
©2014 CVS/caremark. All rights reserved. This presentation contains confidential and proprietary information of CVS/caremark and cannot be reproduced,
1 Lossy Trapdoor Functions and Their Applications Brent Waters SRI International Chris Peikert SRI International.
CS426Fall 2010/Lecture 251 Computer Security CS 426 Lecture 26 Review of Some Mid-Term Problems.
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
POON TENG HIN.  RSA  Shamir’s Three-Pass Protocol  Other issues.
1 Kerberos n Part of project Athena (MIT). n Trusted 3rd party authentication scheme. n Assumes that hosts are not trustworthy. n Requires that each client.
Tae-Joon Kim Jong yun Jun
Secured key exchange protocol in wireless mobile ad hoc networks ► Shu-Hwang Liaw; Pin-Chang Su; Henry Ker-Chang Chang; Erl-Huei Lu; Shun-Fu Pon; ► CCST.
1 Efficient Selective-ID IBE Without Random Oracle Dan Boneh Stanford University Xavier Boyen Voltage Security.
1/28 Chosen-Ciphertext Security from Identity- Based Encryption Jonathan Katz U. Maryland Ran Canetti, Shai Halevi IBM.
Dan Boneh Odds and ends Deterministic Encryption Online Cryptography Course Dan Boneh.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Online/Offline Attribute-Based Encryption Brent WatersSusan Hohenberger Presented by Shai Halevi.
Human-Computable Passwords Jeremiah Blocki Manuel Blum Anupam Datta Santosh Vempala.
Analysis of SIP security Ashwini Sanap ( ) Deepti Agashe ( )
1 Managing Security Additional notes. 2 Intercepting confidential messages Attacker Taps into the Conversation: Tries to Read Messages Client PC Server.
Boneh-Franklin Identity Based Encryption Scheme
Solving Inequalities Using Multiplication and Division
Prime and composite numbers
Complex Number Field Properties
Cryptography Lecture 9.
Cryptography Lecture 26.
Cryptography Lecture 11.
,. . ' ;; '.. I I tI I t : /..: /.. ' : ····t I 'h I.;.; '..'.. I ' :".:".
Wireless Access Points
The Normal Distribution
Cryptography Lecture 11.
Cryptography Lecture 22.
Attack Review Game Seperate into groups of 4 groups of 5 and 2 groups of 6 I will ask the class a review question, all groups should discuss the questions.
Cryptography Lecture 10.
Presentation transcript:

Normal : Simi-fuctional :

Normal : Simi-fuctional :

Game real : Real security game restrictedGame restricted : Real security game except that the attacker cannot ask for keys for identities which are equal to the challenge identity modulo p 2. Game k : This is like the restricted security game, except that the ciphertext given to the attacker is semi-functional and the first k keys are semi-functional. The rest of the keys are normal. Game final : same as Game q except that the ciphertext is a semi-functional encryption of a random message, not one of the two messages requested by the attacker.

restrictedGame real Game restricted CB A g, X 1 X 2, X 3, Y 2 Y 3, T PK = {N,u=g a,g,h=g b,e(g,g) α } K 1 =g r X 3 t K 2 =g α (u ID h) r X 3 t ` ID (M 0,M 1,ID*) C 0 =M β e(g,g) αs, C 1 =((u ID* h) s ), C 2 =g s

restricted0Game restricted Game 0 CB A g, X 3, T PK = {N,u=g a,g,h=g b,e(g,g) α } K 1 =g r X 3 t K 2 =g α (u ID h) r X 3 t ` ID (M 0,M 1,ID*) C 0 =M β e(T,g) αs, C 1 =T aID*+b, C 2 =T β` b`

k-1Game k-1 Game k CB A g, X 1 X 2, X 3, Y 2 Y 3, T PK = {N,u=g a,g,h=g b,e(g,g) α } if i>k K 1 =g ri X 3 ti K 2 =g α (u IDi h) ri X 3 ti ` ID i (M 0,M 1,ID*) C 0 =M β e(X 1 X 2,g) αs, C 1 =(X 1 X 2 ) aID*+b, C 2 =X 1 X 2 β` b` if i>k K 1 =g ri (Y 2 Y 3 ) ti K 2 =g α (u IDi h) ri (Y 2 Y 3 ) ti ` if i=k K 1 =T K 2 =g α T aIDk+b X 3 ti `

finalGame q Game final CB A g, g α X 2, X 3, g s Y 2, Z 2, T PK = {N,u=g a,g,h=g b,e(g,g) α =e(g α X 2,g)} K 1 =g r Z 2 θ X 3 t K 2 =g α (u ID h) r Z 2 θ` X 3 t ` ID (M 0,M 1,ID*) C 0 =M β T, C 1 =(g s Y 2 ) aID*+b, C 2 =g s Y 2