Dan Boneh Public Key Encryption from trapdoor permutations Constructions Online Cryptography Course Dan Boneh Goal: construct chosen-ciphertext secure.

Slides:



Advertisements
Similar presentations
Dan Boneh Message integrity Message Auth. Codes Online Cryptography Course Dan Boneh.
Advertisements

ElGamal Security Public key encryption from Diffie-Hellman
Dan Boneh Using block ciphers Modes of operation: one time key Online Cryptography Course Dan Boneh example: encrypted , new key for every message.
Trusted 3rd parties Basic key exchange
Probabilistic Public Key Encryption with Equality Test Duncan S. Wong Department of Computer Science City University of Hong Kong Joint work with Guomin.
Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions PKC 2010 May 27, 2010 Petros Mol, Scott Yilek 1 UC, San Diego.
Online Cryptography Course Dan Boneh
Dan Boneh Public key encryption from Diffie-Hellman ElGamal Variants With Better Security Online Cryptography Course Dan Boneh.
1 Adam O’Neill Leonid Reyzin Boston University A Unified Approach to Deterministic Encryption and a Connection to Computational Entropy Benjamin Fuller.
Cryptography: Review Day David Brumley Carnegie Mellon University.
1 Generic Conversions for Constructing IND-CCA2 Public-key Encryption in the Random Oracle Model Tatsuaki Okamoto NTT.
1 PRPs and PRFs CS255: Winter Abstract ciphers: PRPs and PRFs, 2.Security models for encryption, 3.Analysis of CBC and counter mode Dan Boneh, Stanford.
Cryptography Lecture 9 Arpita Patra.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Dan Boneh Message Integrity A Parallel MAC Online Cryptography Course Dan Boneh.
1 Brief PRP-PRF Recap CS255 Winter ‘06. 2 PRPs and PRFs PRF: F: K  X  Y such that: exists “efficient” algorithm to eval. F(k,x) PRP: E: K  X  X such.
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
Topics in Cryptography Lecture 5 Topic: Chosen Ciphertext Security Lecturer: Moni Naor.
A Designer’s Guide to KEMs Alex Dent
1 Queries on Encrypted Data Dan Boneh Brent Waters Stanford UniversitySRI.
1 Intro To Encryption Exercise 4. 2 Defining Pseudo-Random Permutation Let A be alg. with oracle to a function from {0,1} k to {0,1} k Notation: let A.
Dan Boneh Collision resistance Generic birthday attack Online Cryptography Course Dan Boneh.
Slide 1 Vitaly Shmatikov CS 380S Semantic Security.
Dan Boneh Basic key exchange Public-key encryption Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations The RSA trapdoor permutation Online Cryptography Course Dan Boneh.
Cryptography Overview CS155. Cryptography Is A tremendous tool The basis for many security mechanisms Is not The solution to all security problems Reliable.
Dan Boneh Public Key Encryption from trapdoor permutations RSA in practice Online Cryptography Course Dan Boneh.
Foundations of Cryptography Rahul Jain CS6209, Jan – April 2011
0x1A Great Papers in Computer Security
Dan Boneh Authenticated Encryption Definitions Online Cryptography Course Dan Boneh.
Dan Boneh Authenticated Encryption Chosen ciphertext attacks Online Cryptography Course Dan Boneh.
Dan Boneh Intro. Number Theory Intractable problems Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations Public key encryption: definitions and security Online Cryptography Course Dan Boneh.
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh.
Cryptography Lecture 10 Arpita Patra. Quick Recall and Today’s Roadmap >> CPA & CPA-mult security >> Equivalence of CPA and CPA-mult security >> El Gamal.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Cryptography Lecture 9 Stefan Dziembowski
Dan Boneh Public Key Encryption from trapdoor permutations Is RSA a one-way function? Online Cryptography Course Dan Boneh.
Dan Boneh Introduction Discrete Probability (crash course) Online Cryptography Course Dan Boneh See also:
Dan Boneh Using block ciphers Modes of operation: many time key (CTR) Online Cryptography Course Dan Boneh Example applications: 1. File systems: Same.
Attacks on OTP and stream ciphers
Dan Boneh Public Key Encryption from trapdoor permutations PKCS 1 Online Cryptography Course Dan Boneh.
Cryptography Lecture 11 Stefan Dziembowski
Dan Boneh Stream ciphers Pseudorandom Generators Online Cryptography Course Dan Boneh.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh.
Odds and ends Tweakable encryption
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Cryptography: Review Day David Brumley Carnegie Mellon University.
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
Dan Boneh Stream ciphers Stream ciphers are semantically secure Online Cryptography Course Dan Boneh Goal: secure PRG ⇒ semantically secure stream cipher.
Tae-Joon Kim Jong yun Jun
Dan Boneh Basic key exchange Trusted 3 rd parties Online Cryptography Course Dan Boneh.
1 Efficient Selective-ID IBE Without Random Oracle Dan Boneh Stanford University Xavier Boyen Voltage Security.
1/28 Chosen-Ciphertext Security from Identity- Based Encryption Jonathan Katz U. Maryland Ran Canetti, Shai Halevi IBM.
Dan Boneh Stream ciphers PRG Security Defs Online Cryptography Course Dan Boneh.
Dan Boneh Intro. Number Theory Fermat and Euler Online Cryptography Course Dan Boneh.
Dan Boneh Odds and ends Deterministic Encryption Online Cryptography Course Dan Boneh.
Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev Microsoft Research.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Online Cryptography Course Dan Boneh
Dan Boneh Authenticated Encryption Constructions from ciphers and MACs Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations Public key encryption: definitions and security Online Cryptography Course Dan Boneh.
Lecture 3 Overview of Cryptography A Practitioner Perspective
Using block ciphers Review: PRPs and PRFs
B504/I538: Introduction to Cryptography
PRPs and PRFs CS255: Winter 2017
Topic 30: El-Gamal Encryption
Introduction to Symmetric-key and Public-key Cryptography
Presentation transcript:

Dan Boneh Public Key Encryption from trapdoor permutations Constructions Online Cryptography Course Dan Boneh Goal: construct chosen-ciphertext secure public-key encryption

Dan Boneh Trapdoor functions (TDF) Def: a trapdoor func. XY is a triple of efficient algs. (G, F, F -1 ) G(): randomized alg. outputs a key pair (pk, sk) F(pk, ⋅ ): det. alg. that defines a function X Y F -1 (sk, ⋅ ): defines a function Y X that inverts F(pk, ⋅ ) More precisely: ∀ (pk, sk) output by G ∀ x ∈ X: F -1 (sk, F(pk, x) ) = x

Dan Boneh Secure Trapdoor Functions (TDFs) (G, F, F -1 ) is secure if F(pk, ⋅ ) is a “one-way” function: can be evaluated, but cannot be inverted without sk Def: ( G, F, F -1 ) is a secure TDF if for all efficient A: Adv OW [A,F] = Pr [ x = x’ ] < negligible Adv. AChal. (pk,sk)  G() x X x’ pk, y  F(pk, x) R

Dan Boneh Public-key encryption from TDFs (G, F, F -1 ): secure TDF X Y (E s, D s ) : symmetric auth. encryption defined over (K,M,C) H: X K a hash function We construct a pub-key enc. system (G, E, D): Key generation G: same as G for TDF

Dan Boneh Public-key encryption from TDFs E ( pk, m ) : x X, y F(pk, x) k H(x), c E s (k, m) output (y, c) D ( sk, (y,c) ) : x F -1 (sk, y), k H(x), m D s (k, c) output m (G, F, F -1 ): secure TDF X Y (E s, D s ) : symmetric auth. encryption defined over (K,M,C) H: X K a hash function R

Dan Boneh In pictures: Security Theorem: If (G, F, F -1 ) is a secure TDF, (E s, D s ) provides auth. enc. and H: X K is a “random oracle” then (G,E,D) is CCA ro secure. F(pk, x) E s ( H(x), m ) headerbody

Dan Boneh Incorrect use of a Trapdoor Function (TDF) Never encrypt by applying F directly to plaintext: Problems: Deterministic: cannot be semantically secure !! Many attacks exist (next segment) E( pk, m) : output c F(pk, m) D( sk, c ) : output F -1 (sk, c)

Dan Boneh End of Segment Next step: construct a TDF