Com 2 MaC Workshop on Cryptography 26-28 june 2000 - Pohang - South - - PDF document

com 2 mac workshop on cryptography
SMART_READER_LITE
LIVE PREVIEW

Com 2 MaC Workshop on Cryptography 26-28 june 2000 - Pohang - South - - PDF document

Com 2 MaC Workshop on Cryptography 26-28 june 2000 - Pohang - South Korea Secure Designs for Public-Key Cryptography based on the Discrete Logarithm David Pointcheval Dpartement d Informatique ENS - CNRS David.Pointcheval@ens.fr


slide-1
SLIDE 1

David Pointcheval Département d ’Informatique ENS - CNRS

Com2MaC Workshop

  • n Cryptography

26-28 june 2000 - Pohang - South Korea

David.Pointcheval@ens.fr http://www.di.ens.fr/~pointche

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 2 David Pointcheval ENS-CNRS

Overview Overview

◆ Introduction ◆ Security Arguments ◆ Signature ◆ Encryption ◆ Conclusion

slide-2
SLIDE 2

David Pointcheval Département d ’Informatique ENS - CNRS

Com2MaC Workshop

  • n Cryptography

26-28 june 2000 - Pohang - South Korea

David.Pointcheval@ens.fr http://www.di.ens.fr/~pointche

Introduction

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 4 David Pointcheval ENS-CNRS

Cryptography Cryptography

Cryptography: to solve security concerns Authentication Integrity ⇒ signature Confidentiality ⇒ encryption

slide-3
SLIDE 3

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 5 David Pointcheval ENS-CNRS

Authentication/Integrity Authentication/Integrity

Authentication Algorithm Verification Algorithm

  • m

σ True/False m

Security: it is impossible to produce a new valid pair (m,σ)

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 6 David Pointcheval ENS-CNRS

Encryption Encryption

Security: it is impossible to get back m just from c

  • m

c m

Encryption Algorithm Decryption Algorithm

slide-4
SLIDE 4

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 7 David Pointcheval ENS-CNRS

Foundations Foundations

To build such primitives, one needs (trapdoor) one-way functions:

x → y = f(x) is easy (Encryption, Verification) y = f(x) → x is difficult (Decryption, Signature)

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 8 David Pointcheval ENS-CNRS

Conventional Cryptography Conventional Cryptography

fk and fk-1 are both “easy” to compute with k fk and fk-1 are both “difficult” to compute without k difficult: heuristic!

k k

  • m

c m

f is an intricate network of permutations/substitutions, parameterized by a secret key k = fk k = fk

  • 1
slide-5
SLIDE 5

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 9 David Pointcheval ENS-CNRS

Modern Cryptography Modern Cryptography

“easy” to build an instance with a known solution “difficult” to solve an instance (but easy with kd) difficult: complexity theory

kd ke

  • m

c m

f is a non P-problem (no polynomial algorithm) ke (x) = instance I of f from ke, for which x is a solution kd (I) = solution of I

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 10 David Pointcheval ENS-CNRS

One One-

  • Way Functions

Way Functions

◆ -complete problems:

  • hard in the worst-case

what about the average case?

  • hard asymptotically

what about the difficulty of instances

  • f reasonable size (few bytes)?

⇒ quite few candidates (for signature)

◆ Number Theory:

  • factorization ⇒ RSA, etc
  • discrete logarithm ⇒ Diffie-Hellman, etc
slide-6
SLIDE 6

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 11 David Pointcheval ENS-CNRS

The Discrete Logarithm The Discrete Logarithm

◆ Let = (<g>, ×) be any cyclic group

  • f order q (noted multiplicatively)

◆ For any y∈, one defines Logg(y) = min{x > 0 | y = gx} ◆ One-way function

  • x

→ y = gx easy

  • y = gx → x

seems difficult

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 12 David Pointcheval ENS-CNRS

Various Groups Various Groups

= sub-group of ◆ p

*, n *

⇒ sub-exponential (NFS) ◆ an elliptic curve ⇒ exponential (in general) ◆ a Jacobian ⇒ exponential (in general) ◆ other

  • ideals of number fields (NICE)
  • braid group, …
slide-7
SLIDE 7

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 13 David Pointcheval ENS-CNRS

Any Trapdoor …? Any Trapdoor …?

◆ The Discrete Logarithm is difficult But no information could make it easier! ◆ The Diffie-Hellman Problem (1976): ◆ Given A=ga and B=gb ◆ Compute DH(A,B) = C=gab Clearly DH ≤ DL: with a=LoggA, C=Ba C-DH Assumption: the DH-problem is intractable

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 14 David Pointcheval ENS-CNRS

Another DL Another DL-

  • based Problem

based Problem

The Decisional Diffie-Hellman Problem: ◆ Given A, B and C in <g> ◆ Decide whether C = DH(A,B) Clearly D-DH ≤ DH ≤ DL D-DH Assumption: the D-DH-problem is intractable

slide-8
SLIDE 8

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 15 David Pointcheval ENS-CNRS

Application: El Application: El Gamal Gamal Encryption Encryption

◆ = (<g>, ×) group of order q ◆ x : secret key ◆ y=gx : public key

) , ( ) , ( ) ( d c m y g m

a a

→ =

public

x

c d d c / ) , ( =

secret One-Wayness = C-DH Semantic Security = D-DH

David Pointcheval Département d ’Informatique ENS - CNRS

Com2MaC Workshop

  • n Cryptography

26-28 june 2000 - Pohang - South Korea

David.Pointcheval@ens.fr http://www.di.ens.fr/~pointche

Security Arguments

slide-9
SLIDE 9

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 17 David Pointcheval ENS-CNRS

Security Notions Security Notions

Depending on the security concerns,

  • ne defines

◆ the goals that an adversary may would like to reach ◆ the means/information available for the adversary

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 18 David Pointcheval ENS-CNRS

Security Proofs Security Proofs

One provides a reduction from a “difficult” problem P to an attack Atk: ◆ reaches the “prohibited” goals ⇒ can be used to break P ◆ no further hypothesis: standard model ◆ but that rarely leads to efficiency! ⇒ some assumptions

slide-10
SLIDE 10

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 19 David Pointcheval ENS-CNRS

Security Arguments Security Arguments

One provides a reduction from a “difficult” problem P to an attack Atk, under some ideal assumptions:

  • ideal random hash function:

random oracle model

  • ideal symmetric encryption:

ideal cipher model

  • ideal group:

generic model (generic adversaries)

The weakest: Random Oracle Model (ROM)

David Pointcheval Département d ’Informatique ENS - CNRS

Com2MaC Workshop

  • n Cryptography

26-28 june 2000 - Pohang - South Korea

David.Pointcheval@ens.fr http://www.di.ens.fr/~pointche

Signature

slide-11
SLIDE 11

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 21 David Pointcheval ENS-CNRS

Authentication Authentication

Authentication Algorithm Verification Algorithm Security: it is impossible to produce a new valid pair (m,σ)

kv ka

  • m

σ True/False m

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 22 David Pointcheval ENS-CNRS

Security Notions Security Notions

Total Break: to recover the secret key Universal Forgery: to be able to sign any message Existential Forgery: to produce a new valid pair (m,σ) (possibly m is without any meaning)

slide-12
SLIDE 12

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 23 David Pointcheval ENS-CNRS

Kinds of Attacks Kinds of Attacks

no-message: the adversary just knows the public key known-message: she knows some message-signature pairs (adaptively) chosen-message she has access to a signature oracle

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 24 David Pointcheval ENS-CNRS

Secure Signature Secure Signature

A Signature Scheme is said SECURE if it prevents any existential forgery even under adaptively chosen-message attacks Then, the signature guarantees:

  • the identity of the sender
  • the non-repudiation:

the sender won’t be able to deny it later

slide-13
SLIDE 13

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 25 David Pointcheval ENS-CNRS

Verification of (m,σ) : u = gs ye (= gk-xe gxe)

test whether e=h(m,u) ?

Schnorr’s Schnorr’s Signature (1989) Signature (1989)

= <g>, q and g : common data x : secret key y=gx : public key Signature of the message m : choose a random k∈

q

compute r=gk get e=h(m,r) and s = k-xe mod q σ = (e,s)

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 26 David Pointcheval ENS-CNRS

Security? Security?

Existential Forgery under chosen-message attacks (in the random oracle model) = computation of discrete logarithms

(Pointcheval-Stern EC ‘96)

Idea: Forking Lemma

  • h(m,r)

e e’ (e,s) (e’,s’)

gs ye = r = gs’ ye’ ⇒ gs-s’ = ye’-e

Let α = (s-s’)/(e’-e) mod q ⇒ y=gα

slide-14
SLIDE 14

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 27 David Pointcheval ENS-CNRS

Key-Gen: x∈q and y=gx

  • Two hash functions G and H
  • F1: q × q × G × H → q
  • F2: q × G × H → q
  • F3: q × G × H → q

such that, for all (k,x,t,u) ∈ q × q × G × H

F2(F1(k,x,t,u),t,u) + x F3(F1(k,x,t,u),t,u) = k mod q

⇒ gEg yEy = gk

where s = F1(k,x,t,u) Eg = F2(s,t,u) and Ey = F3(s,t,u)

Trusted El Trusted El Gamal Gamal Type Type Signatures Schemes Signatures Schemes (BPVY PKC ‘00)

(BPVY PKC ‘00)

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 28 David Pointcheval ENS-CNRS

TEGTSS TEGTSS -

  • I

I

Sign(m): k∈q

* and r = gk

t = G(m) and u = H(r) then s = F1(k,x,t,u) → σ = (s,t,u) Ver(m,σ): check if t = G(m) and u = H(w), where w = gEg yEy

with Eg = F2(s,t,u) and Ey = F3(s,t,u)

and 2 further properties…

slide-15
SLIDE 15

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 29 David Pointcheval ENS-CNRS

TEGTSS TEGTSS -

  • I: Security

I: Security

KCDSA: F1(k,x,t,u) = (k - t ⊕ u)/x mod q F2(s,t,u) = t ⊕ u mod q and F3(s,t,u) = s mod q Security Claim: If H behaves like a random oracle but G is just collision-resistant then existential forgery = extraction of x Proof: use of the Forking Lemma [PS96]

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 30 David Pointcheval ENS-CNRS

TEGTSS TEGTSS -

  • II

II

Sign(m): k∈q

* and r = gk

t = G(r) and u = H(m,t) then s = F1(k,x,t,u) → σ = (s,t,u) Ver(m,σ): check if t = G(w) and u = H(m,t), where w = gEg yEy

with Eg = F2(s,t,u) and Ey = F3(s,t,u)

and a further property

slide-16
SLIDE 16

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 31 David Pointcheval ENS-CNRS

TEGTSS TEGTSS -

  • II: Security

II: Security

Security Claim:

If H behaves like a random oracle, but

  • x → G(x) is (l + 1)-collision-resistant
  • OR x → G(gx) is (l + 1)-collision-free

then existential forgery = extraction of x

Proof: an improved forking lemma DSA-II: F1(k,x,t,u) = (u + xt)/k mod q F2(s,t,u) = u/s mod q and F3(s,t,u) = t/s mod q

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 32 David Pointcheval ENS-CNRS

Applications: KCDSA Applications: KCDSA

KCDSA: ◆ provably secure if both G and H behave like random oracles But one can weaken assumptions: ◆ provably secure if H behaves like a random oracle but G just collision-resistant

slide-17
SLIDE 17

David Pointcheval Département d ’Informatique ENS - CNRS

Com2MaC Workshop

  • n Cryptography

26-28 june 2000 - Pohang - South Korea

David.Pointcheval@ens.fr http://www.di.ens.fr/~pointche

Encryption

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 34 David Pointcheval ENS-CNRS

Asymmetric Encryption Asymmetric Encryption

kd ke

  • m

c m

Security: it is impossible to get back m just from c, ke, and (without kd) Encryption Algorithm Decryption Algorithm

slide-18
SLIDE 18

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 35 David Pointcheval ENS-CNRS

Better security? Better security?

◆ Perfect Security:

the ciphertext and public data do not reveal any information about the plaintext (but maybe the size) Information Theoretical sense ⇒ Impossible

◆ Semantic Security (Indistinguishability):

no polynomial adversary can learn any information about the plaintext from the ciphertext and public data (but the size)

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 36 David Pointcheval ENS-CNRS

Kinds of Attacks Kinds of Attacks

◆ Chosen Plaintext: (basic scenario)

in the public-key setting, any adversary can get the encryption of any plaintext of her choice (by encrypting it by herself)

◆ Chosen Ciphertext (adaptively):

the adversary has furthermore access to a decryption oracle which decrypts any ciphertext of her choice, but the specific challenge

slide-19
SLIDE 19

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 37 David Pointcheval ENS-CNRS

Required Security Required Security

◆ OW-CPA: (basic level of security)

  • enough in some scenarios
  • not enough in many others

◆ CC-Attacks easy to perform

⇒ attack to be made unuseful

◆ Plaintext-space often limited (“sell” - “buy” -- “yes” - “no” -- … )

⇒ IND very often required

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 38 David Pointcheval ENS-CNRS

Main Security Notions Main Security Notions

◆ OW-CPA: (the weakest)

[ ]

) ( ) ( Pr

,

m;r c m c

r m

  • =

=

  • ◆ IND-CCA: (the strongest - BDPR C ’98)

1 Pr 2

) , ( ) ( ) , , ( ) , , , (

1 1 1 2 ,

      ← ← = r m c s m m b s c m m

b b r

  • e

k

  • = Succ negligible

= Adv negligible

slide-20
SLIDE 20

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 39 David Pointcheval ENS-CNRS

DL DL-

  • based Cryptosystems

based Cryptosystems

◆ El Gamal:

  • OW-CPA = C-DH
  • IND-CPA = D-DH
  • CCA ? No because of malleability

◆ Cramer-Shoup:

  • IND-CCA = D-DH

◆ PSEC (Okamoto-Fujisaki-Morita):

  • PSEC-1: IND-CCA = D-DH (+ROM)
  • PSEC-2: IND-CCA = C-DH (+ROM)

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 40 David Pointcheval ENS-CNRS

◆ Any trapdoor one-way function leads to a OW-CPA cryptosystem ◆ But OW-CPA not enough ◆ How to reach IND-CCA ? ⇒ generic conversions from OW-CPA to IND-CCA

Generic Conversions Generic Conversions

slide-21
SLIDE 21

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 41 David Pointcheval ENS-CNRS

Conversions (1/3) Conversions (1/3)

◆ OAEP (Bellare-Rogaway EC ‘94)

  • ptimal conversion of

any trapdoor one-way permutation into an IND-CCA cryptosystem Efficiency: optimal (just 2 more hashings) Application: RSA (the sole candidate as trapdoor one-way permutation!)

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 42 David Pointcheval ENS-CNRS

Conversions (2/3) Conversions (2/3)

◆ Fujisaki-Okamoto (PKC ‘99)

conversion of any IND-CPA cryptosystem into an IND-CCA cryptosystem Drawback: security relative to decisional problems (D-DH, Higher Residuosity, … ) Efficiency:

  • optimal encryption (just 2 more hashings)
  • non-optimal decryption (1 re-encryption)
slide-22
SLIDE 22

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 43 David Pointcheval ENS-CNRS

Conversions (3/3) Conversions (3/3)

◆ Fujisaki-Okamoto (Crypto ‘99) Pointcheval (PKC ‘00)

conversions of any OW-CPA cryptosystem into an IND-CCA cryptosystem Advantage: security relative to computational problems (C-DH, Factorization, … ) Efficiency:

  • optimal encryption (just 2 more hashings)
  • non-optimal decryption (1 re-encryption)

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 44 David Pointcheval ENS-CNRS

PSEC PSEC -

  • OCAC

OCAC

◆ PSEC 1: Fujisaki-Okamoto (PKC’99)

conversion applied on El Gamal for which IND-CPA = D-DH

◆ PSEC 2: Fujisaki-Okamoto (Crypto’99)

conversion applied on El Gamal for which OW-CPA = C-DH

◆ PSEC 3: Okamoto-Pointcheval

new conversion (OCAC) which makes any OW-PCA cryptosystem into an IND-CCA cryptosystem

slide-23
SLIDE 23

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 45 David Pointcheval ENS-CNRS

A New Attack: PCA A New Attack: PCA

◆ Plaintext Checking Attack: the adversary

  • can get the encryption of any plaintext
  • f her choice (by encrypting it by herself)
  • has furthermore access to an oracle

which, on input a pair (m,c), answers whether c encrypts m, or not

Remark: IND-PCA cannot be achieved ⇒ we will just be interested in OW-PCA

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 46 David Pointcheval ENS-CNRS

The Diffie-Hellman Problems:

  • computational

✦ Given A=ga and B=gb ✦ Compute DH(A,B) = C=gab

A New DL A New DL-

  • based Problem: G

based Problem: G-

  • DH

DH

✦ Given A, B and C in <g> ✦ Decide whether C = DH(A,B)

  • decisional
  • Gap

Solve the computational problem, with access to a decisional oracle

slide-24
SLIDE 24

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 47 David Pointcheval ENS-CNRS

Intractability of the Gap Intractability of the Gap-

  • DH

DH

The Computational Diffie-Hellman problem is believed intractable for suitable groups Gap-DH easy ⇒ D-DH = C-DH D-DH easy ⇒ G-DH = C-DH The Computational Diffie-Hellman problem is believed strictly stronger than the Decisional version ⇒ G-DH intractable El Gamal OW-PCA = G-DH

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 48 David Pointcheval ENS-CNRS

PSEC PSEC -

  • 3

3

◆ G and H: two hash functions ◆ , : symmetric encryption scheme x : secret key y=gx : public key E(m): a ←R

q, R ←R

A ← ga , A’ ← R ya k ← G(R), B ←

k(m),

C ← H(A, A’, R, m) (A , A’, B, C) D(A,A’,B,C): R ← A’/Ax, k ← G(R), m ←

k(B),

check whether C = H(A, A’, R, m)

slide-25
SLIDE 25

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 49 David Pointcheval ENS-CNRS

Security Result Security Result

One just needs a symmetric encryption semantically secure against passive attacks: ◆ One-Time Pad: perfectly secure (Adv = 0) ◆ Any classical scheme (DES, IDEA, AES,…) Adv = ν (very small) If an adversary against IND-CCA reaches an advantage Adv > Adv

  • ne can break the Gap-DH problem

with probability greater than (Adv - Adv)/2 - q /2lH

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 50 David Pointcheval ENS-CNRS

Semantic Security (OTP) Semantic Security (OTP)

Given A ← ga , A’ ← R ya = R . DH(A,y) k ← G(R), B ← k ⊕ m, C ← H(A, A’, R, m) In order to guess b such that m = mb an adversary has to ask either

  • R to G to get k

(and check B)

  • (A,A’,R,m) to H

(and check C) because of the randomness of G and H Probability that R (=A’/DH(A,y)) has been asked to G or H greater than Adv

/2
slide-26
SLIDE 26

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 51 David Pointcheval ENS-CNRS

Plaintext Extractor Plaintext Extractor

Plaintext-Awareness (Bellare-Rogaway EC‘94) (A,A’,B,C) ciphertext valid ⇒ one has asked (A,A’,R,m) to H to get a valid C

(but with probability less than 1/2lH)

The plaintext extractor, to decrypt a given ciphertext (A,A’,B,C), looks, for any query (A,A’,R,m) to H which leads to C, whether

  • R = A’/DH(A,y) (thanks to the DDH-oracle)
  • B =

k(m) for k = G(R)

Correct extraction with probability greater than 1 - 1/2lH

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 52 David Pointcheval ENS-CNRS

CCA Security CCA Security

After qD queries to the decryption oracle ◆ all the decryptions are correctly simulated with probability greater than

(1 - 1/2lH)q

  • ≥ 1 - q / 2lH

◆ R has been asked to G or H with probability greater than

H

l

q 2

D

− Adv

slide-27
SLIDE 27

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 53 David Pointcheval ENS-CNRS

Properties of PSEC Properties of PSEC-

  • 3

3

◆ this is a new EG-scheme:

  • OW-CPA

= C-DH (+ROM)

  • OW-PCA

= Gap-DH (+ROM)

  • IND-CCA

= Gap-DH (+ROM)

◆ hybridity: one can integrate any symmetric encryption scheme, semantically secure against passive attacks (a very weak notion of security) e.g. the one-time pad (perfect security), any AES candidate, DES, etc…

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 54 David Pointcheval ENS-CNRS

Efficiency Efficiency

This is the most efficient El Gamal variant:

  • nly 2 exp./Enc and just 1 exp./Dec
  • Tsiounis-Yung (PKC ‘98) D-DH + ROM + Other

3 exp./Enc - 3 exp./Dec

  • Shoup-Gennaro (EC ‘98) D-DH + ROM

5 exp./Enc - 7 exp./Dec

  • Cramer-Shoup (Crypto ‘98) D-DH

5 exp./Enc - 3 exp./Dec

  • PSEC-1/2 (PKC ‘99/Crypto ‘99) D/C-DH + ROM

2 exp./Enc - 3 exp./Dec

slide-28
SLIDE 28

David Pointcheval Département d ’Informatique ENS - CNRS

Com2MaC Workshop

  • n Cryptography

26-28 june 2000 - Pohang - South Korea

David.Pointcheval@ens.fr http://www.di.ens.fr/~pointche

Conclusion

Secure Designs for Public-Key Cryptography based on the Discrete Logarithm Pohang - South Korea - June 26th 2000 - 56 David Pointcheval ENS-CNRS

Conclusion Conclusion

The discrete logarithm setting is very rich: ◆ One-Way problem ⇒ Secure Signature ◆ Trapdoor One-Way problem: Diffie-Hellman problems

  • computational
  • decisional
  • gap

⇒ Secure Encryption ◆ All are homomorphic ⇒ Efficiency