forward secure id based setting
play

Forward-Secure ID-Based Setting Madeline Gonz lez Mu iz* and Peeter - PowerPoint PPT Presentation

Chameleon Hashes in the Forward-Secure ID-Based Setting Madeline Gonz lez Mu iz* and Peeter Laud Theory Days Trve , Estonia October 8, 2011 MOTIVATION FOR CHAMELEON HASHING 2 of 33 Sanitizable Signature Schemes Allow modification


  1. Chameleon Hashes in the Forward-Secure ID-Based Setting Madeline Gonz á lez Mu ñ iz* and Peeter Laud Theory Days Tõrve , Estonia October 8, 2011

  2. MOTIVATION FOR CHAMELEON HASHING 2 of 33

  3. Sanitizable Signature Schemes » Allow modification to the original message  Pre-determined deletion  Pre-determined modification  Chameleon hashes » Sender →Sanitizer→Receiver 3

  4. Chameleon Hashes » Introduced by Krawczyk and Rabin in 2000 » Collision-resistant with a trapdoor for finding collisions » Key exposure problem » Non-transferable 4

  5. Key Exposure Problem [KR2000] » For public key y = g x mod p » Hash defined as h ( m , r )= g m y r mod p » One can solve for x given ( m , r ) and ( m' , r' ) such that g m y r = g m' y r' 5

  6. PRELIMINARIES 6 of 33

  7. Identity-Based Cryptography Has a master public/private Authenticate to Key key Generator Key Generator gives ID a private key for the system Public key computed from ID 7

  8. Bilinear Map (Pairing) Let G 1 (+) and G 2 ( · ) be two groups of prime order q e : G 1 Χ G 1 → G 2 a bilinear map: 1. Bilinear: e ( α P , β Q )= e ( P , Q ) αβ 2. Non-degenerate 3. Efficiently computable 8

  9. Bilinear Computational Diffie- Hellman Problem Given P , α P , β P , γ P , compute: e ( P, P ) αβγ We will refer to this as BCDH 9

  10. Bilinear Decisional Diffie- Hellman Problem Given P , α P , β P , γ P , decide: random element in G 2 or e ( P, P ) αβγ We will refer to this as BDDH 10

  11. Pseudorandom Bit Generator » Bellare and Yee 2003 » G =( G k , G n , k , T )  G k takes no input, outputs Seed 0  G n deterministically takes input Seed t -1 , outputs ( Out t , Seed t ) where Out t is a k -bit block and runs a max of T times » Indistinguishable from a function that outputs k -bit blocks unif at random 11

  12. CHAMELEON HASHES IN ID-BASED SETTING W/O KEY EXPOSURE 12 of 33

  13. Chen et al. 2010 Proposed Scheme » Setup e : G 1 Χ G 1 → G 2 Master Secret key s Master Public key sP H ( ID ) 13

  14. Key Extraction s sP Authenticate as ID sH ( ID ) 14

  15. Chameleon Hash Sender • Select a uniformly at random • r =( aP , e ( a ( sP) , H ( ID )) • h = aP + mH 1 ( L ) public H ( ID ) L is a transaction label 15

  16. Collision (Forgery) by ID • Select message m' • a'P=aP+ ( m - m' ) H 1 ( L ) • r' =( a'P , e ( a'P , sH ( ID )) private The proof relies on the sH ( ID ) difficulty of computing the second component of r' 16

  17. The Problem » Who can verify the correctness of the second component of r and r' ?  Sender knows discrete log a  Forger using private key  BDDH easy » Solution  Include a NIZK proof 17

  18. SECURITY MODEL W/ FORWARD SECURITY 18 of 33

  19. Properties » Forward-secure collision resistance » Indistinguishability 19

  20. Forward-Secure Collision Resistance » Users in the system are honest params P 0 P 1 P t SK ID for break-in time t 20

  21. Collision Forgery » For t' < t P t' , ID' , L , m , r P t' , ID' , L , m' , r' Same hash output 21

  22. Indistinguishability params Extraction Oracle P t , ID , L , m h ( P t , ID , L , m , r ) h ( P t , ID , L , m * , r ) 22

  23. PROPOSED CONSTRUCTION 23 of 33

  24. Proposed Forward-Secure KGC Model e : G 1 Χ G 1 → G 2 G =( G k , G n , k , T ) At time t =0 Master secret key S 0 =( s 0 , Seed 0 ) Master public key P 0 = s 0 P Given S t -1 =( s t -1 , Seed t -1 ) G n ( Seed t -1 )=( Out t , Seed t ) Master Compute s t = H ( Out t ) s t -1 Key Master secret key S t =( s t , Seed t ) Update Master public key P t = s t P 24

  25. Key Extraction and Identity Update Authenticate as ID s t H ( ID ), P t Given S t -1 =( s t -1 H ( ID ), Seed t -1 ), P t -1 User G n ( Seed t -1 )=( Out t , Seed t ) Key User secret key S t =( H ( Out t ) s t -1 H ( ID ), Seed t ) Update =( s t H ( ID ), Seed t ) Master public key P t = H ( Out t ) P t -1 25

  26. Hashing Algorithm Sender • Select a uniformly at random • r =( aP , e ( aP t , H ( ID ))) • h = aP + mH 1 ( L ) and NIZK π that r was correctly formed 26

  27. Collision (Forging) Algorithm • Select message m' • a'P=aP+ ( m-m' ) H 1 ( L ) • r'= ( a'P, e ( a'P , s t H ( ID ))) • NIZK π ' that r' was correctly formed Receiver 27

  28. SECURITY OF PROPOSED CONSTRUCTION 28 of 33

  29. BCDH Reduction Challenger P , αP , βP , γP A can create a collision in e ( P, P ) αβγ the hash B interacts with A to solve BCDH B A 29

  30. Collision Resistance » Assumption that BCDH is hard » Using the second component of r and r' we have the following:  e ( a'P , s t H ( ID )) = e ( aP + ( m-m' ) H 1 ( L ), s t H ( ID )) = e ( aP , s t H ( ID )) e ( H 1 ( L ), s t H ( ID )) m-m'  e ( a'P , s t H ( ID )) / e ( aP , s t H ( ID )) = e ( s t H ( ID ), H 1 ( L )) m - m'  e ( s t H ( ID ), H 1 ( L )) used in simulation to introduce challenge 30

  31. BCDH Challenge Given P α P=P t = s t P β P=H ( ID ) γ P=H 1 ( L ) compute: e ( s t H ( ID ), H 1 ( L ))= e ( P , P ) αβγ 31

  32. Open Problem » Attribute-based setting  User with threshold number of attributes can compute collision  Sahai and Waters  Public parameter for each attribute  Chameleon hash with the following condition:  Hash depends on message, attributes, and attribute authority’s public key  User and attribute authority interact once 32

  33. THANKS 33

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend