identity based encryption and pairings
play

Identity-Based Encryption and Pairings 1 Mihir Bellare, UCSD 2 - PowerPoint PPT Presentation

The People Identity-Based Encryption and Pairings 1 Mihir Bellare, UCSD 2 Mihir Bellare, UCSD Receiver has identity I The Awards Example: I = bob@example.com PKE cert I cert I Sender Receiver Trusted Alice M C Bob Authority Receiver


  1. The People Identity-Based Encryption and Pairings 1 Mihir Bellare, UCSD 2 Mihir Bellare, UCSD Receiver has identity I The Awards Example: I = bob@example.com PKE cert I cert I Sender Receiver Trusted Alice M C Bob Authority Receiver generates her own key pair (pk,sk) Trusted authority (CA), given pk , provides receiver with a certificate cert I Sender needs Receiver’s certificate before she can encrypt IBE I sk I Sender Receiver Trusted Alice M C Bob Authority Receiver generates nothing a priori Sender only needs receiver’s identity I before she can encrypt Trusted authority (CA), given I , provides receiver with a decryption key 3 Mihir Bellare, UCSD 4 Mihir Bellare, UCSD

  2. Syntax of an IBE scheme Security of an IBE scheme IBE = ( P , K , E , D ) algorithm msk sk mpk P K mpk parameter generation P A M = ? I C ← $ E ( mpk , I, M ) K key generation I E encryption sk 0 ← $ K ( mpk , msk , I 0 ) D decryption E for any I 0 6 = I M IBE = ( P , K , E , D ) is an IBE scheme. mpk master public key C Adversary A should be unable to figure out a message M encrypted to identity I , even msk master secret key given I identity D • The master public key mpk M sk secret (decryption) key for I • The identity I • The ciphertext C M message The correct decryption requirement • AND: Secret key sk 0 for any identity I 0 6 = I for identity I and message M asks that C ciphertext Pr[ D ( mpk , K ( mpk , msk , I ) , E ( mpk , I, M )) = M ] = 1 5 Mihir Bellare, UCSD 6 Mihir Bellare, UCSD IBE = ( P , K , E , D ) is an IBE scheme. Security of an IBE scheme Building an IBE scheme Let A be an adversary. It is hard to find a way to build an IND-CPA-secure IBE Game IND-CPA IBE Adv ind - cpa ( A ) = 2 Pr[IND-CPA A IBE ⇒ true ] − 1 scheme based on conventional number theory. IBE Initialize ( mpk , msk ) ← $ P ; b ← $ { 0 , 1 } b Challenge bit ExI ← ∅ ; ChI ← ∅ With RSA, let ExI Set of exposed identities Return mpk ChI Set of challenge identities • mpk = (N,e) b 0 A ’s output, guess of b • msk = (N,d) Expose ( I ) • sk = ? If ( I ∈ ChI) then return ⊥ • C = ? ExI ← ExI ∪ { I } Security requires that adversary can’t figure out whether left sk ← $ K ( mpk , msk , I ) ( b =0) or right ( b =1) messages are encrypted for challenge Return sk identities. LR ( I, M 0 , M 1 ) Even when it is allowed to obtain the secret keys of non- If ( I ∈ ExI) then return ⊥ challenge identities. IBE = ( P , K , E , D ) is an IBE scheme. ChI ← ChI ∪ { I } C ← $ E ( mpk , I, M b ) Return C Finalize ( b 0 ) Return ( b = b 0 ) 7 Mihir Bellare, UCSD 8 Mihir Bellare, UCSD

  3. Pairings Let e : G × G → G T be a function, where G , G T are groups whose order p is a prime. Let g be a generator of G . We say that e is a pairing if the following are true: • Bi-linearity: e ( g x , g y ) = e ( g, g ) xy for all x, y ∈ Z p • Non-degeneracy: e ( g, g ) is a generator of G T . Game BDH e ,g Finalize ( Z ) Initialize a, b, c ← $ Z p Return ( Z = e ( g, g ) abc ) Return g a , g b , g c Adv bdh e ,g ( A ) = Pr[BDH A e ,g ⇒ true ] Pairings that appear to be BDH-secure can be built from the Weil and Tate pairings over elliptic curves. 9 Mihir Bellare, UCSD 10 Mihir Bellare, UCSD Boneh-Franklin IBE scheme Algorithm P msk ← $ Z p ; mpk ← g msk Return ( mpk , msk ) IBE features Algorithm K ( mpk , msk , I ) e : G × G → G T a BDH-secure pairing sk ← H ( I ) msk ; Return sk g a generator of G p the order of G , G T Sender only needs receiver’s identity I before she can encrypt Algorithm E ( mpk , I, M ) Identity I ∈ { 0 , 1 } ∗ ``Trusted’’ authority can decrypt all ciphertexts for all identities r ← $ Z p ; R ← g r ; K ← e ( mpk , H ( I ) r ) Message M ∈ { 0 , 1 } m Revocation is a pain W ← G ( K ) ⊕ M ; Return ( R, W ) Function H : { 0 , 1 } ∗ → G Function G : G T → { 0 , 1 } m Algorithm D ( mpk , sk , ( R, W )) L ← e ( R, sk ) ; M ← G ( L ) ⊕ W ; Return M Proof of correct decryption L = e ( R, sk ) from decryption algorithm IBE issues requirement: = e ( g r , H ( I ) msk ) from encryption algorithm Let I ∈ { 0 , 1 } ∗ be an identity. = e ( g r , g i · msk ) because H(I) = g i Let M ∈ { 0 , 1 } m be a message ``Trusted’’ authority can decrypt all ciphertexts for all identities = e ( g, g ) ri · msk Let sk = K ( mpk , msk , I ) = H ( I ) msk bi-linearity Compromise of server storing msk can result in adversary decrypting all ciphertexts for Let ( R, W ) ← $ E ( mpk , I, M ) all identities = e ( g msk , g ir ) bi-linearity We show that D ( mpk , sk , ( R, W )) = M = e ( mpk , H ( I ) r ) A secure channel is needed to communicate sk from trusted authority to receiver = K from encryption algorithm Revocation is a pain Let i be such that H ( I ) = g i 11 Mihir Bellare, UCSD 12 Mihir Bellare, UCSD

  4. 13 Mihir Bellare, UCSD

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend