Junqing Gong Xiaolei Dong, Jie Chen, Zhenfu Cao Shanghai Jiao - - PowerPoint PPT Presentation

β–Ά
junqing gong xiaolei dong jie chen zhenfu cao shanghai
SMART_READER_LITE
LIVE PREVIEW

Junqing Gong Xiaolei Dong, Jie Chen, Zhenfu Cao Shanghai Jiao - - PowerPoint PPT Presentation

Junqing Gong Xiaolei Dong, Jie Chen, Zhenfu Cao Shanghai Jiao Tong University East China Normal University ASIACRYPT 2016, Hanoi, Vietnam Dec 7, 2016 background motivation strategy technical result 1: revisiting


slide-1
SLIDE 1

ASIACRYPT 2016, Hanoi, Vietnam Dec 7, 2016

Xiaolei Dong, Jie Chen, Zhenfu Cao East China Normal University Junqing Gong Shanghai Jiao Tong University

slide-2
SLIDE 2
  • background
  • motivation
  • strategy
  • technical result 1: revisiting Blazy-Kiltz-Pan IBE
  • technical result 2: towards multi-challenge setting
  • comparison
slide-3
SLIDE 3
  • background
  • motivation
  • strategy
  • technical result 1: revisiting Blazy-Kiltz-Pan IBE
  • technical result 2: towards multi-challenge setting
  • comparison
slide-4
SLIDE 4

𝑑𝑒 𝐽𝐸 𝑑𝑙𝐽𝐸 π‘›π‘žπ‘™ π‘›π‘žπ‘™

slide-5
SLIDE 5

…

revealed keys 𝑑𝑒 𝐽𝐸 𝑑𝑙𝐽𝐸 π‘›π‘žπ‘™ π‘›π‘žπ‘™ π‘›π‘žπ‘™

slide-6
SLIDE 6

…

revealed keys 𝑑𝑒 challenger adversary 𝑐 ←𝑆 {0,1} 𝐽𝐸

π‘˜ β‰  IDβˆ—

π‘›π‘žπ‘™ 𝑐′ 𝐽𝐸

π‘˜

π‘‘π‘™π½πΈπ‘˜ π‘‘π‘’π½πΈβˆ—,𝑛𝑐 𝑛0, 𝑛1 𝑐 = 𝑐′? 𝐽𝐸

π‘˜

π‘‘π‘™π½πΈπ‘˜

formal definition

𝐽𝐸 𝑑𝑙𝐽𝐸 π‘›π‘žπ‘™ π‘›π‘žπ‘™ π‘›π‘žπ‘™

slide-7
SLIDE 7

…

revealed keys 𝑑𝑒 challenger adversary 𝑐 ←𝑆 {0,1} 𝐽𝐸

π‘˜ β‰  IDβˆ—

π‘›π‘žπ‘™ 𝑐′ 𝐽𝐸

π‘˜

π‘‘π‘™π½πΈπ‘˜ π‘‘π‘’π½πΈβˆ—,𝑛𝑐 𝑛0, 𝑛1 𝑐 = 𝑐′? 𝐽𝐸

π‘˜

π‘‘π‘™π½πΈπ‘˜

formal definition

𝐽𝐸 𝑑𝑙𝐽𝐸 π‘›π‘žπ‘™ π‘›π‘žπ‘™ π‘›π‘žπ‘™ query phase

slide-8
SLIDE 8

…

revealed keys 𝑑𝑒 challenger adversary 𝑐 ←𝑆 {0,1} 𝐽𝐸

π‘˜ β‰  IDβˆ—

π‘›π‘žπ‘™ 𝑐′ 𝐽𝐸

π‘˜

π‘‘π‘™π½πΈπ‘˜ π‘‘π‘’π½πΈβˆ—,𝑛𝑐 𝑛0, 𝑛1 𝑐 = 𝑐′? 𝐽𝐸

π‘˜

π‘‘π‘™π½πΈπ‘˜

formal definition

𝐽𝐸 𝑑𝑙𝐽𝐸 π‘›π‘žπ‘™ π‘›π‘žπ‘™ π‘›π‘žπ‘™ query phase challenge phase

slide-9
SLIDE 9
slide-10
SLIDE 10

solver B for hard problem adversary A against IBE

reduction

πœ—π΅

πœ—πΆ

slide-11
SLIDE 11

solver B for hard problem adversary A against IBE

reduction

reduction loss = πœ—π΅/πœ—πΆ

πœ—π΅

πœ—πΆ

slide-12
SLIDE 12

solver B for hard problem adversary A against IBE

reduction

reduction loss = πœ—π΅/πœ—πΆ

πœ—π΅

πœ—πΆ tighter reduction smaller reduction loss

slide-13
SLIDE 13

solver B for hard problem adversary A against IBE

reduction

reduction loss = πœ—π΅/πœ—πΆ

πœ—π΅

πœ—πΆ tighter reduction smaller reduction loss more efficient implementation better theoretical result

slide-14
SLIDE 14
slide-15
SLIDE 15

basic/single-challenge setting + multiple challenge queries: more than one challenge ct + multiple instances: multiple mpk

multi-challenge setting

slide-16
SLIDE 16

query phase challenge phase

……

query phase challenge phase challenge phase query phase

π‘›π‘žπ‘™1, π‘›π‘žπ‘™2, … , π‘›π‘žπ‘™π‘€ 𝑐′

basic/single-challenge setting + multiple challenge queries: more than one challenge ct + multiple instances: multiple mpk

multi-challenge setting

slide-17
SLIDE 17

single-challenge setting multi-challenge setting

good news

query phase challenge phase

……

query phase challenge phase challenge phase query phase

π‘›π‘žπ‘™1, π‘›π‘žπ‘™2, … , π‘›π‘žπ‘™π‘€ 𝑐′

basic/single-challenge setting + multiple challenge queries: more than one challenge ct + multiple instances: multiple mpk

multi-challenge setting

slide-18
SLIDE 18

single-challenge setting multi-challenge setting NOT tightness preserving

good news bad news

query phase challenge phase

……

query phase challenge phase challenge phase query phase

π‘›π‘žπ‘™1, π‘›π‘žπ‘™2, … , π‘›π‘žπ‘™π‘€ 𝑐′

basic/single-challenge setting + multiple challenge queries: more than one challenge ct + multiple instances: multiple mpk

multi-challenge setting

slide-19
SLIDE 19
  • background
  • motivation
  • strategy
  • technical result 1: revisiting Blazy-Kiltz-Pan IBE
  • technical result 2: towards multi-challenge setting
  • comparison
slide-20
SLIDE 20

multi-challenge bilinear groups assumption ciphertext size CW13 no composite & prime k-lin 2k + 2k BKP14 no prime k-lin k + (k+1) HKS15 yes composite static 1 + 1 AHY15 yes prime stronger 2-lin 4 + 4 (k=2) GCD+16 yes prime k-lin 3k + 3k stronger k-lin 2k + 2k

slide-21
SLIDE 21

multi-challenge bilinear groups assumption ciphertext size CW13 no composite & prime k-lin 2k + 2k BKP14 no prime k-lin k + (k+1) HKS15 yes composite static 1 + 1 AHY15 yes prime stronger 2-lin 4 + 4 (k=2) GCD+16 yes prime k-lin 3k + 3k stronger k-lin 2k + 2k more realistic

slide-22
SLIDE 22

multi-challenge bilinear groups assumption ciphertext size CW13 no composite & prime k-lin 2k + 2k BKP14 no prime k-lin k + (k+1) HKS15 yes composite static 1 + 1 AHY15 yes prime stronger 2-lin 4 + 4 (k=2) GCD+16 yes prime k-lin 3k + 3k stronger k-lin 2k + 2k more realistic more efficient in general

slide-23
SLIDE 23

almost-tightly secure IBE

multi-challenge bilinear groups assumption ciphertext size CW13 no composite & prime k-lin 2k + 2k BKP14 no prime k-lin k + (k+1) HKS15 yes composite static 1 + 1 AHY15 yes prime stronger 2-lin 4 + 4 (k=2) GCD+16 yes prime k-lin 3k + 3k stronger k-lin 2k + 2k

slide-24
SLIDE 24

almost-tightly secure IBE

multi-challenge bilinear groups assumption ciphertext size CW13 no composite & prime k-lin 2k + 2k BKP14 no prime k-lin k + (k+1) HKS15 yes composite static 1 + 1 AHY15 yes prime stronger 2-lin 4 + 4 (k=2) GCD+16 yes prime k-lin 3k + 3k stronger k-lin 2k + 2k

slide-25
SLIDE 25

almost-tightly secure IBE

multi-challenge bilinear groups assumption ciphertext size CW13 no composite & prime k-lin 2k + 2k BKP14 no prime k-lin k + (k+1) HKS15 yes composite static 1 + 1 AHY15 yes prime stronger 2-lin 4 + 4 (k=2) GCD+16 yes prime k-lin 3k + 3k stronger k-lin 2k + 2k

trade-off

slide-26
SLIDE 26

almost-tightly secure IBE

multi-challenge bilinear groups assumption ciphertext size CW13 no composite & prime k-lin 2k + 2k BKP14 no prime k-lin k + (k+1) HKS15 yes composite static 1 + 1 AHY15 yes prime stronger 2-lin 4 + 4 (k=2) GCD+16 yes prime k-lin 3k + 3k stronger k-lin 2k + 2k

short ciphertext and weak/standard assumption simultaneously?

trade-off

slide-27
SLIDE 27
  • background
  • motivation
  • strategy
  • technical result 1: revisiting Blazy-Kiltz-Pan IBE
  • technical result 2: towards multi-challenge setting
  • comparison
slide-28
SLIDE 28

CW13 HKS15 BKP14 AHY15 GCD+16 single-challenge world multi-challenge world

slide-29
SLIDE 29

CW13 HKS15 BKP14 AHY15 GCD+16 single-challenge world multi-challenge world

assumption ciphertext size CW13 k-lin 2k + 2k BKP14 k + (k+1) = 2k + 1

slide-30
SLIDE 30

CW13 HKS15 BKP14 AHY15 GCD+16 single-challenge world multi-challenge world

?

assumption ciphertext size CW13 k-lin 2k + 2k BKP14 k + (k+1) = 2k + 1

slide-31
SLIDE 31

CW13 HKS15 BKP14 AHY15 GCD+16 single-challenge world multi-challenge world

?

possible? more efficient?

assumption ciphertext size CW13 k-lin 2k + 2k BKP14 k + (k+1) = 2k + 1

slide-32
SLIDE 32

B K P 14

affine MAC Groth-Sahai proof IBE

slide-33
SLIDE 33

B K P 14

IBE scheme

slide-34
SLIDE 34

B K P 14

IBE scheme

MAC tag for ID

slide-35
SLIDE 35

B K P 14

IBE scheme

commitment key commitment to SKMAC: MAC tag for ID

slide-36
SLIDE 36

B K P 14

IBE scheme

commitment key commitment to SKMAC: Groth-Sahai proof for correctness of the tag MAC tag for ID

slide-37
SLIDE 37

B K P 14

IBE scheme

they employ the dual system technique [Waters09], but

  • normal and semi-functional space is not obvious
  • incompatible with existing extension method
slide-38
SLIDE 38
  • background
  • motivation
  • strategy
  • technical result 1: revisiting Blazy-Kiltz-Pan IBE
  • technical result 2: towards multi-challenge setting
  • comparison
slide-39
SLIDE 39
slide-40
SLIDE 40

k-lin assumption

slide-41
SLIDE 41

k-lin assumption

a simple substitution

slide-42
SLIDE 42

k-lin assumption

a simple substitution

slide-43
SLIDE 43

k-lin assumption

a simple substitution

Observation

οƒΌ no 𝐙𝑗,𝑐 ; οƒΌ πšπ‘—,𝑐 are in the normal space; οƒΌ 𝐲𝑗,𝑐 are in the SF space.

slide-44
SLIDE 44

Blazy-Kiltz-Pan IBE

slide-45
SLIDE 45

Blazy-Kiltz-Pan IBE

rewrite define

slide-46
SLIDE 46

Blazy-Kiltz-Pan IBE Our simplified version

rewrite define

slide-47
SLIDE 47

k+1 k k

MPK CT SK

k+1 k k+1 1 k

slide-48
SLIDE 48

is similar to CGW15

k+1 k k

MPK CT SK

k+1 k k+1 1 k

[CGW15] J. Chen, R. Gay, H. Wee. Improved Dual System ABE in Prime-Order Groups via Predicate Encodings. EUROCRYPT 2015.

slide-49
SLIDE 49

k+1 k k

MPK CT SK

k+1 k

𝑗, 𝑐 ∈ π‘œ Γ— {0,1}

k+1 1 k

slide-50
SLIDE 50

k+1 k k

MPK CT SK

k+1 k

𝑗, 𝑐 ∈ π‘œ Γ— {0,1}

k+1 1 k

simple sk (no base 𝐂)

they do not need parameter-hiding property

slide-51
SLIDE 51

k+1 k k

MPK CT SK

k+1 k

𝑗, 𝑐 ∈ π‘œ Γ— {0,1}

k+1 1 k

smaller matrices

they employ a better mechanism for nested-hiding indistinguishability

simple sk (no base 𝐂)

they do not need parameter-hiding property

slide-52
SLIDE 52
slide-53
SLIDE 53

dual system group nested dual system group CW14 CW13 CGW15 extension identity based encryption non-tight tight

slide-54
SLIDE 54

dual system group nested dual system group CW14 CW13 CGW15 simplified BKP14 similar similar identity based encryption non-tight tight

slide-55
SLIDE 55

dual system group nested dual system group CW14 CW13 CGW15 simplified BKP14 identity based encryption non-tight tight similar similar

slide-56
SLIDE 56

nested dual system group prime-order instantiation CW13 realize

slide-57
SLIDE 57

nested dual system group generalized nested dual system group prime-order instantiation CW13 realize

slide-58
SLIDE 58

nested dual system group generalized nested dual system group prime-order instantiation CW13 prime-order instantiation motivated by BKP14 and CGW15 realize realize

slide-59
SLIDE 59

nested dual system group generalized nested dual system group prime-order instantiation CW13 prime-order instantiation motivated by BKP14 and CGW15 realize simplified BKP14 realize

slide-60
SLIDE 60
  • background
  • motivation
  • strategy
  • technical result 1: revisiting Blazy-Kiltz-Pan IBE
  • technical result 2: towards multi-challenge setting
  • comparison
slide-61
SLIDE 61

CW13 HKS15 simplified BKP14 AHY15 GCD+16 single-challenge world multi-challenge world BKP14

revisit

slide-62
SLIDE 62

CW13 HKS15 simplified BKP14 AHY15 GCD+16 single-challenge world multi-challenge world BKP14

revisit

?

possible? more efficient?

slide-63
SLIDE 63

k+1 k k

MPK

k+1 k k+1 1 k

[GCD+16] J. Gong, J. Chen, X. Dong, Z. Cao, S. Tang. Extended Nested Dual System Groups, Revisited. PKC 2016. [GHKW16] R. Gay, D. Hofheinz, E. Kiltz, H. Wee. Tightly CCA-Secure Encryption without Pairings. EUROCRYPT 2016.

slide-64
SLIDE 64

k+1 k k

MPK

k+1 k k+1 1 k

Dimension extension:

  • base matrix 𝐁: from (k+1)Γ—k to 3kΓ—k
  • 𝐗 and π₯: from kΓ—(k+1) to kΓ—3k

3k 3k 3k

[GCD+16] J. Gong, J. Chen, X. Dong, Z. Cao, S. Tang. Extended Nested Dual System Groups, Revisited. PKC 2016. [GHKW16] R. Gay, D. Hofheinz, E. Kiltz, H. Wee. Tightly CCA-Secure Encryption without Pairings. EUROCRYPT 2016.

slide-65
SLIDE 65

[GCD+16] J. Gong, J. Chen, X. Dong, Z. Cao, S. Tang. Extended Nested Dual System Groups, Revisited. PKC 2016. [GHKW16] R. Gay, D. Hofheinz, E. Kiltz, H. Wee. Tightly CCA-Secure Encryption without Pairings. EUROCRYPT 2016.

slide-66
SLIDE 66

Define bases for three spaces: normal space ∧-semi-functional space ∼-semi-functional space

[GCD+16] J. Gong, J. Chen, X. Dong, Z. Cao, S. Tang. Extended Nested Dual System Groups, Revisited. PKC 2016. [GHKW16] R. Gay, D. Hofheinz, E. Kiltz, H. Wee. Tightly CCA-Secure Encryption without Pairings. EUROCRYPT 2016.

slide-67
SLIDE 67

Define bases for three spaces:

  • hide different parts of 𝐗
  • support nested-hiding using leftover entropy

normal space ∧-semi-functional space ∼-semi-functional space

[GCD+16] J. Gong, J. Chen, X. Dong, Z. Cao, S. Tang. Extended Nested Dual System Groups, Revisited. PKC 2016. [GHKW16] R. Gay, D. Hofheinz, E. Kiltz, H. Wee. Tightly CCA-Secure Encryption without Pairings. EUROCRYPT 2016.

slide-68
SLIDE 68

CT SK

slide-69
SLIDE 69

CT SK

k+1 οƒ  3k k+1 οƒ  3k

slide-70
SLIDE 70

CT SK

k+1 οƒ  3k k+1 οƒ  3k

unchanged: k οƒ  k unchanged: k οƒ  k

slide-71
SLIDE 71

generalized nested dual system group prime-order instantiation motivated by BKP14 and CGW15 realize

slide-72
SLIDE 72

generalized extended nested dual system group generalized nested dual system group prime-order instantiation motivated by BKP14 and CGW15 realize

[GCD+16]

slide-73
SLIDE 73

generalized extended nested dual system group generalized nested dual system group prime-order instantiation [GCD+16] + [GHKW16] prime-order instantiation motivated by BKP14 and CGW15 realize

[GCD+16]

slide-74
SLIDE 74

generalized extended nested dual system group generalized nested dual system group prime-order instantiation [GCD+16] + [GHKW16] prime-order instantiation motivated by BKP14 and CGW15 realize realize

[GCD+16]

slide-75
SLIDE 75

generalized extended nested dual system group generalized nested dual system group prime-order instantiation [GCD+16] + [GHKW16] prime-order instantiation motivated by BKP14 and CGW15 realize realize

  • ur main construction

[GCD+16]

slide-76
SLIDE 76

CW13 HKS15 simplified BKP14 AHY15 GCD+16 single-challenge world multi-challenge world BKP14

revisit extend

  • ur main construction
slide-77
SLIDE 77
  • background
  • motivation
  • strategy
  • technical result 1: revisiting Blazy-Kiltz-Pan IBE
  • technical result 2: towards multi-challenge setting
  • comparison
slide-78
SLIDE 78

multi-challenge bilinear groups assumption ciphertext size CW13 no composite & prime k-lin 2k + 2k BKP14 no prime k-lin k + (k+1) HKS15 yes composite static 1 + 1 AHY15 yes prime stronger 2-lin 4 + 4 (k=2) GCD+16 yes prime k-lin 3k + 3k stronger k-lin 2k + 2k this work yes prime k-lin k+3k

slide-79
SLIDE 79

multi-challenge bilinear groups assumption ciphertext size CW13 no composite & prime

1-lin

4 BKP14 no prime

1-lin

3 HKS15 yes composite static 2 AHY15 yes prime stronger 2-lin 8 GCD+16 yes prime

1-lin

6 stronger 2-lin 8 this work yes prime

1-lin

4

slide-80
SLIDE 80

multi-challenge bilinear groups assumption ciphertext size CW13 no composite & prime

1-lin

4 BKP14 no prime

1-lin

3 HKS15 yes composite static 2 AHY15 yes prime stronger 2-lin 8 GCD+16 yes prime

1-lin

6 stronger 2-lin 8 this work yes prime

1-lin

4

slide-81
SLIDE 81

multi-challenge bilinear groups assumption ciphertext size CW13 no composite & prime

1-lin

4 BKP14 no prime

1-lin

3 HKS15 yes composite static 2 AHY15 yes prime stronger 2-lin 8 GCD+16 yes prime

1-lin

6 stronger 2-lin 8 this work yes prime

1-lin

4

slide-82
SLIDE 82

1.

revisit/simplify BKP14 IBE

οƒΌ a new instantiation of (generalized) nested dual system group οƒΌ compare CW13 and BKP14 in a more clear way 2.

extend simplified BKP14 to the multi-challenge setting

οƒΌ achieve short ciphertexts (also high performance in other aspects) under standard assumption οƒΌ lead to the most efficient concrete construction

οƒΌ both of them are weak anonymous [AHY15] οƒΌ β€œweak” means each id has unique secret key

additional feature

slide-83
SLIDE 83

Thank you for your attention! Any question?