Oblivious Signature-Based Envelope scheme (OSBE) Presented By: - - PowerPoint PPT Presentation

oblivious signature based envelope scheme osbe
SMART_READER_LITE
LIVE PREVIEW

Oblivious Signature-Based Envelope scheme (OSBE) Presented By: - - PowerPoint PPT Presentation

Oblivious Signature-Based Envelope scheme (OSBE) Presented By: Khaled Rabieh Supervisor: Dr. Mohamed Mahmoud Outline - What is Oblivious Signature-Based Envelope (OSBE)? - Applications - cryptosystem - Analysis 2 Problem Formulation -


slide-1
SLIDE 1

Presented By: Khaled Rabieh

Oblivious Signature-Based Envelope scheme (OSBE)

Supervisor: Dr. Mohamed Mahmoud

slide-2
SLIDE 2

2

Outline

  • What is Oblivious Signature-Based Envelope (OSBE)?
  • Applications
  • cryptosystem
  • Analysis
slide-3
SLIDE 3

3

Problem Formulation

  • Alice and Bob need to communicate based on some attributes
  • n their certificates.
  • They should exchange certificates
  • However,

revealing some attributes in the certificate are sensitive such as top-secret clearance. Bob Bob’s certificate Alice Alice’s certificate Secure session

slide-4
SLIDE 4

4

Oblivious Signature-Based Envelope

  • Alice can prove to Bob that it has a third party signature on m

without revealing the signature to Bob Bob m = I am an FBI Agent Alice If you are FBI, decrypt this packet Enc(P) Bob can prove to Alice that he has a signature

  • n m if he recovers P
slide-5
SLIDE 5

5

Applications

  • Online Publishing library
  • OSBE enables users to gain access without disclosing which
  • rganizations they are members of. (Privacy preserving)

Request for docs with out sending the certificate, Encrypted envelope that contains a certain message The user can recover the message if he has a valid certificate

slide-6
SLIDE 6

6

OSBE based on RSA signature

RSA Signature

  • Choose p, q are two large random prime numbers
  • Compute n = p*q
  • Compute Φ(n) = (p-1) * (q-1)
  • Choose two random numbers e,d such that ed=1 mod Φ(n)
  • Public key is (e, n)
  • Private key is d
  • Signature is SIG(m) = δ = H(m)d
  • Verification (m, δ)
  • Check if H(m) = δe (mod n) = H(m)de =H(m)
slide-7
SLIDE 7

7

OSBE based on RSA signature

 Party R1 needs to prove to S that he has a valid third party signature on a known message M

S R1

slide-8
SLIDE 8

8

OSBE based on RSA signature

h = H(m) X and y are random numbers

signature blinded with random secret

Signature Symmetric key

slide-9
SLIDE 9

9

OSBE based on RSA signature

Diffie-Hellman base hde =h RSA decryption

slide-10
SLIDE 10

10

Analysis OSBE based on RSA signature

 S can not extract the signature of R1 because it is blinded by hx.  S can be sure that R1 indeed has the signature if R1 decrypts Enc(P)  R1 proves to S that he has a valid signature though not revealing his sensitive attributes in his certificate.

slide-11
SLIDE 11

11

Performance Analysis

R1 needs 1 multiplication and 1 exponentiation to generate S needs 2 multiplications and 2 exponentiations to generate R1 needs 1 exponentiation operation to generate

slide-12
SLIDE 12

Questions

slide-13
SLIDE 13

13

OSBE based on BLS signatures  BLS signatures  There exists one multiplicative group G1 with generator g  There exists a bilinear map e such that e(G1,G1) =G2  Choose a random element x belongs to Z*

p.

 The public key is h=gx and x is a private key.  A hash function H that maps from {0,1}* to G1  To sign a message m, the signature δ = H(m)x  To verify a signature, check if

e(g, δ) == e(h,H(m))

slide-14
SLIDE 14

14

OSBE based on BLS signatures  A message P is encrypted using H(M)  Only the one who has the private key H(M)s decrypts the message P

A signature proof