spatial encryption
play

Spatial Encryption Adam Barth Dan Boneh Mike Hamburg March 17, - PowerPoint PPT Presentation

Spatial Encryption Adam Barth Dan Boneh Mike Hamburg March 17, 2008 Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption Traditional Public-Key Infrastructure CA Alice Bob Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption


  1. Spatial Encryption Adam Barth Dan Boneh Mike Hamburg March 17, 2008 Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  2. Traditional Public-Key Infrastructure CA Alice Bob Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  3. Traditional Public-Key Infrastructure CA PK Bob , proof of identity Alice Bob Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  4. Traditional Public-Key Infrastructure CA PK Bob , proof of identity S CA (PK Bob ) Alice Bob Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  5. Traditional Public-Key Infrastructure CA PK Bob , proof of identity S CA (PK Bob ) PK Bob , S CA (PK Bob ) Alice Bob Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  6. Traditional Public-Key Infrastructure CA PK Bob , proof of identity S CA (PK Bob ) PK Bob , S CA (PK Bob ) Alice Bob E PK Bob ( m ) Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  7. Traditional Public-Key Infrastructure CA PK Bob , proof of identity S CA (PK Bob ) PK Bob , S CA (PK Bob ) Alice Bob E PK Bob ( m ) But for email, Bob is offline! Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  8. Identity-Based Encryption ◮ Public key can be any string ◮ Private key given by trusted authority Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  9. Identity-Based Encryption ◮ Public key can be any string ◮ Private key given by trusted authority PKG Alice Bob Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  10. Identity-Based Encryption ◮ Public key can be any string ◮ Private key given by trusted authority PKG proof of identity Alice Bob Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  11. Identity-Based Encryption ◮ Public key can be any string ◮ Private key given by trusted authority PKG SK bob@microsoft.com proof of identity Alice Bob Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  12. Identity-Based Encryption ◮ Public key can be any string ◮ Private key given by trusted authority PKG SK bob@microsoft.com proof of identity Alice Bob E bob@microsoft.com ( m ) Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  13. Problems using IBE for Email ◮ Sending to multiple recipients ◮ Lots of ciphertext ◮ Solved by broadcast IBE Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  14. Problems using IBE for Email ◮ Sending to multiple recipients ◮ Lots of ciphertext ◮ Solved by broadcast IBE ◮ Multiple trusted authorities Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  15. ✧ ✧ ✧ ✧ ✪ ✪ ✧ Email Encryption Wishlist ◮ Send to multiple recipients ◮ Trust in multiple authorities ◮ Short ciphertexts ◮ Short public keys ◮ Short private keys ◮ No central authority ◮ Hierarchical delegation Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  16. Email Encryption Wishlist ◮ Send to multiple recipients ✧ ◮ Trust in multiple authorities ✧ ◮ Short ciphertexts ✧ (2 group elements) ◮ Short public keys ✧ (random oracle model) ◮ Short private keys ✪ O (max recipient list) ◮ No central authority ✪ ◮ Hierarchical delegation ✧ Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  17. Spatial Encryption ◮ A new primitive ◮ Identities are points in a vector space ◮ Keys for any hyperplane ◮ Can decrypt at any point in the hyperplane ◮ Delegate from plane to line to point Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  18. Our implementation ◮ Encryption, decryption are efficient ◮ Ciphertext is short ◮ Master public key is long but random ◮ Proportional to dimension of vs ◮ Short in the random oracle model ◮ Private keys are long ◮ Proportional to dimension of vs Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  19. Spatial Encryption for Email ◮ Vector space is polynomials ◮ SK Auth : polys w/root at Auth ◮ SK Auth, Bob : polys w/roots at Auth, Bob ◮ Alice encrypts her message to ( x − voltage)( x − thawte) · · · ( x − bob@...) · · · ( x − zak@...) Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  20. Hierarchical IBE ◮ W for /path/to/data/ is (path , to , data , ∗ , . . . , ∗ ) Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  21. Hierarchical IBE ◮ W for /path/to/data/ is (path , to , data , ∗ , . . . , ∗ ) ... or ... ◮ W is ( x − /path)( x − /path/to)( x − /path/to/data) · Q ( x ) ◮ Enables broadcast HIBE ◮ Enables delegation for email encryption Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  22. Nitty-Gritty ◮ Based on Boneh-Boyen-Goh H-IBE ◮ Uses bilinear pairings ◮ Selective-ID secure in the standard model Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  23. Summary ◮ A new crypto primitive ◮ Generalization of H-IBE ◮ Enables efficient email encryption ◮ Enables broadcast H-IBE Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

  24. The End Questions? Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend