Spatial Encryption Adam Barth Dan Boneh Mike Hamburg March 17, - - PowerPoint PPT Presentation

spatial encryption
SMART_READER_LITE
LIVE PREVIEW

Spatial Encryption Adam Barth Dan Boneh Mike Hamburg March 17, - - PowerPoint PPT Presentation

Spatial Encryption Adam Barth Dan Boneh Mike Hamburg March 17, 2008 Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption Traditional Public-Key Infrastructure CA Alice Bob Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption


slide-1
SLIDE 1

Spatial Encryption

Adam Barth Dan Boneh Mike Hamburg March 17, 2008

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-2
SLIDE 2

Traditional Public-Key Infrastructure

CA Bob Alice

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-3
SLIDE 3

Traditional Public-Key Infrastructure

CA Bob Alice PKBob, proof of identity

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-4
SLIDE 4

Traditional Public-Key Infrastructure

CA Bob Alice PKBob, proof of identity SCA(PKBob)

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-5
SLIDE 5

Traditional Public-Key Infrastructure

CA Bob Alice PKBob, proof of identity SCA(PKBob) PKBob, SCA(PKBob)

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-6
SLIDE 6

Traditional Public-Key Infrastructure

CA Bob Alice PKBob, proof of identity SCA(PKBob) PKBob, SCA(PKBob) EPKBob(m)

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-7
SLIDE 7

Traditional Public-Key Infrastructure

CA Bob Alice PKBob, proof of identity SCA(PKBob) PKBob, SCA(PKBob) EPKBob(m)

But for email, Bob is offline!

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-8
SLIDE 8

Identity-Based Encryption

◮ Public key can be any string ◮ Private key given by trusted authority

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-9
SLIDE 9

Identity-Based Encryption

◮ Public key can be any string ◮ Private key given by trusted authority

PKG Bob Alice

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-10
SLIDE 10

Identity-Based Encryption

◮ Public key can be any string ◮ Private key given by trusted authority

PKG Bob Alice proof of identity

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-11
SLIDE 11

Identity-Based Encryption

◮ Public key can be any string ◮ Private key given by trusted authority

PKG Bob Alice proof of identity SKbob@microsoft.com

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-12
SLIDE 12

Identity-Based Encryption

◮ Public key can be any string ◮ Private key given by trusted authority

PKG Bob Alice proof of identity SKbob@microsoft.com Ebob@microsoft.com(m)

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-13
SLIDE 13

Problems using IBE for Email

◮ Sending to multiple recipients

◮ Lots of ciphertext ◮ Solved by broadcast IBE Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-14
SLIDE 14

Problems using IBE for Email

◮ Sending to multiple recipients

◮ Lots of ciphertext ◮ Solved by broadcast IBE

◮ Multiple trusted authorities

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-15
SLIDE 15

Email Encryption Wishlist

◮ Send to multiple recipients

◮ Trust in multiple authorities

◮ Short ciphertexts

◮ Short public keys

◮ Short private keys

◮ No central authority

◮ Hierarchical delegation

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-16
SLIDE 16

Email Encryption Wishlist

◮ Send to multiple recipients ✧ ◮ Trust in multiple authorities ✧ ◮ Short ciphertexts ✧(2 group elements) ◮ Short public keys ✧(random oracle model) ◮ Short private keys ✪O(max recipient list) ◮ No central authority ✪ ◮ Hierarchical delegation ✧

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-17
SLIDE 17

Spatial Encryption

◮ A new primitive ◮ Identities are points in a vector space ◮ Keys for any hyperplane

◮ Can decrypt at any point in the hyperplane

◮ Delegate from plane to line to point

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-18
SLIDE 18

Our implementation

◮ Encryption, decryption are efficient ◮ Ciphertext is short ◮ Master public key is long but random

◮ Proportional to dimension of vs ◮ Short in the random oracle model

◮ Private keys are long

◮ Proportional to dimension of vs Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-19
SLIDE 19

Spatial Encryption for Email

◮ Vector space is polynomials ◮ SKAuth: polys w/root at Auth ◮ SKAuth, Bob: polys w/roots at Auth, Bob ◮ Alice encrypts her message to

(x − voltage)(x − thawte) · · · (x − bob@...) · · · (x − zak@...)

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-20
SLIDE 20

Hierarchical IBE

◮ W for /path/to/data/ is (path, to, data, ∗, . . . , ∗)

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-21
SLIDE 21

Hierarchical IBE

◮ W for /path/to/data/ is (path, to, data, ∗, . . . , ∗)

... or ...

◮ W is (x − /path)(x − /path/to)(x − /path/to/data) · Q(x) ◮ Enables broadcast HIBE ◮ Enables delegation for email encryption

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-22
SLIDE 22

Nitty-Gritty

◮ Based on Boneh-Boyen-Goh H-IBE ◮ Uses bilinear pairings ◮ Selective-ID secure in the standard model

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-23
SLIDE 23

Summary

◮ A new crypto primitive ◮ Generalization of H-IBE ◮ Enables efficient email encryption ◮ Enables broadcast H-IBE

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption

slide-24
SLIDE 24

The End

Questions?

Adam Barth, Dan Boneh, Mike Hamburg Spatial Encryption