Certificate Based Signature Schemes without Pairings or Random Oracles
|
|
|
- Roberta Harrington
- 10 years ago
- Views:
Transcription
1 Certificate Based Signature Schemes without Pairings or Random Oracles p. 1/2 Certificate Based Signature Schemes without Pairings or Random Oracles Joseph K. Liu, Joonsang Baek, Willy Susilo and Jianying Zhou Cryptography and Security Department Institute for Infocomm Research, Singapore {ksliu, jsbaek, Centre for Computer and Information Security (CCISR) School of Computer Science and Software Engineering University of Wollongong, Australia
2 Certificate Based Signature Schemes without Pairings or Random Oracles p. 2/2 Outline Motivation Public Key Cryptography and PKI Identity-based Cryptography Certificate-based Cryptography Certificateless cryptography Related Works Our Contributions CBS Security Model CBS Without Pairings CBS Without Random Oracles Conclusions
3 Certificate Based Signature Schemes without Pairings or Random Oracles p. 3/2 Public Key Cryptography Users have two keys: public key and private key Alice s public key is used for: encryption to Alice by Bob verification of Alice s signatures by Bob Alice s private key is used for: decryption by Alice signing by Alice An infrastructure linking users and their public keys is needed: Public Key Infrastructure
4 Certificate Based Signature Schemes without Pairings or Random Oracles p. 4/2 Public Key Cryptography: Drawbacks Certification management adds a heavy overhead in PKIs: Certificate distribution Certificate storage Certificate revocation Cross-certification Certificates seem to be a problem. What about removing certificates as much as possible?
5 Certificate Based Signature Schemes without Pairings or Random Oracles p. 5/2 Identity-based Cryptography (Shamir 1984) Public keys are derived in a public way from users identities Users must contact a trusted authority (TA) prior to decryption/signing. TA identifies the users and compute private keys using a master-key Bob can encrypt to Alice w/o consulting a directory Alice does not even have to be registered before Bob sends her a message Only the system parameters need to be certified (considerably less certificates to be handled)
6 Certificate Based Signature Schemes without Pairings or Random Oracles p. 6/2 Identity-based Cryptography: Security Definitions In the identity-based scenario, the adversary can corrupt a set of players and learn their private keys. Additionally, it can adaptively ask for encryption (signing) queries for any user IBE: chosen-ciphertext security means the adversary can not learn anything about non-queried ciphertexts for non-corrupted users IBS: unforgeability means the adversary can not forge non-queried signatures for non-corrupted users IBS can be built from any signature scheme IBE more challenging, and remained an open problem until 2001
7 Certificate Based Signature Schemes without Pairings or Random Oracles p. 7/2 IBC: Advantages & Disadvantages Advantages: Certificates drastically reduced Human memorizable keys No need for public key directories Drawbacks: Key escrow Distributing keys is non-trivial (secure channel) Certificate revocation? Solution: time is added to identifiers (not ideal)
8 Certificate Based Signature Schemes without Pairings or Random Oracles p. 8/2 How to remove key escrow? Certificate-based cryptography (Gentry 2003) Goal: to remove key escrow from IBC and simplify the certificate revocation strategy Idea: Bob encrypts/verifies adding time periods Alice needs both her secret key and a certificate for each time period to decrypt/sign revocation means the TA stops issuing certificates no secure channel Certificate-less cryptography (AlRiyami-Patterson 2003) Goal: Bob does not need to check whether Alice s public key is certified (no certificates) Idea: Alice s decryption key is built as a result of the interaction between Alice and the TA secure channel
9 Certificate Based Signature Schemes without Pairings or Random Oracles p. 9/2 Certificateless Cryptography Pairing based Without pairing (Baek, Safavi-Naini, Susilo - ISC 2005).
10 Certificate-based Cryptography Certificate Based Signature Schemes without Pairings or Random Oracles p. 10/2
11 Certificate Based Signature Schemes without Pairings or Random Oracles p. 11/2 Certificate-based Signature Schemes Firstly suggested by Kang, Park and Hahn (CT-RSA 2004). Insecure against key replacement attack (Li, Huang, Mu, Susilo and Wu - EuroPKI 2007 & Journal of Computer Security 2008). Certificate-based ring signature - Au, Liu, Susilo, Yuen - ISPEC All schemes require pairings and random oracles.
12 Certificate Based Signature Schemes without Pairings or Random Oracles p. 12/2 Our Contributions We propose two new CBS schemes: A scheme without pairings. A scheme without random oracles. These schemes fill the gap of the CBS constructions in the literature.
13 Certificate Based Signature Schemes without Pairings or Random Oracles p. 13/2 CBS Security Model A CBS scheme is defined by six algorithms: Setup is a probabilistic algorithm taking as input a security parameter. It returns the certifier s master key msk and public parameters param. Usually this algorithm is run by the CA. UserKeyGen is a probabilistic algorithm that takes param as input. When run by a client, it returns a public key PK and a secret key usk. Certify is a probabilistic algorithm that takes as input (msk, τ, param, PK, ID) where ID is a binary string representing the user information. It returns Cert τ which is sent to the client. Here τ is a string identifying a time period.
14 Certificate Based Signature Schemes without Pairings or Random Oracles p. 14/2 CBS Security Model Consolidate is a deterministic certificate consolidation algorithm taking as input (param, τ, Cert τ) and optionally Cert τ 1. It returns Cert τ, the certificate used by a client in time period τ. Sign is a probabilistic algorithm taking as input (τ, param, m, Cert τ, usk) where m is a message. It outputs σ. Verify is a deterministic algorithm taking (param, PK, ID, σ) as input in time period τ. It returns either valid indicating a valid signature, or the special symbol indicating invalid.
15 Certificate Based Signature Schemes without Pairings or Random Oracles p. 15/2 CBS Security Model We require Verify PK,ID (Sign τ,certτ,usk(m)) = valid We also note that a concrete CBS scheme may not involve certificate consolidation. In this situation, algorithm Consolidate will simply output Cert τ = Cert τ. In the rest of this paper, for simplicity, we will omit Consolidate and the time identifying string τ in all notations.
16 Certificate Based Signature Schemes without Pairings or Random Oracles p. 16/2 CBS Security Model Two different security games: Game 1: the adversary models an uncertified entity Game 2: the adversary models the certifier in possession of the master key msk attacking a fixed entity s public key We use the enhanced model by Li, Huang, Mu, Susilo and Wu that captures the key replacement attack in Game 1.
17 Certificate Based Signature Schemes without Pairings or Random Oracles p. 17/2 CBS Without Pairing Setup. Let G be a multiplicative group with order q. The PKG selects a random generator g G and randomly chooses x R Z q. It sets X = g x. Let H : {0, 1} Z q be a cryptographic hash function. The public parameters param and master secret key msk are given by param = (G, q, g, X, H) msk = x UserKeyGen. User selects a secret value u Z q as his secret key usk, and computes his public key PK as (g u, X u, π u ) where π u is the following non-interactive proof-of-knowledge (PoK): PK{(u) : U 1 = g u U 2 = X u }
18 Certificate Based Signature Schemes without Pairings or Random Oracles p. 18/2 CBS Without Pairing Certify. Let h = H(PK, ID) for user with public key PK and binary string ID which is used to identify the user. To generate a certificate for this user, the CA randomly selects r R Z q, computes R = g r s = r 1 ( h xr) mod q The certificate is (R, s). Note that a correctly generated certificate should fulfill the following equality: (1) R s X R = g h
19 Certificate Based Signature Schemes without Pairings or Random Oracles p. 19/2 CBS Without Pairing Sign. To sign a message m {0, 1}, the signer with public key PK (and user info ID), certificate (R, s) and secret key u, randomly selects y R Z q, computes Y = R y h = H(Y, R, m) z = y + h s u mod q and outputs (Y, R, z) as the signature σ. Verify. Given a signature σ = (Y, R, z) for a public key PK on a message m, a verifier first checks whether π u is a valid PoK. If not, output. Otherwise computes h = H(Y, R, m), h = H(PK, ID), and checks whether (2) (g u ) h h? = R z Y (X u ) hr Output valid if it is equal. Otherwise, output.
20 Certificate Based Signature Schemes without Pairings or Random Oracles p. 20/2 CBS Without Pairing Theorem 1 (Unforgeability against Game 1 Adversary) The CBS scheme without pairing is (ǫ, t)-existential unforgeable against Game 1 adversary with advantage at most ǫ and runs in time at most t, assuming that the (ǫ, t )-DL assumption holds in G, where ǫ = ( 1 q h(q e + q s ) )( 1 1 )( 1 ) ǫ, t = t + O(q e + q s )E q q q h and q e, q s, q h are the numbers of certification queries, signing queries and hashing queries the adversary is allowed to make and E is the time for an exponentiation operation.
21 Certificate Based Signature Schemes without Pairings or Random Oracles p. 21/2 CBS Without Pairing Theorem 2 (Unforgeability against Game 2 Adversary) The CBS scheme without pairing is (ǫ, t)-existential unforgeable against Game 2 adversary with advantage at most ǫ and runs in time at most t, assuming that the (ǫ, t )-DL assumption holds in G, where ǫ = ( 1 q )( hq s 1 1 )( 1 )( 1 ) ǫ, t = t + O(q s )E q q q h q u and q s, q h, q u are the numbers of signing queries, hashing queries and user-key-gen queries the adversary is allowed to make and E is the time for an exponentiation operation.
22 Certificate Based Signature Schemes without Pairings or Random Oracles p. 22/2 CBS Without Random Oracles Our scheme is motivated by Waters IBE. Let H u : {0, 1} {0, 1} n u and H m : {0, 1} {0, 1} n m be two collision-resistant cryptographic hash functions for some n u, n m Z. Setup. Select a pairing e : G G G T where the order of G is p. Let g be a generator of G. Randomly select α R Z p, g 2 R G and compute g 1 = g α. Also select randomly the following elements: u, m R G û i R G for i = 1,...,n u ˆm i R G for i = 1,...,n m Let Û = {û i }, ˆM = { ˆm i }. The public parameters param are (e, G, G T, p, g, g 1, g 2, u, Û, m, ˆM) and the master secret key msk is g2 α. UserKeyGen. User selects a secret value x Z p as his secret key usk, and computes his public key PK as (pk (1), pk (2) ) = (g x, g1). x
23 Certificate Based Signature Schemes without Pairings or Random Oracles p. 23/2 CBS Without Random Oracles Certify. Let u = H u (PK, ID) for user with public key PK and binary string ID which is used to identify the user. Let u[i] be the i-th bit of u. Define U {1,...,n u } to be the set of indicies such that u[i] = 1. To construct the certificate, the CA randomly selects r u R Z p and computes ( ) g2 α ( ) ru U, g r u = (cert (1), cert (2) ) where U = u i U û i
24 CBS Without Random Oracles Sign. To sign a message m {0, 1}, the signer with identity PK (and user information ID), certificate (cert (1), cert (2) ) and secret key usk, compute m = H m (m). Let m[i] be the i-th bit of m and M {1,...,n m } be the set of indicies i such that m[i] = 1. Randomly select r π, r m R Z p, compute u = H u (PK, userinfo), U = u i U ûi and σ = ( ( cert (1)) usk( ) rπ U (m i M = (V, R π, R m ) ˆm i ) rm, (cert (2)) usk g r π, g r m Verify. Given a signature σ = (V, R π, R m ) for a public key PK and user information ID on a message m, a verifier first checks whether e(g x, g 1 ) = e(g x 1, g). If not, outputs. Otherwise computes m = H m (m), u = H u (PK, ID), U = u i U ûi and checks whether e(v, g)? = e(g 2, g x 1) e(u, R π ) e(m i M ˆm i, R m ) ) Certificate Based Signature Schemes without Pairings or Random Oracles p. 24/2
25 Certificate Based Signature Schemes without Pairings or Random Oracles p. 25/2 CBS Without Random Oracles Theorem 3 (Unforgeability against Game 1 Adversary) The CBS scheme without random oracles is (ǫ, t)-existential unforgeable against Game 1 adversary with advantage at most ǫ and runs in time at most t, assuming that the (ǫ, t )-GCDH assumption holds in G, where ǫ ǫ 16(q e + q s )(n u + 1)q s (n m + 1) (qe t = t + O( n u + q s (n u + n m ) ) ) ρ + (q e + q s )τ where q e is the number of queries made to the Certification Query, q s is the number of queries made to the Signing Query, and ρ and τ are the time for a multiplication and an exponentiation in G respectively.
26 Certificate Based Signature Schemes without Pairings or Random Oracles p. 26/2 CBS Without Random Oracles Theorem 4 (Unforgeability against Game 2 Adversary) The CBS scheme without random oracles is (ǫ, t)-existential unforgeable against Game 2 adversary with advantage at most ǫ and runs in time at most t, assuming that the (ǫ, t )-Many-DH assumption holds in G, where ǫ ǫ ( (qs, t = t+o (n u +n m ) ) ρ+(q k +q s )τ) 16q s (n u + 1)q s (n m + 1)q k where q s is the number of queries made to the Signing Queries, q k is the number of queries made to the User-key-gen Queries and ρ and τ are the time for a multiplication and an exponentiation in G respectively.
27 Certificate Based Signature Schemes without Pairings or Random Oracles p. 27/2 Conclusions We proposed two new CBS schemes. The first scheme does not require any pairings. Suitable for some power-constrained devices, such as wireless sensor networks. The second scheme does not require any random oracles. Suitable for applications that require a high level of security.
28 Certificate Based Signature Schemes without Pairings or Random Oracles p. 28/2 Full Paper Full version of the paper can be found at
An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood
An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood One significant impediment to the widespread adoption of public-key cryptography is its dependence on a public-key infrastructure
Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks
Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks Tsz Hon Yuen - Huawei, Singapore Ye Zhang - Pennsylvania State University, USA Siu Ming
MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC
MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC by Brittanney Jaclyn Amento A Thesis Submitted to the Faculty of The Charles E. Schmidt College of Science in Partial
CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction
International Journal of Network Security, Vol.16, No.3, PP.174-181, May 2014 174 CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction Min Zhou 1, Mingwu Zhang 2, Chunzhi
1 Construction of CCA-secure encryption
CSCI 5440: Cryptography Lecture 5 The Chinese University of Hong Kong 10 October 2012 1 Construction of -secure encryption We now show how the MAC can be applied to obtain a -secure encryption scheme.
Identity-Based Encryption from the Weil Pairing
Appears in SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages
Introduction. Digital Signature
Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology
Digital Signatures. What are Signature Schemes?
Digital Signatures Debdeep Mukhopadhyay IIT Kharagpur What are Signature Schemes? Provides message integrity in the public key setting Counter-parts of the message authentication schemes in the public
1 Signatures vs. MACs
CS 120/ E-177: Introduction to Cryptography Salil Vadhan and Alon Rosen Nov. 22, 2006 Lecture Notes 17: Digital Signatures Recommended Reading. Katz-Lindell 10 1 Signatures vs. MACs Digital signatures
1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.
1 Digital Signatures A digital signature is a fundamental cryptographic primitive, technologically equivalent to a handwritten signature. In many applications, digital signatures are used as building blocks
Introduction to Cryptography
Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication
DIGITAL SIGNATURES 1/1
DIGITAL SIGNATURES 1/1 Signing by hand COSMO ALICE ALICE Pay Bob $100 Cosmo Alice Alice Bank =? no Don t yes pay Bob 2/1 Signing electronically Bank Internet SIGFILE } {{ } 101 1 ALICE Pay Bob $100 scan
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
Advanced Cryptography
Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
A Strong RSA-based and Certificateless-based Signature Scheme
International Journal of Network Security, Vol.18, No.2, PP.201-208, Mar. 2016 201 A Strong RSA-based and Certificateless-based Signature Scheme Chin-Chen Chang 1,2, Chin-Yu Sun 3, and Shih-Chang Chang
CS549: Cryptography and Network Security
CS549: Cryptography and Network Security by Xiang-Yang Li Department of Computer Science, IIT Cryptography and Network Security 1 Notice This lecture note (Cryptography and Network Security) is prepared
1 Message Authentication
Theoretical Foundations of Cryptography Lecture Georgia Tech, Spring 200 Message Authentication Message Authentication Instructor: Chris Peikert Scribe: Daniel Dadush We start with some simple questions
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method
An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method E.Sathiyamoorthy 1, S.S.Manivannan 2 1&2 School of Information Technology and Engineering
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
Chosen-Ciphertext Security from Identity-Based Encryption
Chosen-Ciphertext Security from Identity-Based Encryption Dan Boneh Ran Canetti Shai Halevi Jonathan Katz Abstract We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemes
A New and Efficient Signature on Commitment Values
International Journal of Network Security, Vol.7, No., PP.0 06, July 2008 0 A New and Efficient Signature on Commitment Values Fangguo Zhang,3, Xiaofeng Chen 2,3, Yi Mu 4, and Willy Susilo 4 (Corresponding
Schnorr Signcryption. Combining public key encryption with Schnorr digital signature. Laura Savu, University of Bucharest, Romania
Schnorr Signcryption Combining public key encryption with Schnorr digital signature Laura Savu, University of Bucharest, Romania IT Security for the Next Generation European Cup, Prague 17-19 February,
Introduction to Computer Security
Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors
Overview of Public-Key Cryptography
CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows
Cryptographic Hash Functions Message Authentication Digital Signatures
Cryptographic Hash Functions Message Authentication Digital Signatures Abstract We will discuss Cryptographic hash functions Message authentication codes HMAC and CBC-MAC Digital signatures 2 Encryption/Decryption
Digital Signatures. Prof. Zeph Grunschlag
Digital Signatures Prof. Zeph Grunschlag (Public Key) Digital Signatures PROBLEM: Alice would like to prove to Bob, Carla, David,... that has really sent them a claimed message. E GOAL: Alice signs each
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre Some slides were also taken from Chanathip Namprempre's defense
Signature Schemes. CSG 252 Fall 2006. Riccardo Pucella
Signature Schemes CSG 252 Fall 2006 Riccardo Pucella Signatures Signatures in real life have a number of properties They specify the person responsible for a document E.g. that it has been produced by
Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg
Outline CSc 466/566 Computer Security 8 : Cryptography Digital Signatures Version: 2012/02/27 16:07:05 Department of Computer Science University of Arizona [email protected] Copyright c 2012 Christian
Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem
Digital Signatures Murat Kantarcioglu Based on Prof. Li s Slides Digital Signatures: The Problem Consider the real-life example where a person pays by credit card and signs a bill; the seller verifies
The Legal Classification of Identity-Based Signatures
The Legal Classification of Identity-Based Signatures Christoph Sorge University of Paderborn 33098 Paderborn, Germany [email protected] Abstract Identity-based cryptography has attracted
Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings
Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings Ernie Brickell Intel Corporation [email protected] Liqun Chen HP Laboratories [email protected] March
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
An Introduction to Digital Signature Schemes
An Introduction to Digital Signature Schemes Mehran Alidoost Nia #1, Ali Sajedi #2, Aryo Jamshidpey #3 #1 Computer Engineering Department, University of Guilan-Rasht, Iran [email protected] #2 Software
Journal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs Enes Pasalic University of Primorska Koper, 2014 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a
DEVELOPMENT OF CERTIFICATE LESS DIGITAL SIGNATURE SCHEME & ITS APPLICATION IN E-CASH SYSTEM
DEVELOPMENT OF CERTIFICATE LESS DIGITAL SIGNATURE SCHEME & ITS APPLICATION IN E-CASH SYSTEM A Thesis is submitted in partial fulfilment of the requirements for the degree of Bachelor of Technology In Computer
Lightweight Encryption for Email
Lightweight Encryption for Email Ben Adida MIT [email protected] Susan Hohenberger MIT [email protected] Ronald L. Rivest MIT [email protected] Abstract Email encryption techniques have been available for more than
A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems
The 28th International Conference on Distributed Computing Systems Workshops A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems Zhong Xu Xue Liu School of Computer Science McGill
Comments on "public integrity auditing for dynamic data sharing with multi-user modification"
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2016 Comments on "public integrity auditing for dynamic
Lecture 15 - Digital Signatures
Lecture 15 - Digital Signatures Boaz Barak March 29, 2010 Reading KL Book Chapter 12. Review Trapdoor permutations - easy to compute, hard to invert, easy to invert with trapdoor. RSA and Rabin signatures.
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
MACs Message authentication and integrity. Table of contents
MACs Message authentication and integrity Foundations of Cryptography Computer Science Department Wellesley College Table of contents Introduction MACs Constructing Secure MACs Secure communication and
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch February 20, 2005 1. Consider slide 12 in the handout for topic 2.2. Prove that the decryption process of a one-round Feistel cipher
Introduction to Cryptography CS 355
Introduction to Cryptography CS 355 Lecture 30 Digital Signatures CS 355 Fall 2005 / Lecture 30 1 Announcements Wednesday s lecture cancelled Friday will be guest lecture by Prof. Cristina Nita- Rotaru
New Efficient Searchable Encryption Schemes from Bilinear Pairings
International Journal of Network Security, Vol.10, No.1, PP.25 31, Jan. 2010 25 New Efficient Searchable Encryption Schemes from Bilinear Pairings Chunxiang Gu and Yuefei Zhu (Corresponding author: Chunxiang
Efficient Unlinkable Secret Handshakes for Anonymous Communications
보안공학연구논문지 (Journal of Security Engineering), 제 7권 제 6호 2010년 12월 Efficient Unlinkable Secret Handshakes for Anonymous Communications Eun-Kyung Ryu 1), Kee-Young Yoo 2), Keum-Sook Ha 3) Abstract The technique
Software Tool for Implementing RSA Algorithm
Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key
Identity-based Encryption with Efficient Revocation
A preliminary version of this paper appears in Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2008, ACM Press, 2008. This is the full version. Identity-based Encryption
An Efficient and Provably-secure Digital signature Scheme based on Elliptic Curve Bilinear Pairings
Theoretical and Applied Informatics ISSN 896 5334 Vol.24 (202), no. 2 pp. 09 8 DOI: 0.2478/v079-02-0009-0 An Efficient and Provably-secure Digital signature Scheme based on Elliptic Curve Bilinear Pairings
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
Authentication, digital signatures, PRNG
Multimedia Security Authentication, digital signatures, PRNG Mauro Barni University of Siena Beyond confidentiality Up to now, we have been concerned with protecting message content (i.e. confidentiality)
CryptoVerif Tutorial
CryptoVerif Tutorial Bruno Blanchet INRIA Paris-Rocquencourt [email protected] November 2014 Bruno Blanchet (INRIA) CryptoVerif Tutorial November 2014 1 / 14 Exercise 1: preliminary definition SUF-CMA
QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University
QUANTUM COMPUTERS AND CRYPTOGRAPHY Mark Zhandry Stanford University Classical Encryption pk m c = E(pk,m) sk m = D(sk,c) m??? Quantum Computing Attack pk m aka Post-quantum Crypto c = E(pk,m) sk m = D(sk,c)
Chosen-Ciphertext Security from Identity-Based Encryption
Chosen-Ciphertext Security from Identity-Based Encryption Dan Boneh Ran Canetti Shai Halevi Jonathan Katz June 13, 2006 Abstract We propose simple and efficient CCA-secure public-key encryption schemes
Chapter 12. Digital signatures. 12.1 Digital signature schemes
Chapter 12 Digital signatures In the public key setting, the primitive used to provide data integrity is a digital signature scheme. In this chapter we look at security notions and constructions for this
Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography
Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography Liang Yan, Chunming Rong, and Gansen Zhao University of Stavanger, Norway {liang.yan,chunming.rong}@uis.no
7 Key Management and PKIs
CA4005: CRYPTOGRAPHY AND SECURITY PROTOCOLS 1 7 Key Management and PKIs 7.1 Key Management Key Management For any use of cryptography, keys must be handled correctly. Symmetric keys must be kept secret.
Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme
Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme Asha A 1, Hussana Johar 2, Dr B R Sujatha 3 1 M.Tech Student, Department of ECE, GSSSIETW, Mysuru, Karnataka, India
Digital signatures are one of the most important inventions/applications of modern cryptography.
CHAPTER 7: DIGITAL SIGNATURES Digital signatures are one of the most important inventions/applications of modern cryptography. Part VII Digital signatures The problem is how can a user sign (electronically)
Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.
CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Slide 09-1 Overview Key exchange Session vs. interchange
Digital Signatures: A Panoramic View. Palash Sarkar
Digital Signatures: A Panoramic View Palash Sarkar Applied Statistics Unit Indian Statistical Institute, Kolkata India [email protected] International Conference on Electrical Engineering, Computing
A Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
Group Signatures: Authentication with Privacy
Group Signatures: Authentication with Privacy Authors Prof. Dr. Mark Manulis, Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Bertram Poettering Cryptographic Protocols Group Department of Computer
CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure
CSE543 - Introduction to Computer and Network Security Module: Public Key Infrastructure Professor Trent Jaeger 1 Meeting Someone New Anywhere in the Internet 2 What is a certificate? A certificate makes
Princeton University Computer Science COS 432: Information Security (Fall 2013)
Princeton University Computer Science COS 432: Information Security (Fall 2013) This test has 13 questions worth a total of 50 points. That s a lot of questions. Work through the ones you re comfortable
Ch.9 Cryptography. The Graduate Center, CUNY.! CSc 75010 Theoretical Computer Science Konstantinos Vamvourellis
Ch.9 Cryptography The Graduate Center, CUNY! CSc 75010 Theoretical Computer Science Konstantinos Vamvourellis Why is Modern Cryptography part of a Complexity course? Short answer:! Because Modern Cryptography
MTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu
MTAT.07.003 Cryptology II Digital Signatures Sven Laur University of Tartu Formal Syntax Digital signature scheme pk (sk, pk) Gen (m, s) (m,s) m M 0 s Sign sk (m) Ver pk (m, s)? = 1 To establish electronic
CS155. Cryptography Overview
CS155 Cryptography Overview Cryptography Is n A tremendous tool n The basis for many security mechanisms Is not n The solution to all security problems n Reliable unless implemented properly n Reliable
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Provable-Security Analysis of Authenticated Encryption in Kerberos
Provable-Security Analysis of Authenticated Encryption in Kerberos Alexandra Boldyreva Virendra Kumar Georgia Institute of Technology, School of Computer Science 266 Ferst Drive, Atlanta, GA 30332-0765
CIS 5371 Cryptography. 8. Encryption --
CIS 5371 Cryptography p y 8. Encryption -- Asymmetric Techniques Textbook encryption algorithms In this chapter, security (confidentiality) is considered in the following sense: All-or-nothing secrecy.
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
JOURNAL PAPER, ACCEPTED 1 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks Huang Lu, Student Member, IEEE, Jie Li, Senior Member, IEEE, Mohsen Guizani, Fellow, IEEE Abstract
7! Cryptographic Techniques! A Brief Introduction
7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Lecture 6 - Cryptography
Lecture 6 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07 Question 2 Setup: Assume you and I don t know anything about
Secure Communication in a Distributed System Using Identity Based Encryption
Secure Communication in a Distributed System Using Identity Based Encryption Tyron Stading IBM, Austin, Texas 78758, USA [email protected] Abstract Distributed systems require the ability to communicate
