COMPARING ENCRYPTED DATA. Thijs Veugen
|
|
|
- Evangeline Owen
- 10 years ago
- Views:
Transcription
1 COMPARING ENCRYPTED DATA Thijs Veugen Multimedia Signal Processing Group, Delft University of Technology, The Netherlands, and TNO Information and Communication Technology, Delft, The Netherlands ABSTRACT When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. More complicated operations like comparison, modulo reduction, or division, require a comparison protocol as a building block. Since the overall computational complexity of signal processing on encrypted data is often determined by the comparison protocol, it is very important to find the most efficient solution. We present a new comparison protocol and compare it with existing solutions, outperforming them at least when precomputation complexity is included. Index Terms homomorphic encryption, millionaires problem, integer comparison, secure multi-party computations 1. INTRODUCTION Many secure protocols are known for comparing two integers, the so called millionaires problem. We present a new comparison protocol that requires little memory and has a low computational effort. For this reason we focus on the semi-trusted model where both players follow the required protocol steps. The protocols can be extended to the malicious model [1], but this will significantly enlarge the computational and communication complexity. First an overview is presented on the most important related work. Then the definitions and notations are explained in the preliminaries. The actual comparison protocol, consisting of the client-server model, the new private comparison protocol called LSIC (Lightweight Secure Integer Comparison), and the security analysis, is presented in the second Section. In Section 3 the computational, communication and storage complexity of LSIC is analyzed and compared to other solutions. The final section contains the conclusions Related work The first solution of the millionaires problem is by Yao [2] in His solution, based on garbled circuits, has been improved many times since. Most solutions are either based on homomorphic encryption or on garbled circuits. One of the most efficient implementations nowadays based on garbled circuits is described by Kolesnikov, Sadeghi and Schneider [3]. A rough comparison with LSIC is made in Section 3. A well known candidate that uses homomorphic encryption is by Blake and Kolesnikov [4], which is optimized by Damgård, Geisler, and Krøigaard [5, 6], who use a dedicated crypto system fine tuned for small plain text values. Other related work is e.g. by Fischlin [7], who describes a system that enables to compute the product (AND) of two quadratic residues. However, an error parameter λ is required to guarantee the correctness of the result, which sincerely increases the computational and communication load, including l decryptions. The idea of the conditional gate by Schoenmakers and Tuyls [8] is similar to our approach, but their setting is threshold decryption in the malicious model with multiple parties. Garay, Schoenmakers and Villegas [9] describe a nice solution for the client-server setting in the multi-party case, but since they use the malicious adversary model in stead of the honest-but-curious model, their solutions are less efficient. Kerschbaum and Terzidis (KT) present an efficient solution to the millionaires problem in the semi-trusted model in [10]. This solution is later extended to multiple parties by Kerschbaum, Biswas and de Hoogh [11]. We compare their solution to LSIC in Section Preliminaries For the public key crypto system in our protocols, any homomorphic and semantically secure crypto system could be used. In our notation we consider two classes of encryption systems, namely [.] to denote the encryption of a single bit with e.g. Quadratic Residues [12], and [.] to denote encryption of integers with e.g. Paillier [13] or Damgård, Geisler, and Krøigaard (DGK) [5, 6]. Let N be the modulus of the encryption system which is usually equal to the product of two large primes. We recall an important property of homomorphic encryption systems, namely that for bits x and y we have [x] [y] = [x y] mod N, and for integers x and y we have [x] [y ] = [[x + y ] mod N. During the complexity computations, we assume that N is 1024 bits long. For other key lengths, similar complexity conclusions can be drawn. For convenience, we neglect in our
2 notation that the cipher text size in Paillier is N 2 and use N instead, just like in DGK or RSA. We use pseudo code to describe the protocols. Assertions between {.} are used to describe the current value of variables. Also comments are used, prefixed by, to explain the corresponding line of the protocol. Each statement is prefixed by A or B, indicating the party that performs the statement. E.g., A: [τ] [1] [t] mod N means that A multiplies the (encrypted) variable [t] with an encrypted 1 modulo N, and stores the result in the (encrypted) variable [τ]. To compute the computational complexity of the different protocols, we use the fact that an involution modulo N with an exponent of n bits will on average take 3 2 n multiplications modulo N. When the factoring of N is known, this can be reduced to 3 4n by using the Chinese remainder theorem [14]. An encrypted integer is negated most efficiently by using the Euclidean algorithm [14]. This is denoted by [ x] [x] 1 mod N, and its effort is comparable with one modular multiplication [14]. A Paillier decryption takes 3 2 log 2 N multiplications modulo N [13]. We use x y to denote the integer division of x by y, so x y = (x (x mod y))/y. Let σ be the statistical security parameter, which value is usually chosen around 80. The maximum size of the input variables is denoted by l. We assume all random variables are uniformly chosen. 2. COMPARISON PROTOCOL When comparing encrypted signals, the most common model is the client-server model, where the client has encrypted signals and the server has the private key [15]. We first show how this problem can efficiently be converted to a comparison of two private integers, i.e. both client and server having a private integer. In the second subsection an efficient solution, called Lightweight Secure Integer Comparison (LSIC) is presented for the comparison of two private integers Client-server model Assume the client A has two encrypted numbers [a] and [b] of l bits, the server B has the private key, and they want to compare the numbers a and b. The actual values of a and b are not known to A and B. z l+1 is used to denote the (l+1)-th bit of integer z. The main idea of Protocol 1 is that the most significant bit of x = b + 2 l a indicates whether a b. Since x is an l + 1 bit number, its most significant bit equals x 2 l. In line 2, the number x is statistically blinded by the random number r, which should contain σ more bits than x. Since we don t allow carry-overs modulo N when computing x, this protocol only works whenever l σ < log 2 N. In line 9 of Protocol 1 any private comparison protocol can be used to compute d < c, as long as the output is encrypted. Protocol 1 Client-server comparison Input A [a] and [b] Input B the decryption key K Output A encrypted bit [t] where (t = 1) (a b) {Both a and b consist of l bits} A: [x] [b] [2 l ] [a] 1 mod N x b + 2 l a A chooses a random number r for blinding x A: [z ] [x] [r ] mod N z x + r 5: A sends [z ] to B B decrypts [z ] A: c r mod 2 l B: d z mod 2 l A and B privately compute the encrypted bit [t] such that {(t = 1) (d < c)} 10: B encrypts z l+1 and sends [z l+1 ] to A A encrypts r l+1 A: [t] [z l+1 ] [r l+1 ] [t] t z l+1 r l+1 t {t = x 2 l } In addition to the private comparison protocol, which is executed in line 9, only 5 extra multiplications modulo N are needed (and one QR encryption), so this client-server protocol has a very low overall computational complexity. In other known solutions, like the client-server protocol by Erkin et al. in [16], the number x 2 l is computed via the number x mod 2 l, which requires a division of an encrypted number by 2 l, and thus an involution to an exponent of size log 2 N, which requires substantially more modular multiplications. Note that although the inputs are encrypted by Paillier (or some other integer encryption system), the output is encrypted by QR (or some other bit encryption system). It s also possible to obtain the output encrypted by Paillier by replacing lines 10 to 12 by the following lines: B computes z 2 l, and sends its Paillier encryption to A A encrypts r 2 l with Paillier A: [t] [z 2 l ] [r 2 l ] 1 [t] 1 mod N {t = (z 2 l ) (r 2 l ) t = x 2 l } In order to understand line 12, where the number x 2 l is computed, both in the QR encrypted and the Pallier encrypted version, observe that for each positive integer x, the number x 2 l is defined by x = 2 l (x 2 l ) + x mod 2 l such that 0 x mod 2 l < 2 l. Since z = x + r = 2 l ((x 2 l ) + (r 2 l )) + ((x mod 2 l ) + (r mod 2 l )), we know that z 2 l = (x 2 l ) + (r 2 l ) and z mod 2 l = (x mod 2 l ) + (r mod 2 l ) whenever (x mod 2 l ) + (r mod 2 l ) < 2 l, and z 2 l = (x 2 l )+(r 2 l )+1 and z mod 2 l = (x mod 2 l )+ (r mod 2 l ) 2 l, otherwise. In the first case, z mod 2 l = (x mod 2 l ) + (r mod 2 l ) r mod 2 l. In the second case,
3 z mod 2 l = (x mod 2 l ) + (r mod 2 l ) 2 l < r mod 2 l. So The relation z 2 l = (x 2 l ) + (r 2 l ) (x mod 2 l ) + (r mod 2 l ) < 2 l z mod 2 l r mod 2 l c d t = 0 x 2 l = (z 2 l ) (r 2 l ) t easily follows, which shows the correctness of line 12 in the Pallier encrypted version. The correctness in the QR encrypted version follows by observing that z 2 l = z l+1+σ... z l+1 = 2 (z l+1+σ... z l+2 ) + z l+1, so (z 2 l ) mod 2 = z l+1. Since x 2 l is a bit value, we have x 2 l = ((z 2 l ) (r 2 l ) t) mod 2 = (z l+1 r l+1 t) mod 2, so x 2 l = z l+1 r l+1 t 2.2. Comparing private integers Suppose party A has a private unencrypted number a, and party B has a private and unencrypted number b. The integers a and b have size l. We denote their bits by a i and b i, for 0 i < l, where a 0 and b 0 are the least significant bits. We use the notation a l (1 l l) to denote the integer l 1 i=0 a i2 i, i.e. the first l bits of a, and the same for b. Note that a = a l and b = b l. The idea behind our comparison protocol is to compute the bits t i, from i = 1 towards i = l, where (t i = 1) (a i < b i ). The bit t i+1 can be computed from t i by using the relation: (t i+1 = 1) (a i < b i ) or {(a i = b i ) and (t i = 1)} (1) The correctness of this recurrence relation is easily seen by observing that a i and b i are the most significant bits of a i+1 and b i+1 respectively. In order to compute t = t l we propose the protocol Lightweight Secure Integer Comparison (LSIC) which is shown in Protocol 2. The formal security proof, to show that A and B learn no private information from each other, is given in Subsection 2.3. Party A and B encrypt single bits by [.], but only party B can decrypt. The main idea is that A uses variable [t], which is the encryption of t i, and computes, in a joined protocol with B, [t l ]. This computation is done recursively, starting with [t 1 ], [t 2 ] until [t l ]. In order for A to compute the next value, B sends the encrypted bits [b i ] in line 25, but since this is not enough for A, as he is computing in the encrypted domain, B also sends the encryption of tb, being the product of b i and t i. To compute the product tb, A sends a blinded version of t i to B in line 17, because each intermediate value t i should be unknown to B (and A). The product is unblinded again by A in line 28. Protocol 2 Lightweight Secure Integer Comparison (LSIC) Input A a = a l 1... a 0 Input B b = b l 1... b 0 and the decryption key K Output A encrypted bit [t] where (t = 1) (a < b) Party B encrypts and randomizes b 0 and sends [b 0 ] to A if a 0 = 0 then A: [t] [b 0 ] else 5: A: [t] [0] [t] 1, randomized in line 17 end if {(t = 1) (t 1 = 1) (a 0 < b 0 )} for i 1,..., l 1 do A computes t i+1 from t i {t = t i } 10: A blinds t = t i by tossing a fair coin c {0, 1} if c = 0 then A: [τ] [t] else A: [τ] [1] [t] mod N τ 1 t 15: end if {τ = c t i } A randomizes [τ] and sends it to B if b i = 0 then B: [tb] [0] [tb] 1, randomized in line 25 20: else B: [tb] [τ] end if B computed τ b i without decrypting [τ] {tb = τ b i } B encrypts b i 25: B randomizes [tb] and sends [tb] and [b i ] to A {tb = (c t i ) b i } if c = 1 then A unblinds tb A: [tb] [tb] [b i ] mod N tb tb b i end if 30: {tb = t i b i } if a i = 0 then A: [t] [t] [b i ] [tb] mod N t t b i tb else A: [t] [tb] 35: end if {t = t i+1 } end for {t = t l } Altough the computations by A in lines 32 and 34 are not obvious, it s easily shown that A indeed correctly computes the next value [t i+1 ] from [t i ], a i, [b i ], and [b i t i ]. Since A knows the value of a i, the recurrence relation 1 can be further reduced. In case a i = 1, then a i < b i will be false, so t i+1 = t i b i which is the variable tb. In case a i = 0, then a i < b i will be equivalent to b i = 1, so t i+1 = 1 whenever b i = 1 or
4 t i = 1, thus t i+1 = b i + t i b i t i = b i + t i tb. The computations in lines 28, 32 and 34 could be further optimized to save one multiplication, but due to space constraints we refrain from that. This protocol works for any number of bits l. Since the protocol doesn t require intermediate decryptions, the computational complexity is low. The encryption system should be homomorphic and semantically secure. We use Quadratic Residues, because encryption and rerandomization are easy, but one could also use e.g. Paillier or DGK. This requires a small modification of the homomorphic operations on encrypted numbers, as depicted in the table below, where [.] is used to denote Paillier encryption. Line Operation Paillier 14 τ 1 t [τ ] [1]] [t] 1 28 tb tb b i [tb] [b i ] [tb] 1 32 t t b i tb [t] [t] [b i ] [tb] 1 The modified operation tb b i tb in line 28 works, because tb = τ b i, so b i tb. The modified operation t t+b i tb in line 32 works, because whenever t = b i = 1, we have tb = t b i = Security analysis In order to show that our protocol privately computes the comparison of two integers in the semi-honest model, we have to show that whatever can be computed by A or B from their view of a protocol execution, can be computed from their input and the comparison result (see Definition in Goldreich [1]). The informal analysis is that all messages from A to B are blinded and thus reveal no private information. The messages from B to A are all encrypted, and since the encryption system is semantically secure, no private information is leaked in this direction too. Only a formal proof for LSIC, as described in subsection 2.2, is given, since the client-server reduction from subsection 2.1 is not new. The view of A consists of its private number a, the size l, the encrypted comparison bit [t], the internal coin tosses c i, 1 i < l, and all intermediate messages received from B: the encrypted bits [b i ], 0 i < l, which are the encrypted bits of the number b, and the encrypted bits [tb i ], 1 i < l, which equal [b i τ i ], τ i being the blinded version of the bit (a i < b i ). Summarizing, the view of A equals V A = (a, l, [t], c 1... c l 1, [b 0 ]... [b l 1 ], [tb 1 ],... [tb l 1 ]) It suffices to show that there exists a probabilistic polynomialtime algoritm S A such that S A (a, l, [t]) is computationally indistinguishable from V A [1]. Since the encryption algorithm is semantically secure, every pair of encryptions is computationally indistinguishable, so by letting S A randomly generate 2l 1 encryptions and l 1 coin tosses, this condition is easily verified. The view of B consists of its private number b, the decryption key K, the size l, and all intermediate messages received from A: the blinded bits [τ i ], 1 i < l, τ i being the blinded version of the bit (a i < b i ). Since B owns the decryption key, all encrypted values [τ i ] can be decrypted to τ i. Also, B is able to deduce the randomization part of each encryption, but since A carefully uses rerandomization before each transmission, this information can be considered as a random variable and is therefore useless to B. Summarizing, the view of B is equivalent to V B = (b, K, l, τ 1,... τ l 1 ) Again, we have to show that there exists a probabilistic polynomial-time algoritm S B such that S B (b, K, l) is computationally indistinguishable from V B. This is easily satisfied by letting S B randomly generate l 1 bits. The bits τ i = c i t i are indeed uniformly distributed, because Pr(τ = 1) = Pr(τ = 1 c = 0) Pr(c = 0) + Pr(τ = 1 c = 1) Pr(c = 1) = Pr(t = 1) Pr(t = 0) 2 = 1 2. We conclude that LSIC indeed privately computes the (encrypted) comparison result. Note that unconditional (or information-theoretic) security of A towards B could also be shown because the blinding techniques completely hide the comparison bits, but due to space constraints this is not worked out. 3. PERFORMANCE In this section we compute the computational, communication, and storage complexity of LSIC. We distinghuish between the cases where precomputations are allowed or not. Typical values that could be precomputed are encryptions of bits, and randomization factors that are used in the homomorphic crypto system. The actual application of the protocol will determine whether precomputations are allowed. All homomorphic systems consist of an encryption and a randomization part. E.g. in Quadratic Residues [x] = g x r 2 mod N, where g is a fixed integer (quadratic nonresidue) and r is randomly chosen. When implementing our comparison protocol, the randomization part can be skipped in most computations. Only when a value has to be sent to the other party (in lines 1, 17, 25), the result should be rerandomized. Note that altough B owns the decryption key (also called private key), rerandomization is even necessary for A, because B might be able to recognize the randomization part. We compute the computational complexity by counting the number of multiplications modulo N, since these form the main computational load. Due to the construction of QR, the encryption of 0 requires one multiplication (squaring) modulo N, and the encryption of 1 requires two multiplications modulo N Without precomputations When precomputations are not allowed, QR is preferred because the number of multiplications for encryption and reran-
5 domization is very low. The expected number of multiplications (in the encrypted domain) for A in this protocol equals l 1 times: 0.5 for the blinding of t i in line 14, 2 for the rerandomization of [τ] in line 17, 0.5 for the possible conversion of [tb] in line 28, and 1 for the computation of [t i+1 ] in line 32, for a total of 4(l 1) multiplications. The expected computational load for B equals the l encryptions of b i in lines 1 and 25, and l 1 rerandomizations of [tb] in line 25, for a total of 1.5l + 1.5(l 1) = 3(l 1) multiplications. The actual number of multiplications depends on the (bit) values of a and b. Since timing attacks might reveal some information about these numbers, we also mention the maximal number of multiplications, which are computed similarly and equal 5(l 1) for A and 4(l 1) + 2 B With precomputations When precomputations are allowed, the choice of crypto system is not really relevant anymore as long as the modulus size is the same. When the comparison result should be encrypted with Paillier, which modulus size is N 2, the best approach would be to use DGK in LSIC, and afterwards transform the comparison result into Paillier. Namely, the advantage of DGK is the smaller modulus size N, and the fast bit decryption which is needed to transform to Paillier. When precomputing all encryptions and rerandomizations, a rerandomization is reduced to one multiplication, so the average number of modular multiplications needed in LSIC are 3(l 1) for A and l 1 for B Communication complexity The numbers that are sent in LSIC are all encrypted bits, resulting in encypted numbers of log 2 N bits. A sends to B l 1 times the value of [τ], for a total of l 1 numbers of log 2 N bits. B sends to A the number [b 0 ], and l 1 times the numbers [b i ] and [tb], for a total of 2l 1 numbers of log 2 N bits. Our protocol takes l communication rounds (plus half a round in the first step) Storage complexity We count the number of encrypted values that have to be stored, since plain integers are relatively small. A has to store the current values of [b i ], [t i ] and [tb], requiring 3 storage units. When [τ] is computed, the storage unit of [tb] can be used so this doesn t require an extra storage unit. B has to store [tb] and [b i ], requiring 2 storage units. When [τ] is received, this can be stored in the storage unit of [tb] avoiding an extra storage unit. The storage complexity expands when using precomputations to store encryptions of known bits, and random factors used for rerandomization. The total number of storage units will depend on the implementation and the requirements with respect to waiting time, communication, computation and storage capacities Summary The summary of the complexity analysis of LSIC is depicted in the table below. We ignore the efforts for key generation and key distribution. Precomp. Computation Communication Storage No 7(l 1) l 2 3 Yes 4(l 1) 3l 2 Θ(l) The computational complexity is measured in the average number of multiplications modulo N, the communication complexity is measured in the number of messages of log 2 N bits. The storage complexity is measured in the number of encrypted numbers (of size log 2 N bits) to be stored Alternative solutions We compare LSIC to other solutions in the semi-honest model, but due to space limitations we refer for their details to the papers. When computing the complexity of KT [10], we find a total number of multiplications modulo N equal to 23l log 2 N, which is good, but more than LSIC. Its communication complexity consists only of two encrypted messages, but its weaker notion of security (caused by multiplicative hiding) is a serious drawback. A commonly used comparison protocol is DGK, which needs ( ) l l log 2(l + 2) modular multiplications, even when precomputations are used. The computational complexity is mainly determined by l decryptions in the DGK crypto system, and clearly exceeds LSIC. The communication complexity is only 2l which is smaller than LSIC. Even without precomputations, l encryptions have to be separately stored. Its main advantage is that only one communication round is needed. An interesting alternative is the garbled circuit approach. An important part of the garbled circuit is the oblivious transfer of all the input values of one party to the other party. This part involves public key operations, but even when using elliptic curve crypto, one encryption and decryption is comparable to 200 modular multiplications [17]. When precomputations are not allowed this results in a minimal computational complexity of 200l multiplications which clearly exceeds LSIC. The communication complexity is approximately half times our communication complexity [3], but a garbled circuit requires only one communication round. The storate complexity is roughly equal to the communication complexity, which is the size of the circuit. An interesting property of garbled circuits is that many things can be precomputed, including the oblivious transfers. It s unclear how its reduced complexity compares to the complexity of LSIC, in the case precomputations are allowed, because the com-
6 parison of symmetric versus asymmetric operations depends very much on the setting of software and hardware. 4. CONCLUSIONS We described an efficient implementation of the client-server secure comparison protocol, and a new protocol (LSIC) for the millionaires problem in the honest-but-curious model. Since this protocol doesn t use intermediate decryptions, it has a very low computational complexity, and also a low communication and storage complexity, making it preferable for light-weight environments. The number of communication rounds is equal to the number of input bits. The private input of the first player (A) is computationally secure towards the second player (B), and the private input of the second player is even perfectly secure towards the first player. When comparing LSIC with other solutions, it s clear that both computational and storage complexity is much smaller than for existing solutions, while the communication complexity is slightly larger. It s unclear how the computational complexity of LSIC relates to the garbled circuit approach with precomputed oblivious transfers. 5. REFERENCES [1] Oded Goldreich, Foundations of Cryptography: Basic Applications, vol. 2, Cambridge University Press, [2] A.C. Yao, Protocols for secure computations, in Proceedings of the IEEE Symposium on Foundations of Computer Science, 1982, pp [3] Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider, Improved garbled circuit building blocks and applications to auctions and computing minima, Tech. Rep. 411, Cryptology eprint Archive, [4] I.F. Blake and V. Kolesnikov, Strong conditional oblivious transfer and computing on intervals, in ASI- ACRYPT. Advances in Cryptology, 2004, vol. 3329, pp [5] I. Damgård and M. Geisler and M. Krøigaard, Homomorphic encryption and secure comparison, Journal of applied cryptology, vol. 1, no. 1, pp , [6] I. Damgård and M. Geisler and M. Krøigaard, A correction to efficient and secure comparison for on-line auctions, Journal of applied cryptology, vol. 1, no. 4, pp , [8] B. Schoenmakers and P. Tuyls, Practical two-party computation based on the conditional gate, in ASI- ACRYPT 04. Advances in Cryptology, 2004, number 3329 in Lecture Notes in Computer Science, pp , Springer. [9] Berry Schoenmakers Juan Garay and José Villegas, Practical and secure solutions for integer comparison, in Public Key Cryptography - PKC , vol. 4450, pp , Springer-Verlag. [10] Florian Kerschbaum and Orestis Terzidis, Filtering for private collaborative benchmarking, in International Conference on Emerging trends in information and communication security, [11] Florian Kerschbaum, Debmalya Biswas, and Sebastiaan de Hoogh, Performance comparison of secure comparison protocols, in 1st international workshop on business processes security, [12] S. Goldwasser and S. Micali, Probabilistic encryption, Journal of Computer and System Sciences, vol. 28, no. 2, pp , [13] P. Pailler, Public-key cryptosystems based on composite degree residuosity classes, in Proceedings of Eurocrypt , vol of Lecture Notes in Computer Science, pp , Springer-Verlag. [14] Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, Handbook of Applied cryptography, CRC Press, [15] Tiziano Bianchi, Thijs Veugen, Alessandro Piva, and Mauro Barni, Processing in the encrypted domain using a composite signal representation: pros and cons, in IEEE International Workshop on Information Forensics and Security, [16] Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stefan Katzenbeisser, Reginald L. Lagendijk, and Tomas Toft, Privacy-preserving face recognition, in Proceedings of the Privacy Enhancing Technologies Symposium, Seattle, USA, 2009, pp [17] M.J.B. Robshaw and Yiqun Lisa Yin, Overview of elliptic curve cryptosystems, CryptoBytes Technical Newsletter, June [7] M. Fischlin, A cost-effective pay-per-multiplication comparison method for millionaires, in CT-RSA 2001: Proceedings of the 2001 Conference on Topics in Cryptology, London, UK, 2001, pp , Springer- Verlag.
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
Efficient Privacy-Preserving Face Recognition
Efficient Privacy-Preserving Face Recognition Ahmad-Reza Sadeghi, Thomas Schneider, and Immo Wehrenberg Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany {ahmad.sadeghi,thomas.schneider}@trust.rub.de,[email protected]
Advanced Cryptography
Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.
Digital Object Identifier 10.1109/MSP.2012.2219653 Date of publication: 5 December 2012
[ R. (Inald) L. Lagendijk, Zekeriya Erkin, and auro Barni ] Encrypted Signal Processing for Privacy Protection [ Conveying the utility of homomorphic encryption and multiparty computation] In recent years,
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and
Breaking The Code Ryan Lowe Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and a minor in Applied Physics. As a sophomore, he took an independent study
Security and Privacy in Big Data, Blessing or Curse?
Security and Privacy in Big Data, Blessing or Curse? 2 nd National Cryptography Days 9-11 April 2015 Dr. Zeki Erkin Cyber Security Section Department of Intelligent Systems Delft University of Technology
Experimental Analysis of Privacy-Preserving Statistics Computation
Experimental Analysis of Privacy-Preserving Statistics Computation Hiranmayee Subramaniam 1, Rebecca N. Wright 2, and Zhiqiang Yang 2 1 Stevens Institute of Technology graduate, [email protected]. 2
Fully homomorphic encryption equating to cloud security: An approach
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 2 (Jan. - Feb. 2013), PP 46-50 Fully homomorphic encryption equating to cloud security: An approach
3-6 Toward Realizing Privacy-Preserving IP-Traceback
3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,
Improved Online/Offline Signature Schemes
Improved Online/Offline Signature Schemes Adi Shamir and Yael Tauman Applied Math. Dept. The Weizmann Institute of Science Rehovot 76100, Israel {shamir,tauman}@wisdom.weizmann.ac.il Abstract. The notion
Software Tool for Implementing RSA Algorithm
Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key
A Factoring and Discrete Logarithm based Cryptosystem
Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques
MATH 168: FINAL PROJECT Troels Eriksen. 1 Introduction
MATH 168: FINAL PROJECT Troels Eriksen 1 Introduction In the later years cryptosystems using elliptic curves have shown up and are claimed to be just as secure as a system like RSA with much smaller key
An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method
An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method E.Sathiyamoorthy 1, S.S.Manivannan 2 1&2 School of Information Technology and Engineering
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
The 12th Australasian Conference on Information Security and Privacy (ACISP 07). (2 4 july 2007, Townsville, Queensland, Australia) J. Pieprzyk Ed. Springer-Verlag, LNCS????, pages??????. An Application
An Approach to Shorten Digital Signature Length
Computer Science Journal of Moldova, vol.14, no.342, 2006 An Approach to Shorten Digital Signature Length Nikolay A. Moldovyan Abstract A new method is proposed to design short signature schemes based
Basic Algorithms In Computer Algebra
Basic Algorithms In Computer Algebra Kaiserslautern SS 2011 Prof. Dr. Wolfram Decker 2. Mai 2011 References Cohen, H.: A Course in Computational Algebraic Number Theory. Springer, 1993. Cox, D.; Little,
Secure and Efficient Protocols for Iris and Fingerprint Identification
Secure and Efficient Protocols for Iris and Fingerprint Identification Marina Blanton 1 and Paolo Gasti 2 1 Department of Computer Science and Engineering, University of Notre Dame 2 Department of Information
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
CIS 5371 Cryptography. 8. Encryption --
CIS 5371 Cryptography p y 8. Encryption -- Asymmetric Techniques Textbook encryption algorithms In this chapter, security (confidentiality) is considered in the following sense: All-or-nothing secrecy.
A new probabilistic public key algorithm based on elliptic logarithms
A new probabilistic public key algorithm based on elliptic logarithms Afonso Comba de Araujo Neto, Raul Fernando Weber 1 Instituto de Informática Universidade Federal do Rio Grande do Sul (UFRGS) Caixa
A SOFTWARE COMPARISON OF RSA AND ECC
International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 29 ISSN: 974-13 A SOFTWARE COMPARISON OF RSA AND ECC Vivek B. Kute Lecturer. CSE Department, SVPCET, Nagpur 9975549138
Paillier Threshold Encryption Toolbox
Paillier Threshold Encryption Toolbox October 23, 2010 1 Introduction Following a desire for secure (encrypted) multiparty computation, the University of Texas at Dallas Data Security and Privacy Lab created
Cryptography: Authentication, Blind Signatures, and Digital Cash
Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
RSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
A New Efficient Digital Signature Scheme Algorithm based on Block cipher
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 1 (Nov. - Dec. 2012), PP 47-52 A New Efficient Digital Signature Scheme Algorithm based on Block cipher 1
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Guaranteed Slowdown, Generalized Encryption Scheme, and Function Sharing
Guaranteed Slowdown, Generalized Encryption Scheme, and Function Sharing Yury Lifshits July 10, 2005 Abstract The goal of the paper is to construct mathematical abstractions of different aspects of real
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS
A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS V. Anand 1, Ahmed Abdul Moiz Qyser 2 1 Muffakham Jah College of Engineering and Technology, Hyderabad, India 2 Muffakham Jah College
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data
Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data Dario Catalano 1 and Dario Fiore 2 1 Dipartimento di Matematica e Informatica, Università di Catania, Italy. [email protected]
CLOUD computing systems, in which the clients
IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. X, NO. X, JANUARY 20XX 1 A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems Sriram N. Premnath, Zygmunt J. Haas, Fellow, IEEE arxiv:1410.1389v1
EXAMINING OF HEALTH SERVICES BY UTILIZATION OF MOBILE SYSTEMS. Dokuri Sravanthi 1, P.Rupa 2
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE EXAMINING OF HEALTH SERVICES BY UTILIZATION OF MOBILE SYSTEMS Dokuri Sravanthi 1, P.Rupa 2 1 M.Tech Student, Dept of CSE, CMR Institute
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
Elements of Applied Cryptography Public key encryption
Network Security Elements of Applied Cryptography Public key encryption Public key cryptosystem RSA and the factorization problem RSA in practice Other asymmetric ciphers Asymmetric Encryption Scheme Let
A secure email login system using virtual password
A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {[email protected]} 2 SVNIT, Surat,Gujarat,India 2 {[email protected]}
Computing on Encrypted Data
Computing on Encrypted Data Secure Internet of Things Seminar David Wu January, 2015 Smart Homes New Applications in the Internet of Things aggregation + analytics usage statistics and reports report energy
Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
Appears in Cryptography and Coding: 10th IMA International Conference, Lecture Notes in Computer Science 3796 (2005) 355 375. Springer-Verlag. Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
VoteID 2011 Internet Voting System with Cast as Intended Verification
VoteID 2011 Internet Voting System with Cast as Intended Verification September 2011 VP R&D Jordi [email protected] Index Introduction Proposal Security Conclusions 2. Introduction Client computers could
CRC Press has granted the following specific permissions for the electronic version of this book:
This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has
Security Analysis of DRBG Using HMAC in NIST SP 800-90
Security Analysis of DRBG Using MAC in NIST SP 800-90 Shoichi irose Graduate School of Engineering, University of Fukui hrs [email protected] Abstract. MAC DRBG is a deterministic random bit generator
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves Billy Bob Brumley Helsinki University of Technology Laboratory for Theoretical Computer Science [email protected] Abstract Self-Certified
Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds
Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Ms. Jyotsna T. Kumbhar 1 ME Student, Department of Computer Engineering, TSSM S, P.V.P.I.T., Bavdhan, Pune University,
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #10 Symmetric Key Ciphers (Refer
Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography
Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt
An Overview of Integer Factoring Algorithms. The Problem
An Overview of Integer Factoring Algorithms Manindra Agrawal IITK / NUS The Problem Given an integer n, find all its prime divisors as efficiently as possible. 1 A Difficult Problem No efficient algorithm
Cryptography and Network Security Chapter 9
Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 9 Public Key Cryptography and RSA Every Egyptian received two names,
Masao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SEPKC. Along with a presentation of K(XII)SEPKC over the extension field F 2 8 extensively used for present day various
Faster deterministic integer factorisation
David Harvey (joint work with Edgar Costa, NYU) University of New South Wales 25th October 2011 The obvious mathematical breakthrough would be the development of an easy way to factor large prime numbers
Shor s algorithm and secret sharing
Shor s algorithm and secret sharing Libor Nentvich: QC 23 April 2007: Shor s algorithm and secret sharing 1/41 Goals: 1 To explain why the factoring is important. 2 To describe the oldest and most successful
2 Primality and Compositeness Tests
Int. J. Contemp. Math. Sciences, Vol. 3, 2008, no. 33, 1635-1642 On Factoring R. A. Mollin Department of Mathematics and Statistics University of Calgary, Calgary, Alberta, Canada, T2N 1N4 http://www.math.ucalgary.ca/
Non-Black-Box Techniques In Crytpography. Thesis for the Ph.D degree Boaz Barak
Non-Black-Box Techniques In Crytpography Introduction Thesis for the Ph.D degree Boaz Barak A computer program (or equivalently, an algorithm) is a list of symbols a finite string. When we interpret a
Privacy-Preserving Set Operations
Privacy-Preserving Set Operations Lea Kissner and Dawn Song Carnegie Mellon University Abstract In many important applications, a collection of mutually distrustful parties must perform private computation
A blind digital signature scheme using elliptic curve digital signature algorithm
A blind digital signature scheme using elliptic curve digital signature algorithm İsmail BÜTÜN * and Mehmet DEMİRER *Department of Electrical Engineering, University of South Florida, Tampa, FL, USA Department
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory
An Efficient and Secure Data Sharing Framework using Homomorphic Encryption in the Cloud
An Efficient and Secure Data Sharing Framework using Homomorphic Encryption in the Cloud Sanjay Madria Professor and Site Director for NSF I/UCRC Center on Net-Centric Software and Systems Missouri University
Lecture 2: Complexity Theory Review and Interactive Proofs
600.641 Special Topics in Theoretical Cryptography January 23, 2007 Lecture 2: Complexity Theory Review and Interactive Proofs Instructor: Susan Hohenberger Scribe: Karyn Benson 1 Introduction to Cryptography
Post-Quantum Cryptography #4
Post-Quantum Cryptography #4 Prof. Claude Crépeau McGill University http://crypto.cs.mcgill.ca/~crepeau/waterloo 185 ( 186 Attack scenarios Ciphertext-only attack: This is the most basic type of attack
An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm
An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm V.Masthanamma 1,G.Lakshmi Preya 2 UG Scholar, Department of Information Technology, Saveetha School of Engineering
Overview of Public-Key Cryptography
CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge Aggelos Kiayias and Hong-Sheng Zhou Computer Science and Engineering University of Connecticut Storrs, CT, USA {aggelos,hszhou}@cse.uconn.edu
Lecture 3: One-Way Encryption, RSA Example
ICS 180: Introduction to Cryptography April 13, 2004 Lecturer: Stanislaw Jarecki Lecture 3: One-Way Encryption, RSA Example 1 LECTURE SUMMARY We look at a different security property one might require
Data Grid Privacy and Secure Storage Service in Cloud Computing
Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,
Notes on Factoring. MA 206 Kurt Bryan
The General Approach Notes on Factoring MA 26 Kurt Bryan Suppose I hand you n, a 2 digit integer and tell you that n is composite, with smallest prime factor around 5 digits. Finding a nontrivial factor
Number Theory and Cryptography using PARI/GP
Number Theory and Cryptography using Minh Van Nguyen [email protected] 25 November 2008 This article uses to study elementary number theory and the RSA public key cryptosystem. Various commands will
Lecture 5 - CPA security, Pseudorandom functions
Lecture 5 - CPA security, Pseudorandom functions Boaz Barak October 2, 2007 Reading Pages 82 93 and 221 225 of KL (sections 3.5, 3.6.1, 3.6.2 and 6.5). See also Goldreich (Vol I) for proof of PRF construction.
Public Key Cryptography and RSA. Review: Number Theory Basics
Public Key Cryptography and RSA Murat Kantarcioglu Based on Prof. Ninghui Li s Slides Review: Number Theory Basics Definition An integer n > 1 is called a prime number if its positive divisors are 1 and
New Efficient Searchable Encryption Schemes from Bilinear Pairings
International Journal of Network Security, Vol.10, No.1, PP.25 31, Jan. 2010 25 New Efficient Searchable Encryption Schemes from Bilinear Pairings Chunxiang Gu and Yuefei Zhu (Corresponding author: Chunxiang
Public Key Cryptography: RSA and Lots of Number Theory
Public Key Cryptography: RSA and Lots of Number Theory Public vs. Private-Key Cryptography We have just discussed traditional symmetric cryptography: Uses a single key shared between sender and receiver
