Breaking An Identity-Based Encryption Scheme based on DHIES



Similar documents
Certificate Based Signature Schemes without Pairings or Random Oracles

Identity-Based Encryption from the Weil Pairing

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Advanced Cryptography

Message Authentication Code

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

New Efficient Searchable Encryption Schemes from Bilinear Pairings

An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC

Paillier Threshold Encryption Toolbox

Secure Computation Martin Beck

The application of prime numbers to RSA encryption

Lecture 15 - Digital Signatures

MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC

Victor Shoup Avi Rubin. Abstract

Strengthen RFID Tags Security Using New Data Structure

Introduction. Digital Signature

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Index Calculation Attacks on RSA Signature and Encryption

Cryptography and Network Security Chapter 10

Network Security. Chapter 6 Random Number Generation. Prof. Dr.-Ing. Georg Carle

Network Security. Chapter 6 Random Number Generation

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood

Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks

An Introduction to the RSA Encryption Method

Applied Cryptography Public Key Algorithms

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CIS 5371 Cryptography. 8. Encryption --

A Factoring and Discrete Logarithm based Cryptosystem

Lecture 5 - CPA security, Pseudorandom functions

Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem

Lecture 3: One-Way Encryption, RSA Example

Signature Schemes. CSG 252 Fall Riccardo Pucella

Fast Batch Verification for Modular Exponentiation and Digital Signatures

1 Message Authentication

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

Study of algorithms for factoring integers and computing discrete logarithms

Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

3-6 Toward Realizing Privacy-Preserving IP-Traceback

Notes on Network Security Prof. Hemant K. Soni

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

Lecture 13 - Basic Number Theory.

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

Computer Science A Cryptography and Data Security. Claude Crépeau

Security Aspects of. Database Outsourcing. Vahid Khodabakhshi Hadi Halvachi. Dec, 2012

Secure Cloud Storage Meets with Secure Network Coding

Lecture 2: Complexity Theory Review and Interactive Proofs

MACs Message authentication and integrity. Table of contents

Introduction to Cryptography CS 355

Signature Amortization Technique for Authenticating Delay Sensitive Stream

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

Multi-Input Functional Encryption for Unbounded Arity Functions

Lecture 25: Pairing-Based Cryptography

Data Security in Unattended Wireless Sensor Network

Information Security Theory vs. Reality

Some Identity Based Strong Bi-Designated Verifier Signature Schemes

Lecture 9 - Message Authentication Codes

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and

Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL

Security Analysis for Order Preserving Encryption Schemes

QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University

Primality Testing and Factorization Methods

Capture Resilient ElGamal Signature Protocols

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

How To Encrypt Data With A Power Of N On A K Disk

Discrete Mathematics: Homework 7 solution. Due:

Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction

RSA Attacks. By Abdulaziz Alrasheed and Fatima

Data Mining and Data Warehousing. Henryk Maciejewski. Data Mining Predictive modelling: regression

minimal polyonomial Example

Enhancing privacy with quantum networks

A new probabilistic public key algorithm based on elliptic logarithms

Verifiable Outsourced Computations Outsourcing Computations to Untrusted Servers

Public Key Cryptography: RSA and Lots of Number Theory

Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay

On-Line/Off-Line Digital Signatures

An Approach to Shorten Digital Signature Length

Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card

Chapter 16: Authentication in Distributed System

Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Cryptography and Network Security Chapter 9

NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA

Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme

Zeros of Polynomial Functions

Improved Online/Offline Signature Schemes

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

Private Inference Control For Aggregate Database Queries

Private Record Linkage with Bloom Filters

1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.

Solutions to Problem Set 1

Transcription:

Breaking An Identity-Based Encryption Scheme based on DHIES Martin R. Albrecht 1 Kenneth G. Paterson 2 1 SALSA Project - INRIA, UPMC, Univ Paris 06 2 Information Security Group, Royal Holloway, University of London IMA Cryptography and Coding 2011

Introduction The search for efficient Identity-Based Encryption (IBE) schemes has resulted in many proposals for schemes. A recent proposal, due to Chen et al., has very efficient encryption and decryption and claims to have security based on the security of the DHIES public key encryption scheme. Y. Chen, M. Charlemagne, Z. Guan, J. Hu and Z. Chen. Identity-based encryption based on DHIES. In D. Feng, D.A. Basin and P. Liu Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, pp. 82-88, ACM, 2010.

Our Contribution We present collusion attacks against the scheme which recover the Trusted Authority s master secret key. Our attacks allow to trade various parameters off one another such as the number of private keys and computational cost; apply to the parameters suggested by Chen et al. to mitigate such attacks; improve upon an independent attack by Susilo and Baek. Since both Chen et al. and Susilo and Baek share a misunderstanding about the complexity of polynomial system solving, we also give an account of the state of the art.

The IBE Scheme I Setup: This algorithm has as input a security parameter k and a value n. 1. Run a pairing parameter generator G to generate a prime q, two groups G 1, G 2 of order q and a pairing e : G 1 G 1 G 2. Let P generate G 1. 2. Set msk = (u 0,..., u n 1 ) (Z q ) n where u i R Z q for 0 i < n. 3. Set mpk = (u 0 P,..., u n 1 P) (G 1 ) n. 4. Let H 0 be a hash function which takes as inputs elements of {0, 1} and outputs subsets of size t of {0, 1,..., n 1}. 5. Select a pseudo-random number generator (PRNG) F having elements of {0, 1} as seeds and outputs in Z q.

The IBE Scheme II KeyGen: Given an identity id {0, 1}, this algorithm proceeds as follows: 1. Produce {s 0,..., s t 1 } := H 0 (id). 2. Use F with seed id to produce vectors a = (a 0,..., a t 1 ) (Z q ) t and b = (b 00,..., b t 1,t 1 ) (Z q ) (t+1 2 ). 3. Output as the private key for identity id the value: x id = 0 i<t a i u si + 0 i j<t b ij u si u sj Z q. For our attack we do not use the Encrytion and Decryption routines, hence we do not present them here.

The IBE Scheme III The private key corresponding to the identity id is the evaluation of a quadratic function f id over Z q in t on the values u 0,..., u n 1 from msk. The specific quadratic function f id is determined by H 0 and F and can be readily calculated using only the string id and public information. This observation forms the basis of all known attacks against the scheme including ours.

An Attack on the Underlying Hard Problem Consider an attacker who has access to private keys x id for strings id. The attacker makes about n 2 queries for random identities. Each yields x id for some f id. We set up a polynomial system of quadratic polynomials 0 i<t a i x si + corresponding to f id and x id. 0 i j<t b ij x si x sj x id After roughly n 2 queries, this system can be linearised and solved in O(n 6 ). Chen et al. suggest to mitigate this attack by limiting the number of key extraction queries that are allowed by the adversary to 0.1n 2.

Hardness of Polynomial System Solving I If a system of equations has a unique solution, solving is equivalent to computing a Gröbner basis. Theorem (F 5 Complexity) Computing a Gröbner basis of a zero-dimensional semi-regular system of m polynomials in n variables can be computed with the F 5 algorithm in (( ) ω ) n + D O D operations, where D is the index of the first non-positive coefficient of c k z k = k 0 m 1 i=0 (1 zd i ) (1 z) n. and 2 ω < 3 is the linear algebra constant.

Hardness of Polynomial System Solving II Using this theorem and the standard assumption that random systems are semi-regular, we can estimate the complexity of solving a random system of equations. m = n n + 1 n log n n log n 2 0.05 n 2 0.1 n 2 0.5n 2 1024 227 176 105 74 512 165 118 92 65 256 102 80 80 57 45 128 364 68 49 68 49 38 64 182 49 32 63 41 32 32 91 33 26 54 39 26 16 46 21 21 m < n 30 21 8 24 15 11 m < n m < n 15 Table: log 2 of field ops for solving m equations in n unknowns.

Hardness of Polynomial System Solving III Figure: Experimental verification for t {4, 8, n} with m = 0.1n 2.

Hardness of Polynomial System Solving IV Hence, the problem is much easier than expected by Chen et al. and Susilo and Baek. W. Susilo and J. Baek. On the Security of the Identity-based Encryption based on DHIES from ASIACCS 2010 (short paper). Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, ACM, 2011.

Refining the Basic Attack I Key Idea We can precompute the hash function H 0 in an effort to find identities leading to simpler sets of equations. Partition the set of unknowns into subsets of equal size, and search for identities yielding systems of equations with unknowns restricted to these sets. To this end, we write n = 2 d. For some value s 0 with 2 d s t, we partition the set {0,..., n 1} into 2 s sets S i each containing 2 d s integers by setting S i = {i2 d s,..., (i + 1)2 d s 1}. For example: {0, 1, 2, 3}, {4, 5, 6, 7},... }

Refining the Basic Attack II Set ID i :=, c i := 0 for 0 i < 2 s Set c := 0 and c 2 s := 0. repeat c := c + 1 id R {0, 1} if H 0 (id) S i for some i then ID i = ID i id c i := c i + 1 else c 2 s := c 2 s + 1 end if until c i m for 0 i < 2 s Obtain x id for m elements in each ID i using key extraction queries. for 0 i < 2 s do solve a system of m equations in {x j : j S i }. end for

Refining the Basic Attack III The attack involves three main stages: 1. a pre-computation to generate sets of identities ID i suitable for building systems of equations; cost needs to be established 2. making key extraction queries to obtain the required private keys; m2 s extraction queries 3. generating and solving 2 s systems of equations, each containing m equations in 2 d s unknowns. table on earlier slide

Refining the Basic Attack IV We need enough queries to H 0 to obtain at least m identities id in each of the sets ID i. We assume that H 0 selects t-subsets of {0, 1,..., n 1} uniformly at random for random id. Then the probability that H 0 (id) S i is equal to p := ( ) ( 2 d s t / n ) t. After c iterations of main loop in the algorithm, the vector (c 0,..., c 2 s 1, c 2 s ) follows a multinomial distribution with parameters c and (p,..., p, 1 2 s p). It then follows from standard results on the multinomial distribution that, for each 0 i < 2 s, the random variable c i follows a binomial distribution with mean cp and variance cp(1 p). The covariance between c i and c j is small and we may treat the first 2 s values c i as independent identically distributed random variables.

Refining the Basic Attack V We have, for any real number a: Pr[c i cp a] > 1 e a2 /2pc Under our assumption that the c i may be treated as independent random variables, we then have: Pr[ 2 /2pc ) 2s. 0 i<2 s c i cp a] > (1 e a Setting a = m and c = 2m/p, we then obtain: Pr[ 0 i<2 s c i m] > (1 e m/4p ) 2 s 1 2 s e m/4p 1 n t e m/4p. The algorithm terminates with high probability if the main loop is executed c = 2m/p times.

A concrete example We take n = 512 (so d = 9) and t = 8 which are the concrete suggested parameters by Chen et al. We select s = 4 and m = 0.5(2 d s ) 2 = 2 9. For these parameters, we have p = 2 33.3. Our attack requires 2m/p = 2 43.3 evaluations of H 0, and m2 s = 2 13 key extraction queries to build 2 s = 16 sets of 2 9 equations in 32 variables. The complexity of solving the 16 systems of equations is 16 2 26 = 2 30 field operations.

Minimising key extractions We again take n = 512 (so d = 9) and t = 8. We select s = 6 and m = 9. Our attack requires 2 60.8 evaluations of H 0 2 9.2 key extraction queries and 2 27.2 field operations to recover the master secret key of the scheme.

Conclusion To achieve 80-bit security against the simple attack one needs at least n = 2 14. In that case, solving the system of equations would cost n 6 = 2 14 6 = 2 84 finite field operations. With such parameters the master public key mpk would have a size of 160 2 14 /8 = 320kb. However, this variant would still be vulnerable to the refined attacks. For example, if we were to pick s = 4, we would need 2 52.04 evaluations of H 0, 2 23 key extraction queries and just 2 31 field operations in the Gröbner basis step. We conclude that the scheme does not offer an attractive trade-off between security and efficiency.

Thank you for your attention Questions?