Certificate Based Signature Schemes without Pairings or Random Oracles



Similar documents
An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood

Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks

MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC

CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction

1 Construction of CCA-secure encryption

Identity-Based Encryption from the Weil Pairing

Introduction. Digital Signature

Digital Signatures. What are Signature Schemes?

1 Signatures vs. MACs

1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.

Introduction to Cryptography

DIGITAL SIGNATURES 1/1

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Advanced Cryptography

Lecture 9 - Message Authentication Codes

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

A Strong RSA-based and Certificateless-based Signature Scheme

CS549: Cryptography and Network Security

1 Message Authentication

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

Chosen-Ciphertext Security from Identity-Based Encryption

A New and Efficient Signature on Commitment Values

Schnorr Signcryption. Combining public key encryption with Schnorr digital signature. Laura Savu, University of Bucharest, Romania

Introduction to Computer Security

Overview of Public-Key Cryptography

Cryptographic Hash Functions Message Authentication Digital Signatures

Digital Signatures. Prof. Zeph Grunschlag

Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre

Signature Schemes. CSG 252 Fall Riccardo Pucella

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem

The Legal Classification of Identity-Based Signatures

Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CSCE 465 Computer & Network Security

An Introduction to Digital Signature Schemes

Journal of Electronic Banking Systems

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

DEVELOPMENT OF CERTIFICATE LESS DIGITAL SIGNATURE SCHEME & ITS APPLICATION IN E-CASH SYSTEM

Lightweight Encryption for

A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems

Comments on "public integrity auditing for dynamic data sharing with multi-user modification"

Lecture 15 - Digital Signatures

Strengthen RFID Tags Security Using New Data Structure

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

MACs Message authentication and integrity. Table of contents

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Introduction to Cryptography CS 355

New Efficient Searchable Encryption Schemes from Bilinear Pairings

Efficient Unlinkable Secret Handshakes for Anonymous Communications

Software Tool for Implementing RSA Algorithm

Identity-based Encryption with Efficient Revocation

An Efficient and Provably-secure Digital signature Scheme based on Elliptic Curve Bilinear Pairings

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

Authentication, digital signatures, PRNG

CryptoVerif Tutorial

QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University

Chosen-Ciphertext Security from Identity-Based Encryption

Chapter 12. Digital signatures Digital signature schemes

Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

7 Key Management and PKIs

Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme

Digital signatures are one of the most important inventions/applications of modern cryptography.

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Digital Signatures: A Panoramic View. Palash Sarkar

A Secure Decentralized Access Control Scheme for Data stored in Clouds

Group Signatures: Authentication with Privacy

CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure

Princeton University Computer Science COS 432: Information Security (Fall 2013)

Ch.9 Cryptography. The Graduate Center, CUNY.! CSc Theoretical Computer Science Konstantinos Vamvourellis

MTAT Cryptology II. Digital Signatures. Sven Laur University of Tartu

CS155. Cryptography Overview

CRYPTOGRAPHY IN NETWORK SECURITY

Provable-Security Analysis of Authenticated Encryption in Kerberos

CIS 5371 Cryptography. 8. Encryption --

Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks

7! Cryptographic Techniques! A Brief Introduction

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Lecture 6 - Cryptography

Secure Communication in a Distributed System Using Identity Based Encryption

Transcription:

Certificate Based Signature Schemes without Pairings or Random Oracles p. 1/2 Certificate Based Signature Schemes without Pairings or Random Oracles Joseph K. Liu, Joonsang Baek, Willy Susilo and Jianying Zhou Cryptography and Security Department Institute for Infocomm Research, Singapore {ksliu, jsbaek, jyzhou}@i2r.a-star.edu.sg Centre for Computer and Information Security (CCISR) School of Computer Science and Software Engineering University of Wollongong, Australia wsusilo@uow.edu.au

Certificate Based Signature Schemes without Pairings or Random Oracles p. 2/2 Outline Motivation Public Key Cryptography and PKI Identity-based Cryptography Certificate-based Cryptography Certificateless cryptography Related Works Our Contributions CBS Security Model CBS Without Pairings CBS Without Random Oracles Conclusions

Certificate Based Signature Schemes without Pairings or Random Oracles p. 3/2 Public Key Cryptography Users have two keys: public key and private key Alice s public key is used for: encryption to Alice by Bob verification of Alice s signatures by Bob Alice s private key is used for: decryption by Alice signing by Alice An infrastructure linking users and their public keys is needed: Public Key Infrastructure

Certificate Based Signature Schemes without Pairings or Random Oracles p. 4/2 Public Key Cryptography: Drawbacks Certification management adds a heavy overhead in PKIs: Certificate distribution Certificate storage Certificate revocation Cross-certification Certificates seem to be a problem. What about removing certificates as much as possible?

Certificate Based Signature Schemes without Pairings or Random Oracles p. 5/2 Identity-based Cryptography (Shamir 1984) Public keys are derived in a public way from users identities Users must contact a trusted authority (TA) prior to decryption/signing. TA identifies the users and compute private keys using a master-key Bob can encrypt to Alice w/o consulting a directory Alice does not even have to be registered before Bob sends her a message Only the system parameters need to be certified (considerably less certificates to be handled)

Certificate Based Signature Schemes without Pairings or Random Oracles p. 6/2 Identity-based Cryptography: Security Definitions In the identity-based scenario, the adversary can corrupt a set of players and learn their private keys. Additionally, it can adaptively ask for encryption (signing) queries for any user IBE: chosen-ciphertext security means the adversary can not learn anything about non-queried ciphertexts for non-corrupted users IBS: unforgeability means the adversary can not forge non-queried signatures for non-corrupted users IBS can be built from any signature scheme IBE more challenging, and remained an open problem until 2001

Certificate Based Signature Schemes without Pairings or Random Oracles p. 7/2 IBC: Advantages & Disadvantages Advantages: Certificates drastically reduced Human memorizable keys No need for public key directories Drawbacks: Key escrow Distributing keys is non-trivial (secure channel) Certificate revocation? Solution: time is added to identifiers (not ideal)

Certificate Based Signature Schemes without Pairings or Random Oracles p. 8/2 How to remove key escrow? Certificate-based cryptography (Gentry 2003) Goal: to remove key escrow from IBC and simplify the certificate revocation strategy Idea: Bob encrypts/verifies adding time periods Alice needs both her secret key and a certificate for each time period to decrypt/sign revocation means the TA stops issuing certificates no secure channel Certificate-less cryptography (AlRiyami-Patterson 2003) Goal: Bob does not need to check whether Alice s public key is certified (no certificates) Idea: Alice s decryption key is built as a result of the interaction between Alice and the TA secure channel

Certificate Based Signature Schemes without Pairings or Random Oracles p. 9/2 Certificateless Cryptography Pairing based Without pairing (Baek, Safavi-Naini, Susilo - ISC 2005).

Certificate-based Cryptography Certificate Based Signature Schemes without Pairings or Random Oracles p. 10/2

Certificate Based Signature Schemes without Pairings or Random Oracles p. 11/2 Certificate-based Signature Schemes Firstly suggested by Kang, Park and Hahn (CT-RSA 2004). Insecure against key replacement attack (Li, Huang, Mu, Susilo and Wu - EuroPKI 2007 & Journal of Computer Security 2008). Certificate-based ring signature - Au, Liu, Susilo, Yuen - ISPEC 2007. All schemes require pairings and random oracles.

Certificate Based Signature Schemes without Pairings or Random Oracles p. 12/2 Our Contributions We propose two new CBS schemes: A scheme without pairings. A scheme without random oracles. These schemes fill the gap of the CBS constructions in the literature.

Certificate Based Signature Schemes without Pairings or Random Oracles p. 13/2 CBS Security Model A CBS scheme is defined by six algorithms: Setup is a probabilistic algorithm taking as input a security parameter. It returns the certifier s master key msk and public parameters param. Usually this algorithm is run by the CA. UserKeyGen is a probabilistic algorithm that takes param as input. When run by a client, it returns a public key PK and a secret key usk. Certify is a probabilistic algorithm that takes as input (msk, τ, param, PK, ID) where ID is a binary string representing the user information. It returns Cert τ which is sent to the client. Here τ is a string identifying a time period.

Certificate Based Signature Schemes without Pairings or Random Oracles p. 14/2 CBS Security Model Consolidate is a deterministic certificate consolidation algorithm taking as input (param, τ, Cert τ) and optionally Cert τ 1. It returns Cert τ, the certificate used by a client in time period τ. Sign is a probabilistic algorithm taking as input (τ, param, m, Cert τ, usk) where m is a message. It outputs σ. Verify is a deterministic algorithm taking (param, PK, ID, σ) as input in time period τ. It returns either valid indicating a valid signature, or the special symbol indicating invalid.

Certificate Based Signature Schemes without Pairings or Random Oracles p. 15/2 CBS Security Model We require Verify PK,ID (Sign τ,certτ,usk(m)) = valid We also note that a concrete CBS scheme may not involve certificate consolidation. In this situation, algorithm Consolidate will simply output Cert τ = Cert τ. In the rest of this paper, for simplicity, we will omit Consolidate and the time identifying string τ in all notations.

Certificate Based Signature Schemes without Pairings or Random Oracles p. 16/2 CBS Security Model Two different security games: Game 1: the adversary models an uncertified entity Game 2: the adversary models the certifier in possession of the master key msk attacking a fixed entity s public key We use the enhanced model by Li, Huang, Mu, Susilo and Wu that captures the key replacement attack in Game 1.

Certificate Based Signature Schemes without Pairings or Random Oracles p. 17/2 CBS Without Pairing Setup. Let G be a multiplicative group with order q. The PKG selects a random generator g G and randomly chooses x R Z q. It sets X = g x. Let H : {0, 1} Z q be a cryptographic hash function. The public parameters param and master secret key msk are given by param = (G, q, g, X, H) msk = x UserKeyGen. User selects a secret value u Z q as his secret key usk, and computes his public key PK as (g u, X u, π u ) where π u is the following non-interactive proof-of-knowledge (PoK): PK{(u) : U 1 = g u U 2 = X u }

Certificate Based Signature Schemes without Pairings or Random Oracles p. 18/2 CBS Without Pairing Certify. Let h = H(PK, ID) for user with public key PK and binary string ID which is used to identify the user. To generate a certificate for this user, the CA randomly selects r R Z q, computes R = g r s = r 1 ( h xr) mod q The certificate is (R, s). Note that a correctly generated certificate should fulfill the following equality: (1) R s X R = g h

Certificate Based Signature Schemes without Pairings or Random Oracles p. 19/2 CBS Without Pairing Sign. To sign a message m {0, 1}, the signer with public key PK (and user info ID), certificate (R, s) and secret key u, randomly selects y R Z q, computes Y = R y h = H(Y, R, m) z = y + h s u mod q and outputs (Y, R, z) as the signature σ. Verify. Given a signature σ = (Y, R, z) for a public key PK on a message m, a verifier first checks whether π u is a valid PoK. If not, output. Otherwise computes h = H(Y, R, m), h = H(PK, ID), and checks whether (2) (g u ) h h? = R z Y (X u ) hr Output valid if it is equal. Otherwise, output.

Certificate Based Signature Schemes without Pairings or Random Oracles p. 20/2 CBS Without Pairing Theorem 1 (Unforgeability against Game 1 Adversary) The CBS scheme without pairing is (ǫ, t)-existential unforgeable against Game 1 adversary with advantage at most ǫ and runs in time at most t, assuming that the (ǫ, t )-DL assumption holds in G, where ǫ = ( 1 q h(q e + q s ) )( 1 1 )( 1 ) ǫ, t = t + O(q e + q s )E q q q h and q e, q s, q h are the numbers of certification queries, signing queries and hashing queries the adversary is allowed to make and E is the time for an exponentiation operation.

Certificate Based Signature Schemes without Pairings or Random Oracles p. 21/2 CBS Without Pairing Theorem 2 (Unforgeability against Game 2 Adversary) The CBS scheme without pairing is (ǫ, t)-existential unforgeable against Game 2 adversary with advantage at most ǫ and runs in time at most t, assuming that the (ǫ, t )-DL assumption holds in G, where ǫ = ( 1 q )( hq s 1 1 )( 1 )( 1 ) ǫ, t = t + O(q s )E q q q h q u and q s, q h, q u are the numbers of signing queries, hashing queries and user-key-gen queries the adversary is allowed to make and E is the time for an exponentiation operation.

Certificate Based Signature Schemes without Pairings or Random Oracles p. 22/2 CBS Without Random Oracles Our scheme is motivated by Waters IBE. Let H u : {0, 1} {0, 1} n u and H m : {0, 1} {0, 1} n m be two collision-resistant cryptographic hash functions for some n u, n m Z. Setup. Select a pairing e : G G G T where the order of G is p. Let g be a generator of G. Randomly select α R Z p, g 2 R G and compute g 1 = g α. Also select randomly the following elements: u, m R G û i R G for i = 1,...,n u ˆm i R G for i = 1,...,n m Let Û = {û i }, ˆM = { ˆm i }. The public parameters param are (e, G, G T, p, g, g 1, g 2, u, Û, m, ˆM) and the master secret key msk is g2 α. UserKeyGen. User selects a secret value x Z p as his secret key usk, and computes his public key PK as (pk (1), pk (2) ) = (g x, g1). x

Certificate Based Signature Schemes without Pairings or Random Oracles p. 23/2 CBS Without Random Oracles Certify. Let u = H u (PK, ID) for user with public key PK and binary string ID which is used to identify the user. Let u[i] be the i-th bit of u. Define U {1,...,n u } to be the set of indicies such that u[i] = 1. To construct the certificate, the CA randomly selects r u R Z p and computes ( ) g2 α ( ) ru U, g r u = (cert (1), cert (2) ) where U = u i U û i

CBS Without Random Oracles Sign. To sign a message m {0, 1}, the signer with identity PK (and user information ID), certificate (cert (1), cert (2) ) and secret key usk, compute m = H m (m). Let m[i] be the i-th bit of m and M {1,...,n m } be the set of indicies i such that m[i] = 1. Randomly select r π, r m R Z p, compute u = H u (PK, userinfo), U = u i U ûi and σ = ( ( cert (1)) usk( ) rπ U (m i M = (V, R π, R m ) ˆm i ) rm, (cert (2)) usk g r π, g r m Verify. Given a signature σ = (V, R π, R m ) for a public key PK and user information ID on a message m, a verifier first checks whether e(g x, g 1 ) = e(g x 1, g). If not, outputs. Otherwise computes m = H m (m), u = H u (PK, ID), U = u i U ûi and checks whether e(v, g)? = e(g 2, g x 1) e(u, R π ) e(m i M ˆm i, R m ) ) Certificate Based Signature Schemes without Pairings or Random Oracles p. 24/2

Certificate Based Signature Schemes without Pairings or Random Oracles p. 25/2 CBS Without Random Oracles Theorem 3 (Unforgeability against Game 1 Adversary) The CBS scheme without random oracles is (ǫ, t)-existential unforgeable against Game 1 adversary with advantage at most ǫ and runs in time at most t, assuming that the (ǫ, t )-GCDH assumption holds in G, where ǫ ǫ 16(q e + q s )(n u + 1)q s (n m + 1) (qe t = t + O( n u + q s (n u + n m ) ) ) ρ + (q e + q s )τ where q e is the number of queries made to the Certification Query, q s is the number of queries made to the Signing Query, and ρ and τ are the time for a multiplication and an exponentiation in G respectively.

Certificate Based Signature Schemes without Pairings or Random Oracles p. 26/2 CBS Without Random Oracles Theorem 4 (Unforgeability against Game 2 Adversary) The CBS scheme without random oracles is (ǫ, t)-existential unforgeable against Game 2 adversary with advantage at most ǫ and runs in time at most t, assuming that the (ǫ, t )-Many-DH assumption holds in G, where ǫ ǫ ( (qs, t = t+o (n u +n m ) ) ρ+(q k +q s )τ) 16q s (n u + 1)q s (n m + 1)q k where q s is the number of queries made to the Signing Queries, q k is the number of queries made to the User-key-gen Queries and ρ and τ are the time for a multiplication and an exponentiation in G respectively.

Certificate Based Signature Schemes without Pairings or Random Oracles p. 27/2 Conclusions We proposed two new CBS schemes. The first scheme does not require any pairings. Suitable for some power-constrained devices, such as wireless sensor networks. The second scheme does not require any random oracles. Suitable for applications that require a high level of security.

Certificate Based Signature Schemes without Pairings or Random Oracles p. 28/2 Full Paper Full version of the paper can be found at http://eprint.iacr.org/2008/275.