SlideShare une entreprise Scribd logo
1  sur  27
Proxy Cryptography Revisited
Anca-Andreea Ivan , Yevgeniy Dodis
New York University
NDSS 2003
PDSG
NYU

1
Outline of the talk
 Introduction

– What and Why?
 Related work
 Unidirectional (UPF ) vs. Bidirectional (BPF)
 Encryption UPF
 Encryption BPF
 Signature UPF & BPF
 Conclusions

PDSG
NYU

2
Introduction
 Problem:

 Allow Bob to decrypt ciphertext or sign messages on behalf
of Alice, without knowing the secret key of Alice.
 Solution:

 Third party (Escrow) helps Bob
 Proxy functions
 Our goal:
 Formalize and clarify the notion proxy functions
 Construct simple schemes satisfying the formal definitions
PDSG
NYU

3
Scenario: Key Escrow
User

Escrow
(ISP)
PDSG
NYU

FBI

I have a warrant
to monitor email
for one week.
4
Scenario: Key Escrow
User

Escrow
(ISP)
PDSG
NYU

FBI

I have a warrant
to monitor email
for one week.
5
Related work
 Atomic

proxy functions [BlSt98]
 Mobile agents proxy signatures [KBKL01,LKK01]
 Proxy signature is different from original signature
 Two-party signatures [BeSa02,MR01a,MR01b,NKDM03]
 Interactive protocols
 Two-party encryption [Mac03]
 Interactive protocols
 Threshold cryptography [Des89,…]
PDSG
NYU

6
Blaze/Strauss scheme – closer look
[BlSt98]
 Informal definition for
encryption/signature proxy
functions
 Try to modify existing
cryptographic primitives to satisfy
the definitions
 Result:
 Weak security guarantees
 Semi-formal implementations
 El-Gamal encryption
 Modified Fiat-Shamir
signatures
PDSG
NYU

[IvDo03]
 Starting with the problem at hand,
create formal model and
definitions
 Design simple, possibly new
schemes that satisfy the definitions
 Result:
 Strong, formal security
guarantees
 Encryption and signatures (…)
 Unidirectional and
bidirectional

7
Unidirectional proxy function (UPF)
Key distribution

Alice

PDSG
NYU

Escrow

Bob

8
Bidirectional proxy function (BPF)
Key distribution

Alice

PDSG
NYU

Escrow

Bob

9
Definition of UPF Encryption
Key distribution

Alice

Escrow

Bob

UDec
UEnc
PDSG
NYU

c’=p(c)
c=UEnc(m)

m=f(c’)

10
Encryption UPF - Security
 Classic

CCA: “The only way to decrypt c = Enc(m) of an
unknown message m, is to ask the decryptor to decrypt c.”
 Unidirectional proxy functions CCA:
 CCA secure against Bob when helped by Escrow: “The only
way for Bob to decrypt c = Enc(m) of an unknown message
m is by asking Escrow to transform c with p(c).”
 CCA secure against Escrow when helped by Bob: “The only
way for Escrow to decrypt c = Enc(m) of an unknown
message m is to ask Bob to decrypt c’ = f(c) .”
 Similarly,
PDSG
NYU

we can define CPA and OW security.
11
Generic Encryption UPF
EK1,EK2

Key distribution
DK1

DK1,DK2

Alice
DK1,DK2

D2

D1

E2

Escrow
DK1

c=E1(E2(m))

DK2

Bob
DK2

E1

PDSG
NYU

c’=D1(c)

m=D2(c’)

12
Specialized UPF Encryption
El-Gamal (CPA), RSA (OW), BF-IBE (IB-CPA)
Key distribution

EK=e

d1
DK=d=d1*d2

Alice
d=d1 * d2
m=cd mod n

Bob

Escrow
d1

c

d2

c’=cd1 mod n

d2

m=c’d2 mod n

c=me mod n
PDSG
NYU

13
Definition of BPF Encryption
Key distribution

Alice

m=BDec(c)

Escrow

c

c’=∏(c)

Bob

m=BDec(c’)

c=BEnc(m)
PDSG
NYU

14
Encryption BPF - Security
 BPF

Alice  Bob = UPF Alice  Bob +
UPF Bob  Alice
 Bidirectional proxy functions CCA:
 CCA secure against Alice when helped by Escrow
 CCA secure against Escrow when helped by Alice
 CCA secure against Bob when helped by Escrow
 CCA secure against Escrow when helped by Bob
 Similarly,

PDSG
NYU

we can define CPA and OW security.
15
Generic Encryption BPF
Key distribution

EK1,EK2,EK3
DK1,DK2

DK2,DK3

Alice
DK1,DK2

D1

D2

E1

E2

PDSG
NYU

DK3,DK1

Escrow
DK2,DK3

D2

E3

Bob
DK3,DK1

D3

D1

E3

E1
16
Specialized Encryption BPF
El-Gamal (CPA)
EK1=gx1,EK2=gx2
DK1=x1
Alice

Key distribution
DK2=x2

x2-x1

Bob

Escrow
x2-x1

x1

x2

c’

m=c/grx1
c

c’=(gr,mgrx1gr(x2-x1))

m=c’/grx2

c=(gr,mgrx1)
PDSG
NYU

17
Signatures
 Signatures

schemes are similar to encryption

schemes.
 Signatures UPF
 S’ = ( UniGen , UniSig , UniVer , PSig , FSig )
 Generic UPF (UF-CMA)
 Specialized UPF – RSA-Hash
 Signatures

BPF

 S’ = ( BiGen , BiSig , BiVer , Π )
 Generic Signatures BPF
PDSG
NYU

18
Conclusions
 Start

from the problem formulated in [BlSt98]
 Created formal model and security definitions
 Designed simple schemes
 Encryption & Signatures; UPF/BPF; Generic and Specialized
 Future work:
 Generic schemes have a factor of two slowdown compared to
classic schemes.
 Specialized schemes eliminate the slowdown, but could not
create specialized schemes for all classic schemes (e.g.
Cramer-Shoup).
 Better scalability to multi-user setting.
 Natural asymmetric proxy functions.

PDSG
NYU

19
Thank you.
http://www.cs.nyu.edu/ivan/papers.htm

PDSG
NYU

20
Scenario 1:
President

Vice-president 1
PDSG
NYU

I am going away
for one week. Please
cooperate.

Vice-president 2
21
Unidirectional vs. Bidirectional





Scenario 1: Can the vice-presidents have “meaningful” keys?
Scenario 2: Can the FBI have a “meaningful” key?
A “meaningful” key is a key that can be used by itself for
signature/encryption.
Unidirectional:
 “Meaningful” KU  KF , KP s.t. both KF and KP have no meaning on their

own.
 FBI and Proxy should not be able to attack the User without cooperation.


Bidirectional:
 “Meaningful” KU , KF  KP s.t. only KP has no “meaning”
 FBI and Proxy should not be able to attack the User without cooperation.
 User and Proxy should not be able to attack the FBI without cooperation.
PDSG
NYU

22
Encryption proxy functions

Bidirectional

c1=EncU(m1)

U(DKU): m1=DecU(c1)
m2=DecU(c’2)

Unidirectional

c1=EncU(m1)

U(DKU): m1=DecU(c1)

F(DKF): m1=DecF(c’1)
m2=DecF(c2)

PDSG
NYU

c2=EncF(m2)

P(K’P): c’1= f(c1)

F(K’F): m1=g(c’1)

P(K”P): c2’= f(c2)

P(KPP): c’12= Π PP(c12))
P(K ): c’ = Π (c

U(K”U): m2=g(c’2)

c2=EncF(m2)

F(DKF): m2=DecF(c2)

23
Signature proxy functions

Bidirectional

T=VerU(s1)

Unidirectional

U(SKU): s1=SigU(m1)
s’2=SigU(m2)

T=VerU(s1)

U(SKU): s1=SigU(m1)

F(SKF): s’1=SigF(m1)
s2=SigF(m2)

PDSG
NYU

T=VerF(s2)

P(K’P): s1= f(s’1)

F(K’F): s’1=g(m1)

P(K”P): s2= f(s’2)

P(KPP): ss12= Π PP(s’12))
P(K ): = Π (s’

U(K”U): s’2=g(m2)

T=VerF(s2)

F(DKF): s2=SigF(m2)

24
Specialized Encryption UPF
El-Gamal (CPA), RSA (OW), BF-IBE (IB-CPA)
RSA: E = ( Gen, Enc(m) = me mod n, Dec(c) = cd
mod n )
 Idea: split the secret key into two shares.
 ( EKU , DKU )  Gen
 EKU = e ; DKU = d = d1 * d2 ; KP = d1 KF = d2
DKU=d1 * d2
 UEnc( m ) = Enc(m ) = me mod n
 UDec( c ) = Dec( c ) = ce mod n
 f( c ) = cd2 mod n = c’ ; p( c’ ) = cd1 mod n
 f( p( Enc( m ) ) ) = m
KP=d1
KF =d2
 RSA-UPF is unidirectionally OW secure.
 Open problem: design scheme for Cramer-Shoup
(CCA)


PDSG
NYU

25
Generic Encryption BPF


Idea: P “re-encrypts” c = Enc(m) with a key
shared by U and F.
DK1,DK2









E = ( Gen , Enc , Dec )
BiGen:
( EK1,DK1, EK2,DK2, EK3,DK3)  Gen ;
DKU = ( DK1,DK2 ) ; DKF = ( DK2,DK3 ) ;
KP = ( DK1,DK3 )
BiEnc(m) = Enc1( Enc2( m ) ) = c
BiDec(c) = Dec2( Dec1 ( c ) ) = m
Π( c ) = Enc3( Dec1(c ) ) = c’
E’ is
PDSG bidirectionally
NYU
secure.

DK1,DK3

CCA2 secure if E is CCA2

DK3,DK2

26
Specialized Encryption BPF


El-Gamal (CPA):
 E = ( Gen, Enc(m) = ( gr , grx m ), Dec(c)= grxm/(gr)x )
 ( EKU = gx1, DKU = x1 )  Gen ; ( EKF = gx2 ,DKF = x2 )  Gen ;
 KP = DKF – DKU = x2-x1
 BiEncU( m ) = EncU(m ) = ( gr , grx1 m )
 BiDecU( c ) = DecU( c ) = grx1m/(gr)x1
 ΠP( BiEncU( m ) ) = ( gr , grx1 m gr(x2-x1) ) = (gr , grx2m)
 BiDecF( ΠP( BiEncU( m ) ) ) = m
 El-Gamal-BPF is bidirectionally CPA secure.



Note: RSA cannot be made bidirectional (because of factorization). In the
case of El-Gamal, it is safe to publish the public keys.
PDSG
NYU

27

Contenu connexe

Similaire à Proxy cryptography Anca-Andreea Ivan , Yevgeniy Dodis

EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY
EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITYEFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY
EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITYIJNSA Journal
 
Eos - Efficient Private Delegation of zkSNARK provers
Eos  - Efficient Private Delegation of zkSNARK proversEos  - Efficient Private Delegation of zkSNARK provers
Eos - Efficient Private Delegation of zkSNARK proversAlex Pruden
 
Paillier-ElGamal cryptosystem presentation
Paillier-ElGamal cryptosystem presentationPaillier-ElGamal cryptosystem presentation
Paillier-ElGamal cryptosystem presentationGauthamSK4
 
Detailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsDetailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsChristian Spolaore
 
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...IJNSA Journal
 
Analysis of Searchable Encryption
Analysis of Searchable EncryptionAnalysis of Searchable Encryption
Analysis of Searchable EncryptionNagendra Posani
 
Take Two Curves and Call Me in the Morning: The Story of the NSAs Dual_EC_DRB...
Take Two Curves and Call Me in the Morning: The Story of the NSAs Dual_EC_DRB...Take Two Curves and Call Me in the Morning: The Story of the NSAs Dual_EC_DRB...
Take Two Curves and Call Me in the Morning: The Story of the NSAs Dual_EC_DRB...Khaled El Emam
 
Lecture01-Modeling and Coding-P2.pdf
Lecture01-Modeling and Coding-P2.pdfLecture01-Modeling and Coding-P2.pdf
Lecture01-Modeling and Coding-P2.pdfssuserb4d806
 

Similaire à Proxy cryptography Anca-Andreea Ivan , Yevgeniy Dodis (9)

EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY
EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITYEFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY
EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY
 
Eos - Efficient Private Delegation of zkSNARK provers
Eos  - Efficient Private Delegation of zkSNARK proversEos  - Efficient Private Delegation of zkSNARK provers
Eos - Efficient Private Delegation of zkSNARK provers
 
HEpres2.ppt
HEpres2.pptHEpres2.ppt
HEpres2.ppt
 
Paillier-ElGamal cryptosystem presentation
Paillier-ElGamal cryptosystem presentationPaillier-ElGamal cryptosystem presentation
Paillier-ElGamal cryptosystem presentation
 
Detailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsDetailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocols
 
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
 
Analysis of Searchable Encryption
Analysis of Searchable EncryptionAnalysis of Searchable Encryption
Analysis of Searchable Encryption
 
Take Two Curves and Call Me in the Morning: The Story of the NSAs Dual_EC_DRB...
Take Two Curves and Call Me in the Morning: The Story of the NSAs Dual_EC_DRB...Take Two Curves and Call Me in the Morning: The Story of the NSAs Dual_EC_DRB...
Take Two Curves and Call Me in the Morning: The Story of the NSAs Dual_EC_DRB...
 
Lecture01-Modeling and Coding-P2.pdf
Lecture01-Modeling and Coding-P2.pdfLecture01-Modeling and Coding-P2.pdf
Lecture01-Modeling and Coding-P2.pdf
 

Plus de Information Security Awareness Group

Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...Information Security Awareness Group
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...Information Security Awareness Group
 
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Information Security Awareness Group
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Information Security Awareness Group
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceInformation Security Awareness Group
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...Information Security Awareness Group
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Information Security Awareness Group
 
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...Information Security Awareness Group
 
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Information Security Awareness Group
 

Plus de Information Security Awareness Group (20)

Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security Alliance
 
Big data analysis concepts and references
Big data analysis concepts and referencesBig data analysis concepts and references
Big data analysis concepts and references
 
PKI by Tim Polk
PKI by Tim PolkPKI by Tim Polk
PKI by Tim Polk
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 
Pki by Steve Lamb
Pki by Steve LambPki by Steve Lamb
Pki by Steve Lamb
 
PKI by Gene Itkis
PKI by Gene ItkisPKI by Gene Itkis
PKI by Gene Itkis
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...
 
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
 
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
 
THE OPEN SCIENCE GRID Ruth Pordes
THE OPEN SCIENCE GRID Ruth PordesTHE OPEN SCIENCE GRID Ruth Pordes
THE OPEN SCIENCE GRID Ruth Pordes
 
Open Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob CowlesOpen Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob Cowles
 
Security Open Science Grid Doug Olson
Security Open Science Grid Doug OlsonSecurity Open Science Grid Doug Olson
Security Open Science Grid Doug Olson
 
Open Science Group Security Kevin Hill
Open Science Group Security Kevin HillOpen Science Group Security Kevin Hill
Open Science Group Security Kevin Hill
 
Xrootd proxies Andrew Hanushevsky
Xrootd proxies Andrew HanushevskyXrootd proxies Andrew Hanushevsky
Xrootd proxies Andrew Hanushevsky
 
Privilege Project Vikram Andem
Privilege Project Vikram AndemPrivilege Project Vikram Andem
Privilege Project Vikram Andem
 

Dernier

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Dernier (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Proxy cryptography Anca-Andreea Ivan , Yevgeniy Dodis

  • 1. Proxy Cryptography Revisited Anca-Andreea Ivan , Yevgeniy Dodis New York University NDSS 2003 PDSG NYU 1
  • 2. Outline of the talk  Introduction – What and Why?  Related work  Unidirectional (UPF ) vs. Bidirectional (BPF)  Encryption UPF  Encryption BPF  Signature UPF & BPF  Conclusions PDSG NYU 2
  • 3. Introduction  Problem:  Allow Bob to decrypt ciphertext or sign messages on behalf of Alice, without knowing the secret key of Alice.  Solution:  Third party (Escrow) helps Bob  Proxy functions  Our goal:  Formalize and clarify the notion proxy functions  Construct simple schemes satisfying the formal definitions PDSG NYU 3
  • 4. Scenario: Key Escrow User Escrow (ISP) PDSG NYU FBI I have a warrant to monitor email for one week. 4
  • 5. Scenario: Key Escrow User Escrow (ISP) PDSG NYU FBI I have a warrant to monitor email for one week. 5
  • 6. Related work  Atomic proxy functions [BlSt98]  Mobile agents proxy signatures [KBKL01,LKK01]  Proxy signature is different from original signature  Two-party signatures [BeSa02,MR01a,MR01b,NKDM03]  Interactive protocols  Two-party encryption [Mac03]  Interactive protocols  Threshold cryptography [Des89,…] PDSG NYU 6
  • 7. Blaze/Strauss scheme – closer look [BlSt98]  Informal definition for encryption/signature proxy functions  Try to modify existing cryptographic primitives to satisfy the definitions  Result:  Weak security guarantees  Semi-formal implementations  El-Gamal encryption  Modified Fiat-Shamir signatures PDSG NYU [IvDo03]  Starting with the problem at hand, create formal model and definitions  Design simple, possibly new schemes that satisfy the definitions  Result:  Strong, formal security guarantees  Encryption and signatures (…)  Unidirectional and bidirectional 7
  • 8. Unidirectional proxy function (UPF) Key distribution Alice PDSG NYU Escrow Bob 8
  • 9. Bidirectional proxy function (BPF) Key distribution Alice PDSG NYU Escrow Bob 9
  • 10. Definition of UPF Encryption Key distribution Alice Escrow Bob UDec UEnc PDSG NYU c’=p(c) c=UEnc(m) m=f(c’) 10
  • 11. Encryption UPF - Security  Classic CCA: “The only way to decrypt c = Enc(m) of an unknown message m, is to ask the decryptor to decrypt c.”  Unidirectional proxy functions CCA:  CCA secure against Bob when helped by Escrow: “The only way for Bob to decrypt c = Enc(m) of an unknown message m is by asking Escrow to transform c with p(c).”  CCA secure against Escrow when helped by Bob: “The only way for Escrow to decrypt c = Enc(m) of an unknown message m is to ask Bob to decrypt c’ = f(c) .”  Similarly, PDSG NYU we can define CPA and OW security. 11
  • 12. Generic Encryption UPF EK1,EK2 Key distribution DK1 DK1,DK2 Alice DK1,DK2 D2 D1 E2 Escrow DK1 c=E1(E2(m)) DK2 Bob DK2 E1 PDSG NYU c’=D1(c) m=D2(c’) 12
  • 13. Specialized UPF Encryption El-Gamal (CPA), RSA (OW), BF-IBE (IB-CPA) Key distribution EK=e d1 DK=d=d1*d2 Alice d=d1 * d2 m=cd mod n Bob Escrow d1 c d2 c’=cd1 mod n d2 m=c’d2 mod n c=me mod n PDSG NYU 13
  • 14. Definition of BPF Encryption Key distribution Alice m=BDec(c) Escrow c c’=∏(c) Bob m=BDec(c’) c=BEnc(m) PDSG NYU 14
  • 15. Encryption BPF - Security  BPF Alice  Bob = UPF Alice  Bob + UPF Bob  Alice  Bidirectional proxy functions CCA:  CCA secure against Alice when helped by Escrow  CCA secure against Escrow when helped by Alice  CCA secure against Bob when helped by Escrow  CCA secure against Escrow when helped by Bob  Similarly, PDSG NYU we can define CPA and OW security. 15
  • 16. Generic Encryption BPF Key distribution EK1,EK2,EK3 DK1,DK2 DK2,DK3 Alice DK1,DK2 D1 D2 E1 E2 PDSG NYU DK3,DK1 Escrow DK2,DK3 D2 E3 Bob DK3,DK1 D3 D1 E3 E1 16
  • 17. Specialized Encryption BPF El-Gamal (CPA) EK1=gx1,EK2=gx2 DK1=x1 Alice Key distribution DK2=x2 x2-x1 Bob Escrow x2-x1 x1 x2 c’ m=c/grx1 c c’=(gr,mgrx1gr(x2-x1)) m=c’/grx2 c=(gr,mgrx1) PDSG NYU 17
  • 18. Signatures  Signatures schemes are similar to encryption schemes.  Signatures UPF  S’ = ( UniGen , UniSig , UniVer , PSig , FSig )  Generic UPF (UF-CMA)  Specialized UPF – RSA-Hash  Signatures BPF  S’ = ( BiGen , BiSig , BiVer , Π )  Generic Signatures BPF PDSG NYU 18
  • 19. Conclusions  Start from the problem formulated in [BlSt98]  Created formal model and security definitions  Designed simple schemes  Encryption & Signatures; UPF/BPF; Generic and Specialized  Future work:  Generic schemes have a factor of two slowdown compared to classic schemes.  Specialized schemes eliminate the slowdown, but could not create specialized schemes for all classic schemes (e.g. Cramer-Shoup).  Better scalability to multi-user setting.  Natural asymmetric proxy functions. PDSG NYU 19
  • 21. Scenario 1: President Vice-president 1 PDSG NYU I am going away for one week. Please cooperate. Vice-president 2 21
  • 22. Unidirectional vs. Bidirectional     Scenario 1: Can the vice-presidents have “meaningful” keys? Scenario 2: Can the FBI have a “meaningful” key? A “meaningful” key is a key that can be used by itself for signature/encryption. Unidirectional:  “Meaningful” KU  KF , KP s.t. both KF and KP have no meaning on their own.  FBI and Proxy should not be able to attack the User without cooperation.  Bidirectional:  “Meaningful” KU , KF  KP s.t. only KP has no “meaning”  FBI and Proxy should not be able to attack the User without cooperation.  User and Proxy should not be able to attack the FBI without cooperation. PDSG NYU 22
  • 23. Encryption proxy functions Bidirectional c1=EncU(m1) U(DKU): m1=DecU(c1) m2=DecU(c’2) Unidirectional c1=EncU(m1) U(DKU): m1=DecU(c1) F(DKF): m1=DecF(c’1) m2=DecF(c2) PDSG NYU c2=EncF(m2) P(K’P): c’1= f(c1) F(K’F): m1=g(c’1) P(K”P): c2’= f(c2) P(KPP): c’12= Π PP(c12)) P(K ): c’ = Π (c U(K”U): m2=g(c’2) c2=EncF(m2) F(DKF): m2=DecF(c2) 23
  • 24. Signature proxy functions Bidirectional T=VerU(s1) Unidirectional U(SKU): s1=SigU(m1) s’2=SigU(m2) T=VerU(s1) U(SKU): s1=SigU(m1) F(SKF): s’1=SigF(m1) s2=SigF(m2) PDSG NYU T=VerF(s2) P(K’P): s1= f(s’1) F(K’F): s’1=g(m1) P(K”P): s2= f(s’2) P(KPP): ss12= Π PP(s’12)) P(K ): = Π (s’ U(K”U): s’2=g(m2) T=VerF(s2) F(DKF): s2=SigF(m2) 24
  • 25. Specialized Encryption UPF El-Gamal (CPA), RSA (OW), BF-IBE (IB-CPA) RSA: E = ( Gen, Enc(m) = me mod n, Dec(c) = cd mod n )  Idea: split the secret key into two shares.  ( EKU , DKU )  Gen  EKU = e ; DKU = d = d1 * d2 ; KP = d1 KF = d2 DKU=d1 * d2  UEnc( m ) = Enc(m ) = me mod n  UDec( c ) = Dec( c ) = ce mod n  f( c ) = cd2 mod n = c’ ; p( c’ ) = cd1 mod n  f( p( Enc( m ) ) ) = m KP=d1 KF =d2  RSA-UPF is unidirectionally OW secure.  Open problem: design scheme for Cramer-Shoup (CCA)  PDSG NYU 25
  • 26. Generic Encryption BPF  Idea: P “re-encrypts” c = Enc(m) with a key shared by U and F. DK1,DK2       E = ( Gen , Enc , Dec ) BiGen: ( EK1,DK1, EK2,DK2, EK3,DK3)  Gen ; DKU = ( DK1,DK2 ) ; DKF = ( DK2,DK3 ) ; KP = ( DK1,DK3 ) BiEnc(m) = Enc1( Enc2( m ) ) = c BiDec(c) = Dec2( Dec1 ( c ) ) = m Π( c ) = Enc3( Dec1(c ) ) = c’ E’ is PDSG bidirectionally NYU secure. DK1,DK3 CCA2 secure if E is CCA2 DK3,DK2 26
  • 27. Specialized Encryption BPF  El-Gamal (CPA):  E = ( Gen, Enc(m) = ( gr , grx m ), Dec(c)= grxm/(gr)x )  ( EKU = gx1, DKU = x1 )  Gen ; ( EKF = gx2 ,DKF = x2 )  Gen ;  KP = DKF – DKU = x2-x1  BiEncU( m ) = EncU(m ) = ( gr , grx1 m )  BiDecU( c ) = DecU( c ) = grx1m/(gr)x1  ΠP( BiEncU( m ) ) = ( gr , grx1 m gr(x2-x1) ) = (gr , grx2m)  BiDecF( ΠP( BiEncU( m ) ) ) = m  El-Gamal-BPF is bidirectionally CPA secure.  Note: RSA cannot be made bidirectional (because of factorization). In the case of El-Gamal, it is safe to publish the public keys. PDSG NYU 27

Notes de l'éditeur

  1. Our work is closely related to two-party non-interactive one-round threshold cryptography.
  2. It is not necessary to design schemes equivalent to “natural” one-party schemes. In fact, it is hard to modify existing schemes to make them accomplish this goal.
  3. We do not focus on ket distribution.
  4. We do not look into key distribution issues.
  5. We do not look into key distribution issues.
  6. IDEA belongs to Boyd.