SlideShare una empresa de Scribd logo
1 de 27
Proxy Cryptography Revisited
Anca-Andreea Ivan , Yevgeniy Dodis
New York University
NDSS 2003
PDSG
NYU

1
Outline of the talk
 Introduction

– What and Why?
 Related work
 Unidirectional (UPF ) vs. Bidirectional (BPF)
 Encryption UPF
 Encryption BPF
 Signature UPF & BPF
 Conclusions

PDSG
NYU

2
Introduction
 Problem:

 Allow Bob to decrypt ciphertext or sign messages on behalf
of Alice, without knowing the secret key of Alice.
 Solution:

 Third party (Escrow) helps Bob
 Proxy functions
 Our goal:
 Formalize and clarify the notion proxy functions
 Construct simple schemes satisfying the formal definitions
PDSG
NYU

3
Scenario: Key Escrow
User

Escrow
(ISP)
PDSG
NYU

FBI

I have a warrant
to monitor email
for one week.
4
Scenario: Key Escrow
User

Escrow
(ISP)
PDSG
NYU

FBI

I have a warrant
to monitor email
for one week.
5
Related work
 Atomic

proxy functions [BlSt98]
 Mobile agents proxy signatures [KBKL01,LKK01]
 Proxy signature is different from original signature
 Two-party signatures [BeSa02,MR01a,MR01b,NKDM03]
 Interactive protocols
 Two-party encryption [Mac03]
 Interactive protocols
 Threshold cryptography [Des89,…]
PDSG
NYU

6
Blaze/Strauss scheme – closer look
[BlSt98]
 Informal definition for
encryption/signature proxy
functions
 Try to modify existing
cryptographic primitives to satisfy
the definitions
 Result:
 Weak security guarantees
 Semi-formal implementations
 El-Gamal encryption
 Modified Fiat-Shamir
signatures
PDSG
NYU

[IvDo03]
 Starting with the problem at hand,
create formal model and
definitions
 Design simple, possibly new
schemes that satisfy the definitions
 Result:
 Strong, formal security
guarantees
 Encryption and signatures (…)
 Unidirectional and
bidirectional

7
Unidirectional proxy function (UPF)
Key distribution

Alice

PDSG
NYU

Escrow

Bob

8
Bidirectional proxy function (BPF)
Key distribution

Alice

PDSG
NYU

Escrow

Bob

9
Definition of UPF Encryption
Key distribution

Alice

Escrow

Bob

UDec
UEnc
PDSG
NYU

c’=p(c)
c=UEnc(m)

m=f(c’)

10
Encryption UPF - Security
 Classic

CCA: “The only way to decrypt c = Enc(m) of an
unknown message m, is to ask the decryptor to decrypt c.”
 Unidirectional proxy functions CCA:
 CCA secure against Bob when helped by Escrow: “The only
way for Bob to decrypt c = Enc(m) of an unknown message
m is by asking Escrow to transform c with p(c).”
 CCA secure against Escrow when helped by Bob: “The only
way for Escrow to decrypt c = Enc(m) of an unknown
message m is to ask Bob to decrypt c’ = f(c) .”
 Similarly,
PDSG
NYU

we can define CPA and OW security.
11
Generic Encryption UPF
EK1,EK2

Key distribution
DK1

DK1,DK2

Alice
DK1,DK2

D2

D1

E2

Escrow
DK1

c=E1(E2(m))

DK2

Bob
DK2

E1

PDSG
NYU

c’=D1(c)

m=D2(c’)

12
Specialized UPF Encryption
El-Gamal (CPA), RSA (OW), BF-IBE (IB-CPA)
Key distribution

EK=e

d1
DK=d=d1*d2

Alice
d=d1 * d2
m=cd mod n

Bob

Escrow
d1

c

d2

c’=cd1 mod n

d2

m=c’d2 mod n

c=me mod n
PDSG
NYU

13
Definition of BPF Encryption
Key distribution

Alice

m=BDec(c)

Escrow

c

c’=∏(c)

Bob

m=BDec(c’)

c=BEnc(m)
PDSG
NYU

14
Encryption BPF - Security
 BPF

Alice  Bob = UPF Alice  Bob +
UPF Bob  Alice
 Bidirectional proxy functions CCA:
 CCA secure against Alice when helped by Escrow
 CCA secure against Escrow when helped by Alice
 CCA secure against Bob when helped by Escrow
 CCA secure against Escrow when helped by Bob
 Similarly,

PDSG
NYU

we can define CPA and OW security.
15
Generic Encryption BPF
Key distribution

EK1,EK2,EK3
DK1,DK2

DK2,DK3

Alice
DK1,DK2

D1

D2

E1

E2

PDSG
NYU

DK3,DK1

Escrow
DK2,DK3

D2

E3

Bob
DK3,DK1

D3

D1

E3

E1
16
Specialized Encryption BPF
El-Gamal (CPA)
EK1=gx1,EK2=gx2
DK1=x1
Alice

Key distribution
DK2=x2

x2-x1

Bob

Escrow
x2-x1

x1

x2

c’

m=c/grx1
c

c’=(gr,mgrx1gr(x2-x1))

m=c’/grx2

c=(gr,mgrx1)
PDSG
NYU

17
Signatures
 Signatures

schemes are similar to encryption

schemes.
 Signatures UPF
 S’ = ( UniGen , UniSig , UniVer , PSig , FSig )
 Generic UPF (UF-CMA)
 Specialized UPF – RSA-Hash
 Signatures

BPF

 S’ = ( BiGen , BiSig , BiVer , Π )
 Generic Signatures BPF
PDSG
NYU

18
Conclusions
 Start

from the problem formulated in [BlSt98]
 Created formal model and security definitions
 Designed simple schemes
 Encryption & Signatures; UPF/BPF; Generic and Specialized
 Future work:
 Generic schemes have a factor of two slowdown compared to
classic schemes.
 Specialized schemes eliminate the slowdown, but could not
create specialized schemes for all classic schemes (e.g.
Cramer-Shoup).
 Better scalability to multi-user setting.
 Natural asymmetric proxy functions.

PDSG
NYU

19
Thank you.
http://www.cs.nyu.edu/ivan/papers.htm

PDSG
NYU

20
Scenario 1:
President

Vice-president 1
PDSG
NYU

I am going away
for one week. Please
cooperate.

Vice-president 2
21
Unidirectional vs. Bidirectional





Scenario 1: Can the vice-presidents have “meaningful” keys?
Scenario 2: Can the FBI have a “meaningful” key?
A “meaningful” key is a key that can be used by itself for
signature/encryption.
Unidirectional:
 “Meaningful” KU  KF , KP s.t. both KF and KP have no meaning on their

own.
 FBI and Proxy should not be able to attack the User without cooperation.


Bidirectional:
 “Meaningful” KU , KF  KP s.t. only KP has no “meaning”
 FBI and Proxy should not be able to attack the User without cooperation.
 User and Proxy should not be able to attack the FBI without cooperation.
PDSG
NYU

22
Encryption proxy functions

Bidirectional

c1=EncU(m1)

U(DKU): m1=DecU(c1)
m2=DecU(c’2)

Unidirectional

c1=EncU(m1)

U(DKU): m1=DecU(c1)

F(DKF): m1=DecF(c’1)
m2=DecF(c2)

PDSG
NYU

c2=EncF(m2)

P(K’P): c’1= f(c1)

F(K’F): m1=g(c’1)

P(K”P): c2’= f(c2)

P(KPP): c’12= Π PP(c12))
P(K ): c’ = Π (c

U(K”U): m2=g(c’2)

c2=EncF(m2)

F(DKF): m2=DecF(c2)

23
Signature proxy functions

Bidirectional

T=VerU(s1)

Unidirectional

U(SKU): s1=SigU(m1)
s’2=SigU(m2)

T=VerU(s1)

U(SKU): s1=SigU(m1)

F(SKF): s’1=SigF(m1)
s2=SigF(m2)

PDSG
NYU

T=VerF(s2)

P(K’P): s1= f(s’1)

F(K’F): s’1=g(m1)

P(K”P): s2= f(s’2)

P(KPP): ss12= Π PP(s’12))
P(K ): = Π (s’

U(K”U): s’2=g(m2)

T=VerF(s2)

F(DKF): s2=SigF(m2)

24
Specialized Encryption UPF
El-Gamal (CPA), RSA (OW), BF-IBE (IB-CPA)
RSA: E = ( Gen, Enc(m) = me mod n, Dec(c) = cd
mod n )
 Idea: split the secret key into two shares.
 ( EKU , DKU )  Gen
 EKU = e ; DKU = d = d1 * d2 ; KP = d1 KF = d2
DKU=d1 * d2
 UEnc( m ) = Enc(m ) = me mod n
 UDec( c ) = Dec( c ) = ce mod n
 f( c ) = cd2 mod n = c’ ; p( c’ ) = cd1 mod n
 f( p( Enc( m ) ) ) = m
KP=d1
KF =d2
 RSA-UPF is unidirectionally OW secure.
 Open problem: design scheme for Cramer-Shoup
(CCA)


PDSG
NYU

25
Generic Encryption BPF


Idea: P “re-encrypts” c = Enc(m) with a key
shared by U and F.
DK1,DK2









E = ( Gen , Enc , Dec )
BiGen:
( EK1,DK1, EK2,DK2, EK3,DK3)  Gen ;
DKU = ( DK1,DK2 ) ; DKF = ( DK2,DK3 ) ;
KP = ( DK1,DK3 )
BiEnc(m) = Enc1( Enc2( m ) ) = c
BiDec(c) = Dec2( Dec1 ( c ) ) = m
Π( c ) = Enc3( Dec1(c ) ) = c’
E’ is
PDSG bidirectionally
NYU
secure.

DK1,DK3

CCA2 secure if E is CCA2

DK3,DK2

26
Specialized Encryption BPF


El-Gamal (CPA):
 E = ( Gen, Enc(m) = ( gr , grx m ), Dec(c)= grxm/(gr)x )
 ( EKU = gx1, DKU = x1 )  Gen ; ( EKF = gx2 ,DKF = x2 )  Gen ;
 KP = DKF – DKU = x2-x1
 BiEncU( m ) = EncU(m ) = ( gr , grx1 m )
 BiDecU( c ) = DecU( c ) = grx1m/(gr)x1
 ΠP( BiEncU( m ) ) = ( gr , grx1 m gr(x2-x1) ) = (gr , grx2m)
 BiDecF( ΠP( BiEncU( m ) ) ) = m
 El-Gamal-BPF is bidirectionally CPA secure.



Note: RSA cannot be made bidirectional (because of factorization). In the
case of El-Gamal, it is safe to publish the public keys.
PDSG
NYU

27

Más contenido relacionado

Similar a Proxy cryptography Anca-Andreea Ivan , Yevgeniy Dodis

EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY
EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITYEFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY
EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITYIJNSA Journal
 
Eos - Efficient Private Delegation of zkSNARK provers
Eos  - Efficient Private Delegation of zkSNARK proversEos  - Efficient Private Delegation of zkSNARK provers
Eos - Efficient Private Delegation of zkSNARK proversAlex Pruden
 
Paillier-ElGamal cryptosystem presentation
Paillier-ElGamal cryptosystem presentationPaillier-ElGamal cryptosystem presentation
Paillier-ElGamal cryptosystem presentationGauthamSK4
 
Detailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsDetailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsChristian Spolaore
 
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...IJNSA Journal
 
Analysis of Searchable Encryption
Analysis of Searchable EncryptionAnalysis of Searchable Encryption
Analysis of Searchable EncryptionNagendra Posani
 
Take Two Curves and Call Me in the Morning: The Story of the NSAs Dual_EC_DRB...
Take Two Curves and Call Me in the Morning: The Story of the NSAs Dual_EC_DRB...Take Two Curves and Call Me in the Morning: The Story of the NSAs Dual_EC_DRB...
Take Two Curves and Call Me in the Morning: The Story of the NSAs Dual_EC_DRB...Khaled El Emam
 
Lecture01-Modeling and Coding-P2.pdf
Lecture01-Modeling and Coding-P2.pdfLecture01-Modeling and Coding-P2.pdf
Lecture01-Modeling and Coding-P2.pdfssuserb4d806
 

Similar a Proxy cryptography Anca-Andreea Ivan , Yevgeniy Dodis (9)

EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY
EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITYEFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY
EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY
 
Eos - Efficient Private Delegation of zkSNARK provers
Eos  - Efficient Private Delegation of zkSNARK proversEos  - Efficient Private Delegation of zkSNARK provers
Eos - Efficient Private Delegation of zkSNARK provers
 
HEpres2.ppt
HEpres2.pptHEpres2.ppt
HEpres2.ppt
 
Paillier-ElGamal cryptosystem presentation
Paillier-ElGamal cryptosystem presentationPaillier-ElGamal cryptosystem presentation
Paillier-ElGamal cryptosystem presentation
 
Detailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsDetailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocols
 
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
 
Analysis of Searchable Encryption
Analysis of Searchable EncryptionAnalysis of Searchable Encryption
Analysis of Searchable Encryption
 
Take Two Curves and Call Me in the Morning: The Story of the NSAs Dual_EC_DRB...
Take Two Curves and Call Me in the Morning: The Story of the NSAs Dual_EC_DRB...Take Two Curves and Call Me in the Morning: The Story of the NSAs Dual_EC_DRB...
Take Two Curves and Call Me in the Morning: The Story of the NSAs Dual_EC_DRB...
 
Lecture01-Modeling and Coding-P2.pdf
Lecture01-Modeling and Coding-P2.pdfLecture01-Modeling and Coding-P2.pdf
Lecture01-Modeling and Coding-P2.pdf
 

Más de Information Security Awareness Group

Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...Information Security Awareness Group
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...Information Security Awareness Group
 
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Information Security Awareness Group
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Information Security Awareness Group
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceInformation Security Awareness Group
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...Information Security Awareness Group
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Information Security Awareness Group
 
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...Information Security Awareness Group
 
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Information Security Awareness Group
 

Más de Information Security Awareness Group (20)

Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security Alliance
 
Big data analysis concepts and references
Big data analysis concepts and referencesBig data analysis concepts and references
Big data analysis concepts and references
 
PKI by Tim Polk
PKI by Tim PolkPKI by Tim Polk
PKI by Tim Polk
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 
Pki by Steve Lamb
Pki by Steve LambPki by Steve Lamb
Pki by Steve Lamb
 
PKI by Gene Itkis
PKI by Gene ItkisPKI by Gene Itkis
PKI by Gene Itkis
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...
 
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
 
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
 
THE OPEN SCIENCE GRID Ruth Pordes
THE OPEN SCIENCE GRID Ruth PordesTHE OPEN SCIENCE GRID Ruth Pordes
THE OPEN SCIENCE GRID Ruth Pordes
 
Open Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob CowlesOpen Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob Cowles
 
Security Open Science Grid Doug Olson
Security Open Science Grid Doug OlsonSecurity Open Science Grid Doug Olson
Security Open Science Grid Doug Olson
 
Open Science Group Security Kevin Hill
Open Science Group Security Kevin HillOpen Science Group Security Kevin Hill
Open Science Group Security Kevin Hill
 
Xrootd proxies Andrew Hanushevsky
Xrootd proxies Andrew HanushevskyXrootd proxies Andrew Hanushevsky
Xrootd proxies Andrew Hanushevsky
 
Privilege Project Vikram Andem
Privilege Project Vikram AndemPrivilege Project Vikram Andem
Privilege Project Vikram Andem
 

Último

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Último (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Proxy cryptography Anca-Andreea Ivan , Yevgeniy Dodis

  • 1. Proxy Cryptography Revisited Anca-Andreea Ivan , Yevgeniy Dodis New York University NDSS 2003 PDSG NYU 1
  • 2. Outline of the talk  Introduction – What and Why?  Related work  Unidirectional (UPF ) vs. Bidirectional (BPF)  Encryption UPF  Encryption BPF  Signature UPF & BPF  Conclusions PDSG NYU 2
  • 3. Introduction  Problem:  Allow Bob to decrypt ciphertext or sign messages on behalf of Alice, without knowing the secret key of Alice.  Solution:  Third party (Escrow) helps Bob  Proxy functions  Our goal:  Formalize and clarify the notion proxy functions  Construct simple schemes satisfying the formal definitions PDSG NYU 3
  • 4. Scenario: Key Escrow User Escrow (ISP) PDSG NYU FBI I have a warrant to monitor email for one week. 4
  • 5. Scenario: Key Escrow User Escrow (ISP) PDSG NYU FBI I have a warrant to monitor email for one week. 5
  • 6. Related work  Atomic proxy functions [BlSt98]  Mobile agents proxy signatures [KBKL01,LKK01]  Proxy signature is different from original signature  Two-party signatures [BeSa02,MR01a,MR01b,NKDM03]  Interactive protocols  Two-party encryption [Mac03]  Interactive protocols  Threshold cryptography [Des89,…] PDSG NYU 6
  • 7. Blaze/Strauss scheme – closer look [BlSt98]  Informal definition for encryption/signature proxy functions  Try to modify existing cryptographic primitives to satisfy the definitions  Result:  Weak security guarantees  Semi-formal implementations  El-Gamal encryption  Modified Fiat-Shamir signatures PDSG NYU [IvDo03]  Starting with the problem at hand, create formal model and definitions  Design simple, possibly new schemes that satisfy the definitions  Result:  Strong, formal security guarantees  Encryption and signatures (…)  Unidirectional and bidirectional 7
  • 8. Unidirectional proxy function (UPF) Key distribution Alice PDSG NYU Escrow Bob 8
  • 9. Bidirectional proxy function (BPF) Key distribution Alice PDSG NYU Escrow Bob 9
  • 10. Definition of UPF Encryption Key distribution Alice Escrow Bob UDec UEnc PDSG NYU c’=p(c) c=UEnc(m) m=f(c’) 10
  • 11. Encryption UPF - Security  Classic CCA: “The only way to decrypt c = Enc(m) of an unknown message m, is to ask the decryptor to decrypt c.”  Unidirectional proxy functions CCA:  CCA secure against Bob when helped by Escrow: “The only way for Bob to decrypt c = Enc(m) of an unknown message m is by asking Escrow to transform c with p(c).”  CCA secure against Escrow when helped by Bob: “The only way for Escrow to decrypt c = Enc(m) of an unknown message m is to ask Bob to decrypt c’ = f(c) .”  Similarly, PDSG NYU we can define CPA and OW security. 11
  • 12. Generic Encryption UPF EK1,EK2 Key distribution DK1 DK1,DK2 Alice DK1,DK2 D2 D1 E2 Escrow DK1 c=E1(E2(m)) DK2 Bob DK2 E1 PDSG NYU c’=D1(c) m=D2(c’) 12
  • 13. Specialized UPF Encryption El-Gamal (CPA), RSA (OW), BF-IBE (IB-CPA) Key distribution EK=e d1 DK=d=d1*d2 Alice d=d1 * d2 m=cd mod n Bob Escrow d1 c d2 c’=cd1 mod n d2 m=c’d2 mod n c=me mod n PDSG NYU 13
  • 14. Definition of BPF Encryption Key distribution Alice m=BDec(c) Escrow c c’=∏(c) Bob m=BDec(c’) c=BEnc(m) PDSG NYU 14
  • 15. Encryption BPF - Security  BPF Alice  Bob = UPF Alice  Bob + UPF Bob  Alice  Bidirectional proxy functions CCA:  CCA secure against Alice when helped by Escrow  CCA secure against Escrow when helped by Alice  CCA secure against Bob when helped by Escrow  CCA secure against Escrow when helped by Bob  Similarly, PDSG NYU we can define CPA and OW security. 15
  • 16. Generic Encryption BPF Key distribution EK1,EK2,EK3 DK1,DK2 DK2,DK3 Alice DK1,DK2 D1 D2 E1 E2 PDSG NYU DK3,DK1 Escrow DK2,DK3 D2 E3 Bob DK3,DK1 D3 D1 E3 E1 16
  • 17. Specialized Encryption BPF El-Gamal (CPA) EK1=gx1,EK2=gx2 DK1=x1 Alice Key distribution DK2=x2 x2-x1 Bob Escrow x2-x1 x1 x2 c’ m=c/grx1 c c’=(gr,mgrx1gr(x2-x1)) m=c’/grx2 c=(gr,mgrx1) PDSG NYU 17
  • 18. Signatures  Signatures schemes are similar to encryption schemes.  Signatures UPF  S’ = ( UniGen , UniSig , UniVer , PSig , FSig )  Generic UPF (UF-CMA)  Specialized UPF – RSA-Hash  Signatures BPF  S’ = ( BiGen , BiSig , BiVer , Π )  Generic Signatures BPF PDSG NYU 18
  • 19. Conclusions  Start from the problem formulated in [BlSt98]  Created formal model and security definitions  Designed simple schemes  Encryption & Signatures; UPF/BPF; Generic and Specialized  Future work:  Generic schemes have a factor of two slowdown compared to classic schemes.  Specialized schemes eliminate the slowdown, but could not create specialized schemes for all classic schemes (e.g. Cramer-Shoup).  Better scalability to multi-user setting.  Natural asymmetric proxy functions. PDSG NYU 19
  • 21. Scenario 1: President Vice-president 1 PDSG NYU I am going away for one week. Please cooperate. Vice-president 2 21
  • 22. Unidirectional vs. Bidirectional     Scenario 1: Can the vice-presidents have “meaningful” keys? Scenario 2: Can the FBI have a “meaningful” key? A “meaningful” key is a key that can be used by itself for signature/encryption. Unidirectional:  “Meaningful” KU  KF , KP s.t. both KF and KP have no meaning on their own.  FBI and Proxy should not be able to attack the User without cooperation.  Bidirectional:  “Meaningful” KU , KF  KP s.t. only KP has no “meaning”  FBI and Proxy should not be able to attack the User without cooperation.  User and Proxy should not be able to attack the FBI without cooperation. PDSG NYU 22
  • 23. Encryption proxy functions Bidirectional c1=EncU(m1) U(DKU): m1=DecU(c1) m2=DecU(c’2) Unidirectional c1=EncU(m1) U(DKU): m1=DecU(c1) F(DKF): m1=DecF(c’1) m2=DecF(c2) PDSG NYU c2=EncF(m2) P(K’P): c’1= f(c1) F(K’F): m1=g(c’1) P(K”P): c2’= f(c2) P(KPP): c’12= Π PP(c12)) P(K ): c’ = Π (c U(K”U): m2=g(c’2) c2=EncF(m2) F(DKF): m2=DecF(c2) 23
  • 24. Signature proxy functions Bidirectional T=VerU(s1) Unidirectional U(SKU): s1=SigU(m1) s’2=SigU(m2) T=VerU(s1) U(SKU): s1=SigU(m1) F(SKF): s’1=SigF(m1) s2=SigF(m2) PDSG NYU T=VerF(s2) P(K’P): s1= f(s’1) F(K’F): s’1=g(m1) P(K”P): s2= f(s’2) P(KPP): ss12= Π PP(s’12)) P(K ): = Π (s’ U(K”U): s’2=g(m2) T=VerF(s2) F(DKF): s2=SigF(m2) 24
  • 25. Specialized Encryption UPF El-Gamal (CPA), RSA (OW), BF-IBE (IB-CPA) RSA: E = ( Gen, Enc(m) = me mod n, Dec(c) = cd mod n )  Idea: split the secret key into two shares.  ( EKU , DKU )  Gen  EKU = e ; DKU = d = d1 * d2 ; KP = d1 KF = d2 DKU=d1 * d2  UEnc( m ) = Enc(m ) = me mod n  UDec( c ) = Dec( c ) = ce mod n  f( c ) = cd2 mod n = c’ ; p( c’ ) = cd1 mod n  f( p( Enc( m ) ) ) = m KP=d1 KF =d2  RSA-UPF is unidirectionally OW secure.  Open problem: design scheme for Cramer-Shoup (CCA)  PDSG NYU 25
  • 26. Generic Encryption BPF  Idea: P “re-encrypts” c = Enc(m) with a key shared by U and F. DK1,DK2       E = ( Gen , Enc , Dec ) BiGen: ( EK1,DK1, EK2,DK2, EK3,DK3)  Gen ; DKU = ( DK1,DK2 ) ; DKF = ( DK2,DK3 ) ; KP = ( DK1,DK3 ) BiEnc(m) = Enc1( Enc2( m ) ) = c BiDec(c) = Dec2( Dec1 ( c ) ) = m Π( c ) = Enc3( Dec1(c ) ) = c’ E’ is PDSG bidirectionally NYU secure. DK1,DK3 CCA2 secure if E is CCA2 DK3,DK2 26
  • 27. Specialized Encryption BPF  El-Gamal (CPA):  E = ( Gen, Enc(m) = ( gr , grx m ), Dec(c)= grxm/(gr)x )  ( EKU = gx1, DKU = x1 )  Gen ; ( EKF = gx2 ,DKF = x2 )  Gen ;  KP = DKF – DKU = x2-x1  BiEncU( m ) = EncU(m ) = ( gr , grx1 m )  BiDecU( c ) = DecU( c ) = grx1m/(gr)x1  ΠP( BiEncU( m ) ) = ( gr , grx1 m gr(x2-x1) ) = (gr , grx2m)  BiDecF( ΠP( BiEncU( m ) ) ) = m  El-Gamal-BPF is bidirectionally CPA secure.  Note: RSA cannot be made bidirectional (because of factorization). In the case of El-Gamal, it is safe to publish the public keys. PDSG NYU 27

Notas del editor

  1. Our work is closely related to two-party non-interactive one-round threshold cryptography.
  2. It is not necessary to design schemes equivalent to “natural” one-party schemes. In fact, it is hard to modify existing schemes to make them accomplish this goal.
  3. We do not focus on ket distribution.
  4. We do not look into key distribution issues.
  5. We do not look into key distribution issues.
  6. IDEA belongs to Boyd.