SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
Jan Camenisch, Nathalie Casati, Thomas Gross and Victor Shoup
15 August 2010




Credential-Authenticated
Identification and Key Exchange




                                                                © 2009 IBM Corporation
IBM Presentation Template Full Version


Alice and Bob want to talk...




                                         CAKE
erasures                                          adaptive




2                                               © 2009 IBM Corporation
What to do with a CAKE?

                               PAKE




                               PAKE*




                          Secret Handshake




3                                            © 2009 IBM Corporation
IBM Presentation Template Full Version




           Problem                       Tools   Solution




4                                                     © 2009 IBM Corporation
IBM Presentation Template Full Version




           Problem



                                         What's the CAKE ideal functionality?

                                         What's key ideal world building block?

                                         What challenges to solve for CAKE?




5                                                                            © 2009 IBM Corporation
What's the Strong CAKE ideal functionality?




                  1. Await inputs
                  2. On


                   With         corruption
                                else




6                                             © 2009 IBM Corporation
What is the enhanced zero knowledge ideal functionality?    [Can2005]




                  1. On input
                     such that
                     send
                  2. Wait for
                  3. On input
                     send           to P



7                                                          © 2009 IBM Corporation
How to realize CAID protocols?

        How to overcome          How to construct
           dependency?               CAID?




                                         Protocols for
                                       useful relations?


                 How to
              realize   ?

8                                                          © 2009 IBM Corporation
IBM Presentation Template Full Version




               Tools


                                         How to bootstrap an authenticated
                                         channel?

                                         How to realize UC EZK?

                                         How to prove equality?




9                                                                            © 2009 IBM Corporation
How to bootstrap an authenticated channel?   [BCLPR2005]
                           Faites vos
                             jeux...




EITHER:                            OR:




10                                             © 2009 IBM Corporation
How to realize two-party split key exchange efficiently?




     DH KE




 Split Fn
                                                                ?
                                                              all
              Allows us to UC-realize split multi-
             session secure channels under DDH.
11                                                         © 2009 IBM Corporation
How to realize enhanced zero-knowledge?       [GaMaYa2003, JarLys2000]


                               CRS                        CRS'




                                          UCZK




               [GaMaYa2003]             [JarLys2000]
            Paillier encrypt         Committed proof
     Strong and commit                 [MacYan2003]
     RSA       Proof of              SSTC trapdoor
            representation            commitment
12                                                         © 2009 IBM Corporation
How to prove equality?                     [CraSho1998, JarLys2000]
                         Are secrets and
                              equal?

                    Non-committing encryption
     KeyGen                                            Random
      Encrypt                                               t




                                                             s
      Random
                                                         Mangle
         z

      Decrypt



                 UC-realize      for   under DDH
13
             assumption in the           hybrid model.   © 2009 IBM Corporation
IBM Presentation Template Full Version




           Solution


                                         How to put it all together?

                                         How to prove the protocols UC secure?




14                                                                        © 2009 IBM Corporation
How to put it together and prove it UC secure?


        CRS




                 DDH




         Strong CAID



15                                               © 2009 IBM Corporation
How to put it together and prove it UC secure?


        CRS                                      CRS



                                 SPLIT
                 DDH                                      DDH
                                                          CDH




         Strong CAID                                   CAID



16                                                              © 2009 IBM Corporation
Summary                                   [http://eprint.iacr.org/2010/055]

     Corruption   Adaptive corruptions with erasures
       Model

       System       of prime order , generator .
     Parameters   Joint access to CRS (for & UCZK realization)


                  CAID* for      : UC-secure under CDH.
      General     CAID* for      : UC-secure under DDH.
     Protocols    Split transformation to CAID.
                  Split multi-session KE: UC-secure under DDH


                  PAKE secure against adaptive corruptions, UC-
      Derived     secure under DDH, w/o ROM.
     Protocols    PAKE* secure against adaptive corruptions and
                  server compromise, UC-secure under DDH.
17                                                             © 2009 IBM Corporation
Jan Camenisch, Nathalie Casati, Thomas Gross and Victor Shoup
15 August 2010




Credential-Authenticated
Identification and Key Exchange
Speaker: Thomas Gross (thomasgross@acm.org, thomasgross.net)
Extended Version on IACR ePrint: http://eprint.iacr.org/2010/055




                                                                   © 2009 IBM Corporation
BACKUP




19       © 2009 IBM Corporation
How to realize CAID?




            Random                    Random

     If
          then
          else




     If
          then
          else                CAID:
20               local data           © 2009 IBM Corporation
How to prove the protocols UC secure?
      CRS                               CRS



                             SPLIT
              CDH                             CDH




                                                      =
      CRS                               CRS



                             SPLIT
              DDH                             DDH




                                                      =
21                                                  © 2009 IBM Corporation

Más contenido relacionado

La actualidad más candente

Presentation Portfolio
Presentation PortfolioPresentation Portfolio
Presentation PortfolioSteve Lee
 
Delivering business value through transformative networking 20012011
Delivering business value through transformative networking 20012011Delivering business value through transformative networking 20012011
Delivering business value through transformative networking 20012011fuckGK
 
Moving 5.4 to 7.1 AB
Moving 5.4 to 7.1 ABMoving 5.4 to 7.1 AB
Moving 5.4 to 7.1 ABCOMMON Europe
 
Convergências, Integração e Desempenho no IBM System z Enterprise
Convergências, Integração e Desempenho no IBM System z Enterprise Convergências, Integração e Desempenho no IBM System z Enterprise
Convergências, Integração e Desempenho no IBM System z Enterprise Impacta Eventos
 
Business Analytics Forum 2012 TM1 in Macquarie
Business Analytics Forum 2012 TM1 in MacquarieBusiness Analytics Forum 2012 TM1 in Macquarie
Business Analytics Forum 2012 TM1 in MacquarieAmendra Pratap
 
[Uruguay] 6.1 Foundation, 7.1 Overview & Future Directions
[Uruguay] 6.1 Foundation, 7.1 Overview & Future Directions[Uruguay] 6.1 Foundation, 7.1 Overview & Future Directions
[Uruguay] 6.1 Foundation, 7.1 Overview & Future DirectionsIBMSSA
 

La actualidad más candente (10)

Presentation Portfolio
Presentation PortfolioPresentation Portfolio
Presentation Portfolio
 
Delivering business value through transformative networking 20012011
Delivering business value through transformative networking 20012011Delivering business value through transformative networking 20012011
Delivering business value through transformative networking 20012011
 
VPM in action
VPM in actionVPM in action
VPM in action
 
Z vm-faq
Z vm-faqZ vm-faq
Z vm-faq
 
Moving 5.4 to 7.1 AB
Moving 5.4 to 7.1 ABMoving 5.4 to 7.1 AB
Moving 5.4 to 7.1 AB
 
Ibm i (i5/os) 7.1 overview
Ibm i (i5/os) 7.1 overview Ibm i (i5/os) 7.1 overview
Ibm i (i5/os) 7.1 overview
 
Convergências, Integração e Desempenho no IBM System z Enterprise
Convergências, Integração e Desempenho no IBM System z Enterprise Convergências, Integração e Desempenho no IBM System z Enterprise
Convergências, Integração e Desempenho no IBM System z Enterprise
 
IBM Wave for z/VM
IBM Wave for z/VMIBM Wave for z/VM
IBM Wave for z/VM
 
Business Analytics Forum 2012 TM1 in Macquarie
Business Analytics Forum 2012 TM1 in MacquarieBusiness Analytics Forum 2012 TM1 in Macquarie
Business Analytics Forum 2012 TM1 in Macquarie
 
[Uruguay] 6.1 Foundation, 7.1 Overview & Future Directions
[Uruguay] 6.1 Foundation, 7.1 Overview & Future Directions[Uruguay] 6.1 Foundation, 7.1 Overview & Future Directions
[Uruguay] 6.1 Foundation, 7.1 Overview & Future Directions
 

Similar a CRYPTO\'10: Credential Authenticated Identification and Key Exchange - Thomas Gross

Linux on systemz
Linux on systemzLinux on systemz
Linux on systemzsystemz
 
Linux on systemz
Linux on systemzLinux on systemz
Linux on systemzsystemz
 
Linux on systemz
Linux on systemzLinux on systemz
Linux on systemzsystemz
 
Securing Enterprise Assets In The Cloud
Securing Enterprise Assets In The CloudSecuring Enterprise Assets In The Cloud
Securing Enterprise Assets In The CloudChris Purrington
 
JVM Multitenancy (JavaOne 2012)
JVM Multitenancy (JavaOne 2012)JVM Multitenancy (JavaOne 2012)
JVM Multitenancy (JavaOne 2012)Graeme_IBM
 
High speed networks and Java (Ryan Sciampacone)
High speed networks and Java (Ryan Sciampacone)High speed networks and Java (Ryan Sciampacone)
High speed networks and Java (Ryan Sciampacone)Chris Bailey
 
Getting to the Next Level with Eclipse Concierge - Jan Rellermeyer + Tim Verb...
Getting to the Next Level with Eclipse Concierge - Jan Rellermeyer + Tim Verb...Getting to the Next Level with Eclipse Concierge - Jan Rellermeyer + Tim Verb...
Getting to the Next Level with Eclipse Concierge - Jan Rellermeyer + Tim Verb...mfrancis
 
Kiwibank: From Startup to Enterprise in 7 years
Kiwibank:  From Startup to Enterprise in 7 yearsKiwibank:  From Startup to Enterprise in 7 years
Kiwibank: From Startup to Enterprise in 7 yearsVincent Kwon
 
DB2 pureScale Technology Preview
DB2 pureScale Technology PreviewDB2 pureScale Technology Preview
DB2 pureScale Technology PreviewCristian Molaro
 
雲端與Big data
雲端與Big data雲端與Big data
雲端與Big dataYa-hui Lin
 
Performance & agilité les atouts du datacenter électronique selon XtremIO
Performance & agilité les atouts du datacenter électronique selon XtremIOPerformance & agilité les atouts du datacenter électronique selon XtremIO
Performance & agilité les atouts du datacenter électronique selon XtremIORSD
 
The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...
The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...
The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...NRB
 
CCSW’12: Automated Verification of Virtualized Infrastructures
CCSW’12: Automated Verification of Virtualized InfrastructuresCCSW’12: Automated Verification of Virtualized Infrastructures
CCSW’12: Automated Verification of Virtualized InfrastructuresThomas Gross
 
Building a right sized, do-anything runtime using OSGi technologies: a case s...
Building a right sized, do-anything runtime using OSGi technologies: a case s...Building a right sized, do-anything runtime using OSGi technologies: a case s...
Building a right sized, do-anything runtime using OSGi technologies: a case s...mfrancis
 
Developing Distributed Internet of Things Applications Made Easy with Concier...
Developing Distributed Internet of Things Applications Made Easy with Concier...Developing Distributed Internet of Things Applications Made Easy with Concier...
Developing Distributed Internet of Things Applications Made Easy with Concier...mfrancis
 
IBM Software Available In The Cloud With Amazon Web Services
IBM Software Available In The Cloud With Amazon Web ServicesIBM Software Available In The Cloud With Amazon Web Services
IBM Software Available In The Cloud With Amazon Web ServicesSteven Gerhardt
 
CloudComputing - The future is in the sky
CloudComputing - The future is in the skyCloudComputing - The future is in the sky
CloudComputing - The future is in the skySteinar Ardal
 
Comment exploiter les solutions d'intégration entre applications Cloud et "on...
Comment exploiter les solutions d'intégration entre applications Cloud et "on...Comment exploiter les solutions d'intégration entre applications Cloud et "on...
Comment exploiter les solutions d'intégration entre applications Cloud et "on...Marc Jouve
 
Agile, DevOps, Cloud - practical tools of Digital Transformation by Paul Poli...
Agile, DevOps, Cloud - practical tools of Digital Transformation by Paul Poli...Agile, DevOps, Cloud - practical tools of Digital Transformation by Paul Poli...
Agile, DevOps, Cloud - practical tools of Digital Transformation by Paul Poli...Agile ME
 
IBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System xIBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System xASBIS SK
 

Similar a CRYPTO\'10: Credential Authenticated Identification and Key Exchange - Thomas Gross (20)

Linux on systemz
Linux on systemzLinux on systemz
Linux on systemz
 
Linux on systemz
Linux on systemzLinux on systemz
Linux on systemz
 
Linux on systemz
Linux on systemzLinux on systemz
Linux on systemz
 
Securing Enterprise Assets In The Cloud
Securing Enterprise Assets In The CloudSecuring Enterprise Assets In The Cloud
Securing Enterprise Assets In The Cloud
 
JVM Multitenancy (JavaOne 2012)
JVM Multitenancy (JavaOne 2012)JVM Multitenancy (JavaOne 2012)
JVM Multitenancy (JavaOne 2012)
 
High speed networks and Java (Ryan Sciampacone)
High speed networks and Java (Ryan Sciampacone)High speed networks and Java (Ryan Sciampacone)
High speed networks and Java (Ryan Sciampacone)
 
Getting to the Next Level with Eclipse Concierge - Jan Rellermeyer + Tim Verb...
Getting to the Next Level with Eclipse Concierge - Jan Rellermeyer + Tim Verb...Getting to the Next Level with Eclipse Concierge - Jan Rellermeyer + Tim Verb...
Getting to the Next Level with Eclipse Concierge - Jan Rellermeyer + Tim Verb...
 
Kiwibank: From Startup to Enterprise in 7 years
Kiwibank:  From Startup to Enterprise in 7 yearsKiwibank:  From Startup to Enterprise in 7 years
Kiwibank: From Startup to Enterprise in 7 years
 
DB2 pureScale Technology Preview
DB2 pureScale Technology PreviewDB2 pureScale Technology Preview
DB2 pureScale Technology Preview
 
雲端與Big data
雲端與Big data雲端與Big data
雲端與Big data
 
Performance & agilité les atouts du datacenter électronique selon XtremIO
Performance & agilité les atouts du datacenter électronique selon XtremIOPerformance & agilité les atouts du datacenter électronique selon XtremIO
Performance & agilité les atouts du datacenter électronique selon XtremIO
 
The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...
The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...
The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...
 
CCSW’12: Automated Verification of Virtualized Infrastructures
CCSW’12: Automated Verification of Virtualized InfrastructuresCCSW’12: Automated Verification of Virtualized Infrastructures
CCSW’12: Automated Verification of Virtualized Infrastructures
 
Building a right sized, do-anything runtime using OSGi technologies: a case s...
Building a right sized, do-anything runtime using OSGi technologies: a case s...Building a right sized, do-anything runtime using OSGi technologies: a case s...
Building a right sized, do-anything runtime using OSGi technologies: a case s...
 
Developing Distributed Internet of Things Applications Made Easy with Concier...
Developing Distributed Internet of Things Applications Made Easy with Concier...Developing Distributed Internet of Things Applications Made Easy with Concier...
Developing Distributed Internet of Things Applications Made Easy with Concier...
 
IBM Software Available In The Cloud With Amazon Web Services
IBM Software Available In The Cloud With Amazon Web ServicesIBM Software Available In The Cloud With Amazon Web Services
IBM Software Available In The Cloud With Amazon Web Services
 
CloudComputing - The future is in the sky
CloudComputing - The future is in the skyCloudComputing - The future is in the sky
CloudComputing - The future is in the sky
 
Comment exploiter les solutions d'intégration entre applications Cloud et "on...
Comment exploiter les solutions d'intégration entre applications Cloud et "on...Comment exploiter les solutions d'intégration entre applications Cloud et "on...
Comment exploiter les solutions d'intégration entre applications Cloud et "on...
 
Agile, DevOps, Cloud - practical tools of Digital Transformation by Paul Poli...
Agile, DevOps, Cloud - practical tools of Digital Transformation by Paul Poli...Agile, DevOps, Cloud - practical tools of Digital Transformation by Paul Poli...
Agile, DevOps, Cloud - practical tools of Digital Transformation by Paul Poli...
 
IBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System xIBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System x
 

Más de Thomas Gross

Attribute-based Authentication
Attribute-based AuthenticationAttribute-based Authentication
Attribute-based AuthenticationThomas Gross
 
VALID Rules - A language for cloud verification (EU CSP\’12)
VALID Rules - A language for cloud verification (EU CSP\’12)VALID Rules - A language for cloud verification (EU CSP\’12)
VALID Rules - A language for cloud verification (EU CSP\’12)Thomas Gross
 
Anonymous Credentials on Java Card - SIT Smartcard 2011
Anonymous Credentials on Java Card - SIT Smartcard 2011Anonymous Credentials on Java Card - SIT Smartcard 2011
Anonymous Credentials on Java Card - SIT Smartcard 2011Thomas Gross
 
CCS’09: Smart Identity Card - Thomas Gross
CCS’09: Smart Identity Card - Thomas GrossCCS’09: Smart Identity Card - Thomas Gross
CCS’09: Smart Identity Card - Thomas GrossThomas Gross
 
CCS\'08: Efficient Attributes For Anonymous Credentials - Thomas Gross
CCS\'08: Efficient Attributes For Anonymous Credentials - Thomas GrossCCS\'08: Efficient Attributes For Anonymous Credentials - Thomas Gross
CCS\'08: Efficient Attributes For Anonymous Credentials - Thomas GrossThomas Gross
 
Privacy - Principles, PrimeLife and Identity Mixer - Thomas Gross
Privacy - Principles, PrimeLife and Identity Mixer - Thomas GrossPrivacy - Principles, PrimeLife and Identity Mixer - Thomas Gross
Privacy - Principles, PrimeLife and Identity Mixer - Thomas GrossThomas Gross
 

Más de Thomas Gross (6)

Attribute-based Authentication
Attribute-based AuthenticationAttribute-based Authentication
Attribute-based Authentication
 
VALID Rules - A language for cloud verification (EU CSP\’12)
VALID Rules - A language for cloud verification (EU CSP\’12)VALID Rules - A language for cloud verification (EU CSP\’12)
VALID Rules - A language for cloud verification (EU CSP\’12)
 
Anonymous Credentials on Java Card - SIT Smartcard 2011
Anonymous Credentials on Java Card - SIT Smartcard 2011Anonymous Credentials on Java Card - SIT Smartcard 2011
Anonymous Credentials on Java Card - SIT Smartcard 2011
 
CCS’09: Smart Identity Card - Thomas Gross
CCS’09: Smart Identity Card - Thomas GrossCCS’09: Smart Identity Card - Thomas Gross
CCS’09: Smart Identity Card - Thomas Gross
 
CCS\'08: Efficient Attributes For Anonymous Credentials - Thomas Gross
CCS\'08: Efficient Attributes For Anonymous Credentials - Thomas GrossCCS\'08: Efficient Attributes For Anonymous Credentials - Thomas Gross
CCS\'08: Efficient Attributes For Anonymous Credentials - Thomas Gross
 
Privacy - Principles, PrimeLife and Identity Mixer - Thomas Gross
Privacy - Principles, PrimeLife and Identity Mixer - Thomas GrossPrivacy - Principles, PrimeLife and Identity Mixer - Thomas Gross
Privacy - Principles, PrimeLife and Identity Mixer - Thomas Gross
 

CRYPTO\'10: Credential Authenticated Identification and Key Exchange - Thomas Gross

  • 1. Jan Camenisch, Nathalie Casati, Thomas Gross and Victor Shoup 15 August 2010 Credential-Authenticated Identification and Key Exchange © 2009 IBM Corporation
  • 2. IBM Presentation Template Full Version Alice and Bob want to talk... CAKE erasures adaptive 2 © 2009 IBM Corporation
  • 3. What to do with a CAKE? PAKE PAKE* Secret Handshake 3 © 2009 IBM Corporation
  • 4. IBM Presentation Template Full Version Problem Tools Solution 4 © 2009 IBM Corporation
  • 5. IBM Presentation Template Full Version Problem What's the CAKE ideal functionality? What's key ideal world building block? What challenges to solve for CAKE? 5 © 2009 IBM Corporation
  • 6. What's the Strong CAKE ideal functionality? 1. Await inputs 2. On With corruption else 6 © 2009 IBM Corporation
  • 7. What is the enhanced zero knowledge ideal functionality? [Can2005] 1. On input such that send 2. Wait for 3. On input send to P 7 © 2009 IBM Corporation
  • 8. How to realize CAID protocols? How to overcome How to construct dependency? CAID? Protocols for useful relations? How to realize ? 8 © 2009 IBM Corporation
  • 9. IBM Presentation Template Full Version Tools How to bootstrap an authenticated channel? How to realize UC EZK? How to prove equality? 9 © 2009 IBM Corporation
  • 10. How to bootstrap an authenticated channel? [BCLPR2005] Faites vos jeux... EITHER: OR: 10 © 2009 IBM Corporation
  • 11. How to realize two-party split key exchange efficiently? DH KE Split Fn ? all Allows us to UC-realize split multi- session secure channels under DDH. 11 © 2009 IBM Corporation
  • 12. How to realize enhanced zero-knowledge? [GaMaYa2003, JarLys2000] CRS CRS' UCZK [GaMaYa2003] [JarLys2000] Paillier encrypt Committed proof Strong and commit [MacYan2003] RSA Proof of SSTC trapdoor representation commitment 12 © 2009 IBM Corporation
  • 13. How to prove equality? [CraSho1998, JarLys2000] Are secrets and equal? Non-committing encryption KeyGen Random Encrypt t s Random Mangle z Decrypt UC-realize for under DDH 13 assumption in the hybrid model. © 2009 IBM Corporation
  • 14. IBM Presentation Template Full Version Solution How to put it all together? How to prove the protocols UC secure? 14 © 2009 IBM Corporation
  • 15. How to put it together and prove it UC secure? CRS DDH Strong CAID 15 © 2009 IBM Corporation
  • 16. How to put it together and prove it UC secure? CRS CRS SPLIT DDH DDH CDH Strong CAID CAID 16 © 2009 IBM Corporation
  • 17. Summary [http://eprint.iacr.org/2010/055] Corruption Adaptive corruptions with erasures Model System of prime order , generator . Parameters Joint access to CRS (for & UCZK realization) CAID* for : UC-secure under CDH. General CAID* for : UC-secure under DDH. Protocols Split transformation to CAID. Split multi-session KE: UC-secure under DDH PAKE secure against adaptive corruptions, UC- Derived secure under DDH, w/o ROM. Protocols PAKE* secure against adaptive corruptions and server compromise, UC-secure under DDH. 17 © 2009 IBM Corporation
  • 18. Jan Camenisch, Nathalie Casati, Thomas Gross and Victor Shoup 15 August 2010 Credential-Authenticated Identification and Key Exchange Speaker: Thomas Gross (thomasgross@acm.org, thomasgross.net) Extended Version on IACR ePrint: http://eprint.iacr.org/2010/055 © 2009 IBM Corporation
  • 19. BACKUP 19 © 2009 IBM Corporation
  • 20. How to realize CAID? Random Random If then else If then else CAID: 20 local data © 2009 IBM Corporation
  • 21. How to prove the protocols UC secure? CRS CRS SPLIT CDH CDH = CRS CRS SPLIT DDH DDH = 21 © 2009 IBM Corporation