版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、Controlled Algebras and GIIsRonald L. RivestMIT CSAILIPAM Workshop October 9, 2006 OutlineuControlled algebrasuTrapdoor discrete log groupsuBlack box & pseudo-free groupsuGroups with infeasible inversesuTransitive signaturesuTrapdoor pairingsAlgebrau( S1 , S2 , op1 , op2, , opn )uAlgebra is set(
2、s) with operation(s).uAbstract algebra is mathematical object.uInstantiation is computational object: Each element of set has one or more representations. Each operation has associated computational procedure.Controlled Algebrau( S , op1 , op2, op3, op4, , opn )u F F I T TuControl computation of eac
3、h operation: F (feasible or public: public poly-time algorithm) I (infeasible: no poly-time alg. exists) T (trapdoor: polytime only with trapdoor information)uWhich controlled algebras can we make?Controlled GroupsuGroup operations: Identity: produces identity element e Generator(s): produces genera
4、tor(s) Sample: produces random element Multiply: group operation Invert: given x , compute x-1 Equal: test equality of elements Canonical: give canonical rep of element Discrete log, root, DDH, CDH, hash, uEach separately controlledAnalogy: gene expressionuOne of the marvelous features of the way DN
5、A works is that the semantics of the gene (i.e., what protein is made) is decoupled from the control of its expression. Semantics and control may evolve separately.controlproteinExample: Trapdoor DL groupsu(See Dent and Galbraith 2006)uGenerator g: public, generates G = uMultiplication (group opn):
6、publicuDiscrete logarithm: trapdooruApplications: key agreement, encryption. (Publish group description as public key)Trapdoor DL groupsuOpen problem to construct practical trapdoor DL groups. uPaillier cryptosystem comes close.uDent & Galbraith also propose pairing-based approach; large tables
7、required. Black box groupuControlled group related to notion of black box group (group operation efficient; others, such as discrete log, may not be) which is “essentially the same” as (“just”) the mathematical object.uSome attempts to have “computational black box group” (Frey; Galbraith) via “disg
8、uised elliptic curves” or other techniques, for specific groups.“Pseudo-free” GroupuNotion introduced by Hohenberger (2003), refined by Rivest (2004).uGroup is (strongly) “pseudo-free” if adversary cant find solution to any “non-trivial” equation (i.e. one that has no solution in free group).uMiccia
9、ncio (2005) showed that Zn* where n=pq is pseudo-free (given “strong RSA assumption”).Groups with Infeasible Inverses (GIIs)uWant group operation to be easy, but computing inverses to be hard (for everyone).uGIIs introduced by Susan Hohenberger in her MS thesis; also studied by David Molnar, Vinod V
10、aikuntanathan.uOpen problem to make GIIs under reasonable assumptions.GIIs imply Key Agreementu(Hohenberger; Rabi/Sherman)uAlice draws random elts: x, y uAlice sends Bob: xy, yuBob draws random elt: zuBob sends Alice yzuBoth compute K = (xy)z = x(yz)Security Argument HuAn Eve who can guess K=xyz fro
11、m (xy,y,yz) can invert random elts. uChoose a at randomuGive Eve xy = ai , y = aj , yz = ak where i-j+k=-1. uThen K = ai-j+k = a-1 .Strongly Associative OWFsu(Introduced by Rabi/Sherman)uAssociative function f(.,.) on set SuEasy to compute f(x,y) given x, yuGiven f(x,y) and y , hard to compute any x
12、 such that f(x,y) = f(x,y).uHemaspaandra and Rothe show that SAOWF and OWF are black-box equivalent on non-structured domains.uBut on a group, SAOWF = GIIs. Trapdoor GIIs (TGIIs)uGII except some trapdoor information allows computation of inverses.uAny finite GII is really TGII, since knowing group o
13、rder allows computation of inverses. However, it may be possible to generate a GII without anyone knowing group orderApplications of TGIIsuVaikuntanathan (2003) has shown how to implement IBE using any TGII that has an efficient algorithm for sampling a random element together with its inverse. u Is
14、 this only known sufficient condition for IBE outside of bilinear maps?Vaikuntanathans IBE constructionuLet G be a TGII, h1 h2 hash functions.uGiven ID, define gID = h1(ID)uDefine skID = gID-1 (using trapdoor)uTo encrypt m, pick r randomly, then: C = (r gID, mh2(r)uTo decrypt (s,t) compute m = t h2(
15、s skID)u(Sampling of pairs (a,a-1) needed, but only in reduction proof, for ID-CPA security.)How to construct GII or TGII?uOrder of group must be hidden.uRSA group (Zn*) has hidden order, but inverses are unfortunately easy.uMaybe use “trusted oracle” to provide interface for composition / sampling
16、/ comparing elements, but not inversion. All reps are encrypted. (Saxena and Soh)uOpen problem!Transitive Signaturesu(due to Micali/Rivest)uSignature scheme on pairs of elts (think of (a,b) as sig on edge (a,b) ) uDTS (Directed Transitive Signatures) Given (a,b) and (b,c) , anyone can compute (a,c)
17、uUTS (Undirected TS) Given (a,b), easy to compute (b,a) Transitive signaturesacb(a,b)(b,c)(a,c)Potential applications to cert chainsSome relationships (see H)KAGIITGIITDPPKEOWFOTDTSUTSSDSTDLBMConstructing a DTS from TGIIuSimple way to build a directed transitive signature scheme from a TGII: Signatu
18、re on (a,b) is just a/b uBut is this secure?Trapdoor pairingsuA group with a bilinear map, except that one needs trapdoor information to compute the pairing function.(Rivest (2004), Dent & Galbraith (2006) Applications of trapdoor pairingsuID scheme (Dent & Galbraith): Alice is only one who can correctly compute DDH results on challenges (ga, gb, gab) or (ga, gb, gc)uMaking various flavors of signature schemes (ID-based, aggregate,
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 【正版授权】 IEC TS 63283-2:2025 EN Industrial-process measurement,control and automation - Smart manufacturing - Part 2: Use cases
- 【正版授权】 IEC 62037-2:2021/AMD1:2025 EN Amendment 1 - Passive RF and microwave devices,intermodulation level measurement - Part 2: Measurement of passive intermodulation in coaxial c
- 2025年中职(机械制造技术)机械加工工艺阶段测试试题及答案
- 可爱垃圾分类回收课件
- 工程检测新技术
- 制药厂新员工培训
- 制桶厂安全培训课件
- 工程安全常识培训课件
- 工程单位安全培训计划表课件
- 学校食堂防止食品浪费的监督检查制度
- 病理学教学大纲
- 新东方招生合同范本
- 阿里斯顿培训知识大全课件
- ISO 9001(DIS)-2026与ISO 9001-2015《质量管理体系要求》主要变化对比说明(2025年9月)
- 水利监理安全管理制度
- 设备安装工程质量追踪与反馈机制方案
- 工程项目结算表
- 2.2气候课件-八年级地理上学期人教版
- 安宁疗护诊疗流程多学科团队合作流程
- 《数据标注实训(初级)》中职全套教学课件
- 部编版二年级上册语文全册教案
评论
0/150
提交评论