版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、Controlled Algebras and GIIsRonald L. RivestMIT CSAILIPAM Workshop October 9, 2006 OutlineuControlled algebrasuTrapdoor discrete log groupsuBlack box & pseudo-free groupsuGroups with infeasible inversesuTransitive signaturesuTrapdoor pairingsAlgebrau( S1 , S2 , op1 , op2, , opn )uAlgebra is set(
2、s) with operation(s).uAbstract algebra is mathematical object.uInstantiation is computational object: Each element of set has one or more representations. Each operation has associated computational procedure.Controlled Algebrau( S , op1 , op2, op3, op4, , opn )u F F I T TuControl computation of eac
3、h operation: F (feasible or public: public poly-time algorithm) I (infeasible: no poly-time alg. exists) T (trapdoor: polytime only with trapdoor information)uWhich controlled algebras can we make?Controlled GroupsuGroup operations: Identity: produces identity element e Generator(s): produces genera
4、tor(s) Sample: produces random element Multiply: group operation Invert: given x , compute x-1 Equal: test equality of elements Canonical: give canonical rep of element Discrete log, root, DDH, CDH, hash, uEach separately controlledAnalogy: gene expressionuOne of the marvelous features of the way DN
5、A works is that the semantics of the gene (i.e., what protein is made) is decoupled from the control of its expression. Semantics and control may evolve separately.controlproteinExample: Trapdoor DL groupsu(See Dent and Galbraith 2006)uGenerator g: public, generates G = uMultiplication (group opn):
6、publicuDiscrete logarithm: trapdooruApplications: key agreement, encryption. (Publish group description as public key)Trapdoor DL groupsuOpen problem to construct practical trapdoor DL groups. uPaillier cryptosystem comes close.uDent & Galbraith also propose pairing-based approach; large tables
7、required. Black box groupuControlled group related to notion of black box group (group operation efficient; others, such as discrete log, may not be) which is “essentially the same” as (“just”) the mathematical object.uSome attempts to have “computational black box group” (Frey; Galbraith) via “disg
8、uised elliptic curves” or other techniques, for specific groups.“Pseudo-free” GroupuNotion introduced by Hohenberger (2003), refined by Rivest (2004).uGroup is (strongly) “pseudo-free” if adversary cant find solution to any “non-trivial” equation (i.e. one that has no solution in free group).uMiccia
9、ncio (2005) showed that Zn* where n=pq is pseudo-free (given “strong RSA assumption”).Groups with Infeasible Inverses (GIIs)uWant group operation to be easy, but computing inverses to be hard (for everyone).uGIIs introduced by Susan Hohenberger in her MS thesis; also studied by David Molnar, Vinod V
10、aikuntanathan.uOpen problem to make GIIs under reasonable assumptions.GIIs imply Key Agreementu(Hohenberger; Rabi/Sherman)uAlice draws random elts: x, y uAlice sends Bob: xy, yuBob draws random elt: zuBob sends Alice yzuBoth compute K = (xy)z = x(yz)Security Argument HuAn Eve who can guess K=xyz fro
11、m (xy,y,yz) can invert random elts. uChoose a at randomuGive Eve xy = ai , y = aj , yz = ak where i-j+k=-1. uThen K = ai-j+k = a-1 .Strongly Associative OWFsu(Introduced by Rabi/Sherman)uAssociative function f(.,.) on set SuEasy to compute f(x,y) given x, yuGiven f(x,y) and y , hard to compute any x
12、 such that f(x,y) = f(x,y).uHemaspaandra and Rothe show that SAOWF and OWF are black-box equivalent on non-structured domains.uBut on a group, SAOWF = GIIs. Trapdoor GIIs (TGIIs)uGII except some trapdoor information allows computation of inverses.uAny finite GII is really TGII, since knowing group o
13、rder allows computation of inverses. However, it may be possible to generate a GII without anyone knowing group orderApplications of TGIIsuVaikuntanathan (2003) has shown how to implement IBE using any TGII that has an efficient algorithm for sampling a random element together with its inverse. u Is
14、 this only known sufficient condition for IBE outside of bilinear maps?Vaikuntanathans IBE constructionuLet G be a TGII, h1 h2 hash functions.uGiven ID, define gID = h1(ID)uDefine skID = gID-1 (using trapdoor)uTo encrypt m, pick r randomly, then: C = (r gID, mh2(r)uTo decrypt (s,t) compute m = t h2(
15、s skID)u(Sampling of pairs (a,a-1) needed, but only in reduction proof, for ID-CPA security.)How to construct GII or TGII?uOrder of group must be hidden.uRSA group (Zn*) has hidden order, but inverses are unfortunately easy.uMaybe use “trusted oracle” to provide interface for composition / sampling
16、/ comparing elements, but not inversion. All reps are encrypted. (Saxena and Soh)uOpen problem!Transitive Signaturesu(due to Micali/Rivest)uSignature scheme on pairs of elts (think of (a,b) as sig on edge (a,b) ) uDTS (Directed Transitive Signatures) Given (a,b) and (b,c) , anyone can compute (a,c)
17、uUTS (Undirected TS) Given (a,b), easy to compute (b,a) Transitive signaturesacb(a,b)(b,c)(a,c)Potential applications to cert chainsSome relationships (see H)KAGIITGIITDPPKEOWFOTDTSUTSSDSTDLBMConstructing a DTS from TGIIuSimple way to build a directed transitive signature scheme from a TGII: Signatu
18、re on (a,b) is just a/b uBut is this secure?Trapdoor pairingsuA group with a bilinear map, except that one needs trapdoor information to compute the pairing function.(Rivest (2004), Dent & Galbraith (2006) Applications of trapdoor pairingsuID scheme (Dent & Galbraith): Alice is only one who can correctly compute DDH results on challenges (ga, gb, gab) or (ga, gb, gc)uMaking various flavors of signature schemes (ID-based, aggregate,
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2026年(高级)增材制造设备操作员技能鉴定理论考试题库(新版)
- 世界历史名人传记全解
- 2026中国进口有机纯果汁市场营销动态及销售前景预测报告
- 2025年事业单位招聘考试建筑工程类试题集及答案
- 2025年市政道路试题及答案
- 2026年肉类深加工租赁服务合同(食品厂)
- 2026年亲子木工DIY材料协议
- 2026农业科技园区运营管理生态农业市场需求投入产出效益研究报告
- 2026农业无人机植保作业效率分析智慧农业生态安全发展建议
- 2026中国葡萄干行业技术创新与升级路径研究报告
- 劳动教育与劳动体验(中南财经政法大学)知到智慧树网课答案
- GB/T 20055-2025开放式炼胶机炼塑机安全要求
- 老年人助浴知识培训课件
- 田径运动会裁判培训课件
- 干挂外墙瓷砖施工技术与规范
- 山东省青岛42中重点名校2026届中考数学猜题卷含解析
- 2025年贵州省中考理科综合(物理化学)试卷真题(含答案详解)
- 2025至2030管道涂料行业发展趋势分析与未来投资战略咨询研究报告
- 《工程水文学》习题册全解1
- 劳动项目五 《制作劳动作品集》 (教学设计)2023-2024学年人教版《劳动教育》五年级下册
- 第19课《十里长街送总理》 统编版语文(五四学制)六年级上册
评论
0/150
提交评论