Top Banner
The Dual Receiver The Dual Receiver Cryptosystem and its Cryptosystem and its Applications Applications Presented by Brijesh Shet
25

The Dual Receiver Cryptosystem and its Applications

Feb 05, 2016

Download

Documents

Ronda

The Dual Receiver Cryptosystem and its Applications. Presented by Brijesh Shetty. Overview. Dual Receiver Cryptosystem – Concept Interesting Applications Combined Cryptosystem Useful Puzzle Solving. Dual Receiver Cryptosystem. Encryption Scheme - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: The Dual Receiver Cryptosystem and its Applications

The Dual Receiver Cryptosystem The Dual Receiver Cryptosystem and its Applicationsand its Applications

Presented by Brijesh Shetty

Page 2: The Dual Receiver Cryptosystem and its Applications

OverviewOverview

Dual Receiver Cryptosystem – Concept

Interesting Applications Combined Cryptosystem Useful Puzzle Solving

Page 3: The Dual Receiver Cryptosystem and its Applications

Dual Receiver Cryptosystem

Encryption Scheme

Ciphertext can be decrypted by two independent receivers!

Bilinear Diffie Hellman Assumption (based on elliptic curves)

Page 4: The Dual Receiver Cryptosystem and its Applications

Elliptic Curve based Discrete Log problem

Given Y = k . P and Y,P(i.e P added to itself k times)

Find k ???? (P,P)--- g (Y,P)--- h By definition of Bilinear Curve, we get

h = gk [since (aP,bQ)=(P,Q)ab](Y,P)=(kP,P)=(P,P)k=gk

Page 5: The Dual Receiver Cryptosystem and its Applications

“ Key Escrow ” (in the context of Dual receiver)

An arrangement where keys needed to decrypt encrypted data must be held in escrow by a third party.

Eg. Govt. agencies can use it to decrypt messages which they suspect to be relevant to national security.

Page 6: The Dual Receiver Cryptosystem and its Applications

Dual Receiver Cryptosystem

Ciphertext C

Message m

Encrypt using public keys of

B and C

B

C

A

Decrypts to m

C can also decrypt!C does not learn about the private keys of B or A !!

Page 7: The Dual Receiver Cryptosystem and its Applications

Dual Receiver Cryptosystem- The Scheme

Some Definitions

(Semantically secure) Dual Receiver Cryptosystem scheme

Page 8: The Dual Receiver Cryptosystem and its Applications

Definitions (Randomised algorithms)

Key Generation algorithm K(k) = (e,d) & (f,g)

Encryption algorithm E e,f (m) = c

Page 9: The Dual Receiver Cryptosystem and its Applications

Definitions (contd..)

Decryption Algorithm D Dd,f (c) = m

Recovery Algorithm RRe,g (c) = m

Page 10: The Dual Receiver Cryptosystem and its Applications

Dual Receiver Cryptosystem- The Scheme

Some Definitions

(Semantically secure) Dual Receiver Cryptosystem scheme

Page 11: The Dual Receiver Cryptosystem and its Applications

Semantically secure Dual Receiver Cryptosystem

B

C

A

(x, xP)

(y, yP)

Message mRandom r

(u1,u2,u3)private

Hx is a hash fn associated with public key xP

Page 12: The Dual Receiver Cryptosystem and its Applications

Semantically secure Dual Receiver Cryptosystem

B

C

A

(x, xP)

(y, yP)

Message mRandom r u1 = rP

u2 = yPu3 = m+ Hx(<xP,yP>r)

Page 13: The Dual Receiver Cryptosystem and its Applications

Decryption

B<u1,u2>x = <rP,yP>x

= <xP,yP>r

= <P,P>xyr

U3 + Hx(<xP,yP>r) = m

Page 14: The Dual Receiver Cryptosystem and its Applications

Recovery (Second Receiver)

C

<u1,xP>y = <rP,xP>y

= <xP,yP>r

= <P,P>xyr

U3 + Hx(<xP,yP>r) = m

Page 15: The Dual Receiver Cryptosystem and its Applications

Dual Receiver Cryptosystem- The Scheme

Some Definitions

(Semantically secure) Dual Receiver Cryptosystem scheme

Page 16: The Dual Receiver Cryptosystem and its Applications

OverviewOverview

Dual Receiver Cryptosystem – Concept

Interesting Applications Combined Cryptosystem Useful Puzzle Solving

Page 17: The Dual Receiver Cryptosystem and its Applications

Combined Cryptosystem

We combine using a single key x

Dual Receiver Encryption

Signature

Page 18: The Dual Receiver Cryptosystem and its Applications

Signature (in Combined scheme)

Same key x . Hash I:{0,1}n -> G1

A B

Sign the hash

Message m

σ = x . I(m)

Page 19: The Dual Receiver Cryptosystem and its Applications

Verification..

BVerify

<P, σ > = <xP, I(m)>

B has m, σ

If they are same both must be equal <P,I(m)>x

Page 20: The Dual Receiver Cryptosystem and its Applications

Combined Cryptosystem

What is so special?

Dual receiver encryption facilitates escrow of the decryption capability & non escrow of the signature capability using the same key!!

The security of either of the schemes is not compromised

Page 21: The Dual Receiver Cryptosystem and its Applications

OverviewOverview

Dual Receiver Cryptosystem – Concept

Interesting Applications Combined Cryptosystem Useful Security Puzzles

Page 22: The Dual Receiver Cryptosystem and its Applications

Useful Security Puzzles

Application Areas When Server wants to rate-limit the

clients (against DOS attacks) Lighten the server’s computational

burden

Example : File Server

Page 23: The Dual Receiver Cryptosystem and its Applications

File Server (Security Puzzle)

Client

Abcde……

FileServer

¤¥§~¶…….

KsEke,Ka(Ks)

(C1,C2)[ ]STORING FILE

Page 24: The Dual Receiver Cryptosystem and its Applications

File Server … (Request File)¤¥§~¶……. (C1,C2)[ ]

C1, PaComputeDPa,Ke(C1)

Random pC1 = Eke,Ka(p)

u1 = Ks+ G(p)u2 = F(p,Ks,C1,u1)

C2 = [u1,u2]

G, F are hashes

TD1 G(TD1)+u1 = mCheck

u2=F(p,m,c,u1)

Client

Decryption..Computation intensive

XOR and hashDual Receiver Encrytpion

Page 25: The Dual Receiver Cryptosystem and its Applications

Thank you