All papers in 2003 (Page 2 of 265 results)
Commitment Capacity of Discrete Memoryless Channels
In extension of the bit commitment task and following work initiated by Crepeau and Kilian, we introduce and solve the problem of characterising the optimal rate at which a discrete memoryless channel can be used for bit commitment. It turns out that the answer is very intuitive: it is the maximum equivocation of the channel (after removing trivial redundancy), even when unlimited noiseless bidirectional side communication is allowed.
By a well-known reduction, this result provides a lower bound on the channel's capacity for implementing coin tossing, which we conjecture to be an equality.
The method of proving this relates the problem to Wyner's wire--tap channel in an amusing way. We also discuss extensions to quantum channels.
Identity-Based Threshold Decryption
In this paper, we examine issues related to the construction of
identity-based threshold decryption schemes and argue that it is
important in practice to design an identity-based threshold
decryption scheme in which a private key associated with an
identity is shared. A major contribution of this paper is to
construct the first identity-based threshold decryption scheme
secure against chosen ciphertext attack. A formal proof of
security of the scheme is provided in the random oracle model,
assuming the Bilinear Diffie-Hellman problem is computationally
hard. Another contribution of this paper is, by extending the
proposed identity-based threshold decryption scheme, to construct
a mediated identity-based encryption scheme secure against more
powerful attacks than those considered previously.
Multipurpose Identity-Based Signcryption : A Swiss Army Knife for Identity-Based Cryptography
A combined Identity-Based Signature/Encryption system with multiple security properties is presented. The scheme allows Alice to sign a message and encrypt it for Bob ("confidentiality") in such a way that the ciphertext does not reveal anything about their identities ("anonymity"); upon receipt, Bob is convinced that he is Alice's intended addressee ("authentication") but is unable to prove this to a third party ("unlinkability"); nevertheless, the decrypted message bears a signature by Alice that anyone can verify ("non-repudiation"). The construction is based on the Bilinear Diffie-Hellman assumption, and proved secure in the random oracle model.
Cryptanalysis of the Alleged SecurID Hash Function
The SecurID hash function is used for authenticating users to a
corporate computer infrastructure. We analyse an alleged
implementation of this hash function. The block cipher at the
heart of the function can be broken in few milliseconds on a PC
with 70 adaptively chosen plaintexts. The 64-bit secret key of
10 of the cards can be discovered given two months of token
outputs and analysis steps. A larger fraction of cards
can be covered given more observation time.
Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology
The goals of this paper are three-fold. First we introduce and
motivate a generalization of the fundamental concept of the
indistinguishability of two systems, called indifferentiability.
This immediately leads to a generalization of the related notion of
reducibility of one system to another.
Second, we prove that indifferentiability is the necessary and
sufficient condition on two systems S and T such that the security
of any cryptosystem using T as a component is not affected when T is
substituted by S. In contrast to indistinguishability,
indifferentiability is applicable in settings where a possible
adversary is assumed to have access to additional information about
the internal state of the involved systems, for instance the public
parameter selecting a member from a family of hash functions.
Third, we state an easily verifiable criterion for a system U not to
be reducible (according to our generalized definition) to another
system V and, as an application, prove that a random oracle is not
reducible to a weaker primitive, called asynchronous beacon, and
also that an asynchronous beacon is not reducible to a finite-length
random string. Each of these irreducibility results alone implies
the main theorem of Canetti, Goldreich and Halevi stating that there
exist cryptosystems that are secure in the random oracle model but
for which replacing the random oracle by any implementation leads to
an insecure cryptosystem.
A More Secure and Efficacious TTS Signature Scheme
In 2002 the new genre of digital signature scheme TTS (Tame Transformation Signatures) is introduced along with a sample scheme TTS/2. TTS is from the family of multivariate cryptographic schemes to which the NESSIE primitive {SFLASH} also belongs. It is a realization of Moh's theory for digital signatures, based on Tame Transformations or Tame Maps. Properties of multivariate cryptosystems are determined mainly by their central maps. TTS uses Tame Maps as their central portion for even greater speed than -related schemes (using monomials in a large field for the central portion), previously usually acknowledged as fastest. We show a small flaw in TTS/2 and present an improved TTS implementation which we call TTS/4. We will examine in some detail how well TTS/4 performs, how it stands up to previously known attacks, and why it represents an advance over TTS/2. Based on this topical assessment, we consider TTS in general and TTS/4 in particular to be competitive or superior in several aspects to other schemes, partly because the theoretical roots of TTS induce many good traits. One specific area in which TTS/4 should excel is in low-cost smartcards. It seems that the genre has great potential for practical deployment and deserves further attention by the cryptological community.
An efficient variant of the RSA cryptosystem
We describe an efficient combination of two variants of RSA cryptosystem (MPrime and Rebalanced RSA) analysed by Boneh and Schacham. The decryption process resultant is (for 2048-bits moduli) about 8 times faster than that presented by Quisquater and Couvreur and about 27 times faster than original cryptosystem.
A Sufficient Condition and Optimal Domain Extension of UOWHF
Uncategorized
Uncategorized
Here, we present how one can extend domain of a given Hash Family. We will give a sufficient condition for UOWHF-preserving domain extension (the extended Hash Family is UOWHF whenever the base Hash Family is UOWHF). We present also a binary tree based parallel algorithm for extending the domain of a UOWHF whose key-length expansion is optimum in a sub-class of binary tree based domain extension algorithm. We will show the optimality under an assumption.
Some RSA-based Encryption Schemes with Tight Security Reduction
In this paper, we study some RSA-based semantically secure encryption schemes (IND-CPA) in the standard model.
We first derive the exactly tight one-wayness
of Rabin-Paillier encryption scheme
which assumes that factoring Blum integers is hard.
We next propose the first IND-CPA scheme
whose one-wayness is equivalent to factoring {\it general}
(not factoring Blum integers).
Our reductions of one-wayness are very tight
because they require only one decryption-oracle query.
Efficient Provably Secure Public Key Steganography
Uncategorized
Uncategorized
We construct \emph{efficient} public key steganographic schemes, without resort to any peculiar
existence assumption such as unbiased functions. This is the first time such a construction is
obtained. Not only our constructions are \emph{secure}, but also are essentially optimal and have
\emph{no error} decoding. We achieve this by designing a new primitive called -codes.
A Formal Proof of Zhu's Signature Scheme
Uncategorized
Uncategorized
Following from the remarkable works of Cramer and Shoup \cite{CS}, three trapdoor hash signature variations have been
presented in the literature: the first variation was presented in CJE'01 by Zhu \cite{Zhu}, the second variation was
presented in SCN'02 by Camenisch and Lysyanskaya \cite{CL} and the third variation was presented in PKC'03 by Fischlin
\cite{Fis}. All three mentioned trapdoor hash signature schemes have similar structure and the security of the last two
modifications is rigorously proved. We point out that the distribution of variables derived from Zhu's signing oracle
is different from that generated by Zhu's signing algorithm since the signing oracle in Zhu's simulator is defined over
, instead of . Consequently the proof of security of Zhu's signature scheme should be studied more precisely.
We also aware that the proof of Zhu's signature scheme is not a trivial work which is stated below:
\begin{itemize}
\item the technique presented by Cramer and Shoup \cite{CS} cannot be applied directly to prove the security of Zhu's
signature scheme since the structure of Cramer-Shoup's trap-door hash scheme is double deck that is easy to simulate a
signing query as the order of subgroup is a public parameter;
\item the technique presented by Camenisch and
Lysyanskaya \cite{CL} cannot be applied directly since there are extra security parameters and guide the
statistical closeness of the simulated distributions to the actual distribution;
\item the technique presented by
Fischlin cannot be applied directly to Zhu's signature scheme as the security proof of Fischlin's signature relies on a
set of pairs while the security proof of Zhu's signature should rely on a set of
pairs .
\end{itemize}
In this report, we provide an interesting random argument technique to show that Zhu's signature scheme immune to
adaptive chosen-message attack under the assumptions of the strong RSA problem as well as the existence of collision
free hash functions.
ManTiCore: Encryption with Joint Cipher-State Authentication
We describe a new method for authenticated encryption, which uses
information from the internal state of the cipher to provide the
authentication. This methodology has a number of benefits. The
encryption has properties similar to CBC mode, yet the encipherment
and authentication mechanisms can be parallelized and/or
pipelined. The authentication overhead is minimal, so the
computational cost of the authenticated encryption is very nearly that
of the encryption process. Also, the authentication process remains
resistant against some IV reuse. We present a class of encryption
algorithms that are based on cryptographic hash functions. Because of
the hash function construction, the MTC4 class of methods supports
variable encryption block sizes up to twice the hash output block
length and trivially supports variable key lengths. We also provide a
more general construction for using the internal state of any
round-based block cipher as an authenticator. We give a concrete
example of the general construction that uses AES as the encryption
primitive. We provide performance measurements for all of our
constructions.
Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem
In [KK], a new identification scheme based on the Gap Diffie-Hellman problem was proposed at SCIS 2002, and it is shown that the scheme is secure against active attacks under the Gap Diffie-Hellman Intractability Assumption. Paradoxically,this identification scheme is totally breakable under passive attacks. In this paper, we show that any adversary holding only public parameters of the scheme can convince a verifier with probability 1.
Optimal Statistical Power Analysis
A classical model is used for the power consumption of cryptographic devices. It is based on the Hamming distance of the data handled with regard to an unknown but constant reference state. Once validated experimentally it allows an optimal attack to be derived called Correlation Power Analysis. It also explains the defects of former approaches such as Differential Power Analysis.
Secret sharing schemes on sparse homogeneous access structures with rank three
One of the main open problems in secret sharing is the characterization of the ideal access structures. This problem has been studied for several families of access structures with similar results. Namely, in all these families, the ideal access structures coincide with the vector space ones and, besides, the optimal information rate of a non-ideal access structure is at most .
A first approach to the solution of that problem for the family of the -homogeneous access structures is made in this paper. First, we present an ideal -homogeneous access structure that is not vector space. Afterwards, we prove that the -homogeneous access structures that can be realized by a -vector space secret sharing scheme are {\em sparse\/}, that is, any subset of four participants contains at most two minimal qualified subsets. Finally, we solve the characterization problem for the family of the sparse -homogeneous access structures. Specifically, we completely characterize the ideal access structures in this family, we prove that they coincide with the -vector space ones and, besides, we demonstrate that there is no structure in this family having optimal information rate between and . That is, we establish that the properties that were previously proved for several families also hold for the family of the sparse -homogeneous access structures.
On the random-oracle methodology as applied to length-restricted signature schemes
In earlier work, we described a ``pathological'' example of a signature scheme that is secure in the random-oracle model, but for which no secure implementation exists. For that example, however, it was crucial that the scheme is able to sign "long messages" (i.e., messages whose
length is not a-priori bounded). This left open the possibility that
the Random Oracle Methodology is sound with respect to signature schemes
that sign only "short" messages (i.e., messages of a-priori bounded length, smaller than the length of the keys in use), and are "memoryless" (i.e., the only thing kept between different signature
generations is the initial signing-key). In this work, we extend our negative result to address such signature schemes. A key ingredient in our proof is a new type of interactive proof systems, which may be of independent interest.
Last updated: 2003-08-04
Forward-Secure Hierarchical ID-Based Cryptography
We present a forward-secure hierarchical identity-based encryption (FHIBE) scheme, which is based on the hierarchical identity-based encryption (HIBE) scheme by Gentry and Silverberg. Canetti, Halevi and Katz presented a forward-secure public key encryption scheme based on HIBE scheme. They give the formal definition of Binary Encryption Tree (BET), which is a relaxed version of HIBE and is essential to their forward-secure encryption.We unify their idea with HIBE scheme, and present a forward-secure hierarchical identity-based encryption scheme. In the FHIBE scheme, secret keys of each entity on the hierarchy are updated at regular intervals throughout the lifetime of the system; furthermore, exposure of an entity's secret key corresponding to a given interval does not enable an adversary to break the ancestors of the entity for any prior time period. Entities can join in the hierarchy at any time and at any position, and are able to update their secret keys on their own once they are initialized by their parent entities. These features are important in the distributed settings.
The forward-secure hierarchical identity-based encryption scheme can be generalized into a collusion resistant multiple hierarchical identity-based encryption (MHIBE) scheme, where a message can be encrypted under multiple identities of a user.
A Tweakable Enciphering Mode
We describe a block-cipher mode of operation, CMC, that turns an n-bit block cipher into a tweakable enciphering scheme that acts on strings of mn bits, where m>=2. When the underlying block cipher is secure in the sense of a strong pseudorandom permutation (PRP), our scheme is secure in the sense of tweakable, strong PRP. Such an object can be used to encipher the sectors of a disk, in-place, offering security as good as can be obtained in this setting. CMC makes a pass of CBC encryption, xors in a mask, and then makes a pass of CBC decryption; no universal hashing, nor any other non-trivial operation beyond the block-cipher calls, is employed.
Besides proving the security of CMC we initiate a more general investigation of tweakable enciphering schemes, considering issues like the non-malleability of these objects.
A Parallelizable Enciphering Mode
We describe a block-cipher mode of operation, EME, that turns an
n-bit block cipher into a tweakable enciphering scheme that acts
on strings of mn bits, where m \in [1..n]. The mode is parallelizable, but as serial-efficient as the non-parallelizable mode CMC. EME can be used to solve the disk-sector encryption problem. The algorithm entails two layers of ECB encryption and a "lightweight mixing" in between. We prove EME secure, in the reduction-based sense of modern cryptography. We motivate some of the design choices in EME by showing that a few
simple modifications of this mode are insecure.
Breaking and Repairing Optimistic Fair Exchange from PODC 2003
In PODC 2003, Park, Chong, Siegel and Ray [PCSR03] proposed an optimistic protocol for fair exchange, based on RSA signatures. We show that their protocol is *totally breakable* already in the registration phase: the honest-but-curious arbitrator can easily determine the signer's secret key.
On a positive note, the authors of [PCSR03] informally introduced a connection between fair exchange and "sequential two-party multisignature schemes" (which we call two-signatures), but used an insecure two-signature scheme in their actual construction. Nonetheless, we show that this connection *can* be properly formalized to imply *provably secure* fair exchange protocols. By utilizing the state-of-the-art non-interactive two-signature of Boldyreva (PKC 2003), we obtain an efficient and provably secure (in the random oracle model) fair exchange protocol, which is based on GDH signatures of Boneh, Lynn and Shacham (Asiacrypt 2001).
Of independent interest, we introduce a unified model for non-interactive fair exchange protocols, which results in a new primitive we call *verifiably committed signatures*. Verifiably committed signatures generalize (non-interactive) verifiably encrypted signatures and two-signatures, both of which are sufficient for fair exchange.
Symmetric Authentication Within a Simulatable Cryptographic Library
Proofs of security protocols typically employ simple abstractions of
cryptographic operations, so that large parts of such proofs are
independent of cryptographic details. The typical abstraction is
the Dolev-Yao model, which treats cryptographic operations as a
specific term algebra. However, there is no cryptographic semantics,
i.e., no theorem that says what a proof with the Dolev-Yao
abstraction implies for the real protocol, even if provably secure
cryptographic primitives are used.
Recently we introduced an extension to the Dolev-Yao model for which
such a cryptographic semantics exists, i.e., where security is
preserved if the abstractions are instantiated with provably secure
cryptographic primitives. Only asymmetric operations (digital
signatures and public-key encryption) are considered so far. Here we
extend this model to include a first symmetric primitive,
message authentication, and prove that the extended model still has
all desired properties. The proof is a combination of a probabilistic,
imperfect bisimulation with cryptographic reductions and static
information-flow analysis.
Considering symmetric primitives adds a major complication to the
original model: we must deal with the exchange of secret keys, which
might happen any time before or after the keys have been used for
the first time. Without symmetric primitives only public keys need
to be exchanged.
ID-based tripartite key agreement with signatures
This paper proposes a new identity based tripartite key agreement protocol which is more efficient than the existing ID-based tripartite protocol. This protocol is based on the Joux's protocol for key agreement, and introduces signature along with key agreement to overcome man-in-the-middle attacks and to provide authentication. The new protocol resists existential forgeries against adaptively chosen message attacks under the random oracle model.
Elliptic curves suitable for pairing based cryptography
We give a method for constructing ordinary elliptic curves over finite
prime field with small security parameter with respect to
a prime dividing the group order such that .
A New Tree based Domain Extension of UOWHF
We present a new binary tree based parallel algorithm for extending the domain of a UOWHF. The key length expansion is m(t+O(log*(t))) bits. In particular, the key length expansion is 2m bits for t=2; m(t+1) bits for 3\leq t\leq 6 and m(t+2) bits for 7\leq t\leq 134, where m is the length of the message digest and t\geq 2 is the height of the binary tree. The previously best known binary tree algorithm required a key length expansion of m(t+[log_2 (t-1)]) bits. We also give a sufficient condition for valid domain extension in sequental domain extension.
General Composition and Universal Composability in Secure Multiparty Computation
\emph{Concurrent general composition} relates to a setting where a
secure protocol is run in a network concurrently with other,
arbitrary protocols. Clearly, security in such a setting is what is
desired, or even needed, in modern computer networks where many
different protocols are executed concurrently. Canetti (FOCS 2001)
introduced the notion of \emph{universal composability}, and showed
that security under this definition is sufficient for achieving
concurrent general composition. However, it is not known whether or
not the opposite direction also holds.
Our main result is a proof that security under concurrent general
composition, when interpreted in the natural way under the
simulation paradigm, is equivalent to a variant of universal
composability, where the only difference relates to the order of
quantifiers in the definition. (In newer versions of universal
composability, these variants are equivalent.) An important
corollary of this theorem is that existing impossibility results for
universal composability (for all its variants) are inherent for
definitions that imply security under concurrent general
composition, as formulated here. In particular, there are large
classes of two-party functionalities for which \emph{it is
impossible} to obtain protocols (in the plain model) that remain
secure under concurrent general composition. We stress that the
impossibility results obtained are not "black-box", and apply even
to non-black-box simulation.
Our main result also demonstrates that the definition of universal
composability is somewhat "minimal", in that the composition
guarantee provided by universal composability implies the definition
itself. This indicates that the security definition of universal
composability is not overly restrictive.
Trading-Off Type-Inference Memory Complexity Against Communication
While bringing considerable flexibility and extending the horizons
of mobile computing, mobile code raises major security issues.
Hence, mobile code, such as Java applets, needs to be analyzed
before execution. The byte-code verifier checks low-level security
properties that ensure that the downloaded code cannot bypass the
virtual machine's security mechanisms. One of the statically
ensured properties is {\sl type safety}. The type-inference phase
is the overwhelming resource-consuming part of the verification
process.
This paper addresses the RAM bottleneck met while verifying mobile
code in memory-constrained environments such as smart-cards. We
propose to modify classic type-inference in a way that
significantly reduces the memory consumption in the
memory-constrained device at the detriment of its distrusted
memory-rich environment.
The outline of our idea is the following, throughout execution,
the memory frames used by the verifier are MAC-ed and exported to
the terminal and then retrieved upon request. Hence a distrusted
memory-rich terminal can be safely used for convincing the
embedded device that the downloaded code is secure.
The proposed protocol was implemented on JCOP20 and JCOP30
Java cards using IBM's JCOP development tool.
On the Randomness of the Editing Generator
In their paper, G.Gong and S.Q.Jiang construct a new pseudo-random sequence generator by using two ternary linear feedback shift registers (LFSR). The new generator is called an editing generator which a combined model of the clock-controlled generator and the shrinking generator. For a special case (Both the base sequence and the control sequence are mm-sequence of degree ), the period, linear complexity, symbol distribution and security analysis are discussed in the same article. In this paper, we expand the randomness results of the edited sequence for general cases, we do not restrict the base sequence and the control sequence has the same length. For four special cases of this generator, the randomness of the edited sequence is discussed in detail. It is shown that for all four cases the editing generator has good properties, such as large periods, high linear complexities, large ratio of linear complexity per symbol, and small un-bias of occurrences of symbol. All these properties make it a suitable crypto-generator for stream cipher applications.
Permutation graphs, fast forward permutations, and
A permutation is a \emph{fast forward permutation} if for each
the computational complexity of evaluating is small
independently of and .
Naor and Reingold constructed fast
forward pseudorandom cycluses and involutions. By studying the
evolution of permutation graphs, we prove that the number of
queries needed to distinguish a random cyclus from a random
permutation in is if one does not use queries of
the form , but is only if one is allowed to
make such queries.
We construct fast forward permutations
which are indistinguishable from random
permutations even when queries of the form
are allowed.
This is done by introducing an efficient
method to sample the cycle structure of a
random permutation,
which in turn solves an open problem of Naor and Reingold.
Bernoulli numbers and the probability of a birthday surprise
A birthday surprise is the event that, given uniformly random
samples from a sample space of size , at least two of them are identical.
We show that Bernoulli numbers can be used to derive arbitrarily exact
bounds on the
probability of a birthday surprise.
This result can be used in arbitrary precision calculators, and it can
be applied to better understand some questions in
communication security and pseudorandom number
generation.
Efficient linear feedback shift registers with maximal period
We introduce and analyze an efficient family of linear
feedback shift registers (LFSR's) with maximal period.
This family is word-oriented and is suitable for implementation
in software, thus provides a solution to a recent challenge \cite{FSE94}.
The classical theory of LFSR's is extended to
provide efficient algorithms for generation of irreducible and primitive
LFSR's of this new type.
Collision Attack on Reduced-Round Camellia
Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct some efficient distinguishers between 4-round Camellia and a random permutation of the blocks space. By using collision-searching techniques, the distinguishers are used to attack on 6,7,8 and 9 rounds of Camellia with 128-bit key and 8,9 and 10 rounds of Camellia with 192/256-bit key. The 128-bit key of 6 rounds
Camellia can be recovered with chosen plaintexts and
encryptions. The 128-bit key of 7 rounds Camellia can be
recovered with chosen plaintexts and encryptions. The 128-bit key of 8 rounds Camellia can be recovered with chosen plaintexts and encryptions. The 128-bit key of 9 rounds Camellia can be recovered with chosen plaintexts and encryptions. The 192/256-bit key of 8 rounds Camellia can be recovered with chosen plaintexts and encryptions. The 192/256-bit key of 9 rounds Camellia can be recovered with chosen plaintexts and encryptions.The 256-bit key of 10 rounds Camellia can be recovered with chosen plaintexts and encryptions.
Last updated: 2003-07-18
Direct Sum of Non Normal and Normal Bent Functions Always Produces Non Normal Bent Functions
Prof. Claude Carlet has pointed out an error in Theorem 1 of the
paper. The error could not be recovered for the time being.
Thus the statement presented in the title of the paper
is not proved.
Minimum Distance between Bent and 1-resilient Boolean Functions
In this paper we study the minimum distance between the set of bent functions and the set of 1-resilient Boolean functions and present a lower bound on that. The bound is proved to be tight for functions up to input variables. As a consequence, we present a strategy to modify the bent functions, by toggling some of its outputs, in getting a large class of -resilient functions with very good nonlinearity and autocorrelation. In particular, the technique is applied upto -variable functions and we show that the construction provides a large class of -resilient functions reaching currently best known nonlinearity and achieving very low autocorrelation values which were not known earlier. The technique is sound enough to theoretically solve some of the mysteries of -variable, -resilient functions with maximum possible nonlinearity. However, the situation becomes complicated from variables and above, where
we need to go for complicated combinatorial analysis with trial and error using computational facility.
Guaranteeing the diversity of number generators
A major problem in using iterative number generators of the
form is that they can enter unexpectedly short
cycles. This is hard to analyze when the generator is designed,
hard to detect in real time when the generator is used, and can
have devastating cryptanalytic implications. In this paper we
define a measure of security, called \emph{sequence diversity},
which generalizes the notion of cycle-length for non-iterative
generators. We then introduce the class of counter assisted
generators, and show how to turn any iterative generator (even a
bad one designed or seeded by an adversary) into a counter
assisted generator with a provably high diversity, without
reducing the quality of generators which are already
cryptographically strong.
Homomorphic public-key systems based on subgroup membership problems
We describe the group structure underlying several popular homomorphic public-key systems and the problems they are based on. We prove several well-known security results using only the group structure and assumptions about the related problems.
Then we provide examples of two new instances of this group structure and analyse their security.
On the Pseudorandomness of KASUMI Type Permutations
KASUMI is a block cipher which has been adopted as a standard of 3GPP. In this paper, we study the pseudorandomness of idealized KASUMI type permutations for adaptive adversaries. We show that
the four round version is pseudorandom and the six round version is super-pseudorandom.
Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03
Uncategorized
Uncategorized
At the fourth ACM conference on electronic commerce
(EC'03), S. Han, K.Y. Yeung and J. Wang proposed an ID-based
confirmer signature scheme using pairings (actually, this is an
ID-based undeniable signature scheme). However, in this paper, we
will show that this signature scheme is not secure. The signer can
deny any signature, even this signature is his valid signature and
any one can forge a valid confirmer signature of a signer with
identity ID on an arbitrary message and confirm this signature to
the verifier.
Weak Fields for ECC
We demonstrate that some finite fields, including GF(2^210) are weak for elliptic curve cryptography in the sense that any instance of the elliptic curve discrete logarithm problem for any elliptic curve over these fields can be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. We discuss the implications of our observations to elliptic curve cryptography, and list some open problems.
Using Information Theory Approach to Randomness Testing
Uncategorized
Uncategorized
We address the problem of detecting deviations of binary sequence
from randomness,which is very important for random number (RNG)
and pseudorandom number generators (PRNG). Namely, we consider a
null hypothesis that a given bit sequence is generated by
Bernoulli source with equal probabilities of 0 and 1 and the
alternative hypothesis that the sequence is generated by a
stationary and ergodic source which differs from the source under
. We show that data compression methods can be used as a
basis for such testing and describe two new tests for randomness,
which are based on ideas of universal coding. Known statistical
tests and suggested ones are applied for testing PRNGs, which are
practically used. Those experiments show that the power of the new
tests is greater than of many known algorithms.
Certificateless Public Key Cryptography
This paper introduces the concept of 'certificateless public
key cryptography' (CL-PKC). In contrast to traditional public key
cryptographic systems, CL-PKC does not require the use of
certificates to guarantee the authenticity of public keys. It does
rely on the use of a trusted third party (TTP) who is in
possession of a master key. In these respects, CL-PKC is similar
to identity-based public key cryptography (ID-PKC). On the other
hand, CL-PKC does not suffer from the key escrow property that
seems to be inherent in ID-PKC. Thus CL-PKC can be seen as a model
for the use of public key cryptography that is intermediate
between traditional certificated PKC and ID-PKC.
We make concrete the concept of CL-PKC by introducing
certificateless public key encryption (CL-PKE), signature and key
exchange schemes. We also demonstrate how hierarchical CL-PKC can
be supported. The schemes are all derived from pairings on
elliptic curves. The lack of certificates and the desire to prove
the schemes secure in the presence of an adversary who has access
to the master key requires the careful development of new security
models. For reasons of brevity, the focus in this paper is on the
security of CL-PKE. We prove that our CL-PKE scheme is secure in a
fully adaptive adversarial model, provided that an underlying
problem closely related to the Bilinear Diffie-Hellman Problem is
hard.
Algebraic Attacks on Combiners with Memory and Several Outputs
Algebraic attacks on stream ciphers proposed by Courtois et al. recover the key by solving an overdefined system of multivariate equations. Such attacks can break several interesting cases of LFSR-based stream ciphers, when the output is obtained by a Boolean function. As suggested independently by Courtois and Armknecht, this approach can be successfully extended also to combiners with memory, provided the number of memory bits is small. At Crypto 2003, Krause and Armknecht show that, for ciphers built with LFSRs and an arbitrary combiner using a subset of k LFSR state bits, and with l memory bits, a polynomial attack always do exist when k and l are fixed. Yet this attack becomes very quickly impractical: already when k and l exceed about 4. In this paper we give a much simpler proof of this result and prove a more general theorem. We show that much faster algebraic attacks exist for any cipher that (in order to be fast) outputs several bits at a time. In practice our results substantially reduce the complexity of the best attack known on four well known constructions of stream ciphers when the number of outputs is increased. We present attacks on modified versions of Snow, E0, LILI-128, Turing, and some other ciphers.
A General Correlation Theorem
In 2001, Nyberg proved three important correlation theorems and applied
them to several cryptanalytic contexts. We continue the work of Nyberg in a more theoretical direction. We consider a general functional form and obtain its Walsh transform. Two of Nyberg's correlation theorems are seen to be special cases of our general functional form. S-box look-up, addition modulo and X-OR are three frequently occuring operations in the design of symmetric ciphers. We consider two methods of combining these operations and in each apply our main result to obtain the Walsh transform.
Assessing security of some group based cryptosystems
One of the possible generalizations of the discrete logarithm
problem to arbitrary groups is the so-called conjugacy search
problem. The computational difficulty of this problem in some
particular groups has been used in several group based cryptosystems.
Recently, a few preprints have been in circulation that suggest
various heuristic attacks on the conjugacy search problem.
The goal of the present survey is to stress a (probably well known)
fact that these heuristic attacks alone are not a threat to the
security of a cryptosystem, and, more importantly, to suggest a more
credible approach to assessing security of group based cryptosystems.
Such an approach should be necessarily based on the concept of the
average case complexity (or expected running time) of an algorithm.
These arguments support the following conclusion: although it is
generally feasible to base the security of a cryptosystem on the
difficulty of the conjugacy search problem, the group itself
(the ``platform") has to be chosen very carefully. In particular,
experimental as well as theoretical evidence collected so far
makes it appear likely that braid groups are not a good choice
for the platform. We also reflect on possible replacements.
Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols
Recently, Al-Riyami and Paterson proposed four authenticated tripartite key agreement protocols which make use of Weil pairing. In this paper, we show that the protocols are insecure against the man-in-the middle attack, key compromise impersonation attack and several known-key attacks.
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We present the first cryptographically sound security proof of the
well-known Needham-Schroeder-Lowe public-key protocol. More precisely,
we show that the protocol is secure against arbitrary active attacks
if it is implemented using provably secure cryptographic primitives.
Although we achieve security under cryptographic definitions, our
proof does not have to deal with probabilistic aspects of cryptography
and is hence in the scope of current proof tools. The reason is that
we exploit a recently proposed ideal cryptographic library, which has
a provably secure cryptographic implementation. Besides establishing
the cryptographic security of the Needham-Schroeder-Lowe protocol, our
result also exemplifies the potential of this cryptographic library
and paves the way for cryptographically sound verification of security
protocols by means of formal proof tools.
Physically Observable Cryptography
Complexity-theoretic cryptography considers only abstract notions of computation, and hence cannot protect against attacks that exploit the information leakage (via electromagnetic fields, power consumption, etc.) inherent in the physical execution of any cryptographic algorithm. Such "physical observation attacks" bypass the impressive barrier of mathematical security erected so far, and successfully break mathematically impregnable systems. The great practicality and the inherent availability of physical attacks threaten the very relevance of complexity-theoretic security.
To respond to the present crisis, we put forward physically observable cryptography: a powerful, comprehensive, and precise model for defining and delivering cryptographic security against an adversary that has access to information leaked from the physical execution of cryptographic algorithms.
Our general model allows for a variety of adversaries. In this paper, however, we focus on the strongest possible adversary, so as to capture what is cryptographically possible in the worst possible, physically observable setting. In particular, we
-- consider an adversary that has full (and indeed adaptive) access to any leaked information;
-- show that some of the basic theorems and intuitions of traditional cryptography no longer hold in a physically observable setting; and
-- construct pseudorandom generators that are provably secure against all physical-observation attacks.
Our model makes it easy to meaningfully restrict the power of our general physically observing adversary. Such restrictions may enable schemes that are more efficient or rely on weaker assumptions, while retaining security against meaningful physical observations attacks.
How Secure Are FPGAs in Cryptographic Applications?
Uncategorized
Uncategorized
The use of FPGAs for cryptographic applications is highly
attractive for a variety of reasons but at the same time there are
many open issues related to the general security of FPGAs. This
contribution attempts to provide a state-of-the-art description of
this topic. First, the advantages of reconfigurable hardware for
cryptographic applications are discussed from a systems
perspective. Second, potential security problems of FPGAs are
described in detail, followed by a proposal of a some
countermeasure. Third, a list of open research problems is
provided. Even though there have been many contributions dealing
with the algorithmic aspects of cryptographic schemes implemented
on FPGAs, this contribution appears to be the first comprehensive
treatment of system and security aspects.
Visual Crypto Displays Enabling Secure Communications
In this paper we describe a low-tech and user friendly solution for secure two-way communication between two parties over a network of untrusted devices. We present a solution in which displays play a central role. Our approach guarantees privacy and allows to check the authenticity of information presented on displays. Furthermore, we provide the user with a secure return channel. To this end we propose to provide every user with a small decryption display which is, for example, integrated in a credit card and requires very limited computing power. The authentication and security are based on visual cryptography which was first introduced by Naor and Shamir in 1994. We solve some practical shortcomings of traditional visual cryptography and develop protocols for two-way authentication and privacy in untrusted environments.
An identity-based ring signature scheme from bilinear pairings
At the conference Asiacrypt 2001, Rivest, Shamir and Tauman firstly addressed the concept of ring signature. In this paper we propose an identity-based ring signature scheme from bilinear pairings. As compared with the Zhang-Kim scheme (presented at the conference Asiacrypt 2002), our scheme is more efficient in computation and requires fewer pairing operations.
A New ID-based Group Signature Scheme from Bilinear Pairings
Uncategorized
Uncategorized
We argue that traditional ID-based systems from pairings seem unsuitable for designing group signature schemes due to the problem of key escrow. In this paper we propose new ID-based public key systems without trustful KGC from bilinear pairings. In our new ID-based systems, if dishonest KGC impersonates an honest user to
communicate with others, the user can provide a proof of treachery of the KGC afterwards, which is similar to CA-based systems. Furthermore, we propose a group signature scheme under the new systems, the security and performance of which rely on the new systems. The size of the group public key and the length of the signature are independent on the numbers of the group.
Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols
In this paper, we show that the Nalla-Reddy's one round ID-based tripartite authenticated key agreement protocols are still insecure against the man-in-the-middle attacks. We also break the Nalla's ID-based tripartite authenticated key agreement protocol with signatures.
Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions
The cryptographic concept of simulatability has become a salient
technique for faithfully analyzing and proving security properties of
arbitrary cryptographic protocols. We investigate the relationship
between simulatability in synchronous and asynchronous frameworks by
means of the formal models of Pfitzmann et. al., which are seminal in
using this concept in order to bridge the gap between the
formal-methods and the cryptographic community. We show that the
synchronous model can be seen as a special case of the asynchronous
one with respect to simulatability, i.e., we present an embedding
between both models that we show to preserve simulatability. We show
that this result allows for carrying over lemmas and theorems that
rely on simulatability from the asynchronous model to its synchronous
counterpart without any additional work. Hence future work can
concentrate on the more general asynchronous case, without having to
neglect the analysis of synchronous protocols.
Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings
Recently, Shim proposed a tripartite authenticated key agreement protocol from Weil pairing to overcome the security flaw in Joux's protocol. Later, Shim also proposed an ID-based authenticated key agreement protocol which is an improvement of Smart's protocol in order to provide the forward secrecy. In this paper, we show that these two protocols are insecure against the key-compromise impersonation attack and the man-in-the-middle attack respectively.
Accumulating Composites and Improved Group Signing
Constructing practical and provably secure group signature schemes has been
a very active research topic in recent years. A group signature can be viewed
as a digital signature with certain extra properties. Notably, anyone can
verify that a signature is generated by a legitimate group member, while the
actual signer can only be identified (and linked) by a designated entity
called a group manager. Currently, the most efficient group signature scheme
available is due to Camenisch and Lysyanskaya \cite{CL02}. It is obtained
by integrating a novel dynamic accumulator with the scheme by
Ateniese, et al. \cite{ACJT00}.
In this paper, we construct a dynamic accumulator that
accumulates \emph{composites}, as opposed to previous accumulators that
accumulated \emph{primes}. We also present an efficient method for proving
knowledge of factorization of a committed value. Based on these (and other)
techniques we design a novel provably secure group signature scheme. It
operates in the \emph{common auxiliary string} model and offers two important
benefits: 1) the {\sf Join} process is very efficient: a new
member computes only a single exponentiation, and 2) the (unoptimized) cost of
generating a group signature is 17 exponentiations which is appreciably less than
the state-of-the-art.
Last updated: 2006-01-07
Further Cryptanalysis of some Proxy Signature Schemes
Uncategorized
Uncategorized
Proxy signature is a signature that an original signer delegates his or her signing capability to a proxy signer, and then the proxy signer creates a signature on behalf of the original signer. However, Sun et al.[7] showed that the proxy and multi-proxy signatures of Lee et al.[3], and the strong proxy signature scheme with proxy signer privacy protection of Shum et al.[6] are not against the original signer's forgery attack, so these schemes do not process the property of unforgeability. In this paper, we present an extensive forgery method on these schemes, which makes the forgery method of Sun et al.be a special case of ours.
Proposal on Personal Authentication System in which Biological Information is embedded in Cryptosystem Key
Biometric personal authentication systems have a common problem --- the biological information can easily be stolen by other individuals. In line with the process of the activities for the international standardization of the biometric system, this paper proposes a typical way to embed biological information, whatever its kind, into cryptographic keys as a measure for privacy protection and against unauthorized use. We believe that our proposal presents the following advantages: the improvement of protecting the privacy of biological information, economical effectiveness resulting from the practical use of the infrastructure of Public Key Infrastructure (PKI) as a biological information database, and humanity given to a man-machine interface by embedding an individual's biological information into a public key, an important element of the system. This paper also proposes how to build up a practical personal authentication system through the method proposed.
Crytanalysis of SAFER++
This paper presents several multiset and boomerang attacks on SAFER++ up to 5.5 out of its 7 rounds. These are the best known attacks for this cipher and significantly improve the previously known results. The attacks in the paper are practical up to 4 rounds. The methods developed to attack SAFER++ can be applied to other substitution-permutation networks with incomplete diffusion.
Novel Cyclic and Algebraic Properties of AES
Rijndael, or the Advanced Encryption Standard, is an interesting
cipher from a designer's viewpoint. Over the last few decades, the
most notable, and successful attacks against the best block
ciphers were linear and differential cryptanalysis. On the other
hand, Rijndael is designed from the ground up to resist these
attacks, as well as many others, by employing special algebraic
properties of its primitive operations. The byte inversion
operation over finite field was chosen by its
designer to thwart all possibly useful linear and difference
invariances, the basic ingredients of linear and differential
cryptanalysis. However, by using simple algebraic operations with
known properties, the combinations of them may possess many
interesting, and unexpected, algebraic properties that were not
known at design time. This paper presents such new unknown
properties on the combinations of primitive operations of AES.
Fujisaki-Okamoto IND-CCA hybrid encryption revisited
At Crypto'99, Fujisaki and Okamoto~\cite{FO99} presented a nice generic transformation from weak asymmetric and symmetric schemes into an IND-CCA hybrid encryption scheme in the Random Oracle Model.
From this transformation, two specific candidates to standardization were designed:
EPOC-2~\cite{EPOC} and PSEC-2~\cite{PSEC}, based on Okamoto-Uchiyama and El Gamal primitives, respectively.
Since then, several cryptanalysis of EPOC have been published, one in the Chosen Ciphertext Attack game and others making use of a poor implementation that is vulnerable to reject timing attacks.
The aim of this work is to avoid these attacks from the generic transformation, identifying the properties that an asymmetric scheme must hold to obtain a secure hybrid scheme.
To achieve this, some ambiguities in the proof of the generic transformation~\cite{FO99} are described, which can lead to false claims.
As a result the original conversion is modified and the range of asymmetric primitives that can be used is shortened.
In second place, the concept of {\it Easy Verifiable Primitive} is formalized, showing its connection with the Gap problems.
Making use of these ideas, a {\it new} security proof for the modified transformation is given.
The good news is that the reduction is {\it tight}, improving the concrete security claimed in the original work for the Easy Verifiable Primitives.
For the rest of primitives the concrete security is improved at the cost of stronger assumptions.
Finally, the resistance of the new conversion against reject timing attacks is
addressed.
CWC: A high-performance conventional authenticated encryption mode
We introduce CWC, a new block cipher mode of operation for protecting both the privacy and the authenticity of encapsulated data. CWC is currently the only such mode having all five of the following properties: provable security, parallelizability, high performance in hardware, high performance in software, and no intellectual property concerns. We believe that having all five of these properties makes CWC a powerful tool for use in many performance-critical cryptographic applications. CWC is also the only appropriate solution for some applications; e.g., standardization bodies like the IETF and NIST prefer patent-free modes, and CWC is the only such mode capable of processing data at 10Gbps in hardware, which will be important for future IPsec (and other) network devices. As part of our design, we also introduce a new parallelizable universal hash function optimized for performance in both hardware and software.
On Diophantine Complexity and Statistical Zero-Knowledge Arguments
We show how to construct practical honest-verifier statistical zero-knowledge \emph{Diophantine} arguments of knowledge (HVSZK AoK) that a committed tuple of integers belongs to an arbitrary language in bounded arithmetic. While doing this, we propose a new algorithm for computing the Lagrange representation of nonnegative integers and a new efficient representing polynomial for the exponential relation. We apply our results by constructing the most efficient known HVSZK AoK for non-negativity and the first constant-round practical HVSZK AoK for exponential relation. Finally, we propose the outsourcing model for cryptographic protocols and design communication-efficient versions of the Damgård-Jurik multi-candidate voting scheme and of the Lipmaa-Asokan-Niemi st-price auction scheme that work in this model.
New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing
Uncategorized
Uncategorized
Proxy signatures are very useful tools when one needs to delegate
his/her signing capability to other party. After Mambo 's
first scheme was announced, many proxy signature schemes and
various types of proxy signature schemes have been proposed. Due
to the various applications of the bilinear pairings in
cryptography, there are many ID-based signature schemes have been
proposed. In this paper, we address that it is easy to design
proxy signature and proxy blind signature from the conventional
ID-based signature schemes using bilinear pairings, and give some
concrete schemes based on existed ID-based signature schemes. At
the same time, we introduce a new type of proxy signature -- proxy
ring signature, and propose the first proxy ring signature scheme
based on an existed ID-based ring signature scheme.
Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols
In this paper we propose security analysis on passive attack for
Nalla-Reddy's ID-AK-2 and ID-AK-3 protocols.
Length-Based Attacks for Certain Group Based Encryption Rewriting Systems
In this note, we describe a probabilistic attack on public key cryptosystems based on the word/conjugacy problems for finitely presented groups of the type proposed recently by Anshel, Anshel and Goldfeld. In such a scheme, one makes use of the property that in the given group the word problem has a polynomial time solution, while the conjugacy problem has no known polynomial solution. An example is the braid group from topology in which the word problem is solvable in polynomial time while the only known solutions to the conjugacy problem are exponential. The attack in this paper is based on having a canonical representative of each string relative to which a length function may be computed. Hence the term length attack. Such canonical representatives are known to exist for the braid group.
Last updated: 2003-05-27
Cryptanalysis of HFE
Out of the public key ( ) we recover a
polynomial of the same shape as the private polynomial. Then we give
an algorithm for solving such a special-form polynomial. This fact
puts an eavesdropper in the same position with a legitimate user in
decryption. An upper bound for the complexity of that all is
bit operations for the degree of the field
extension.
Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model
Until recently, most research on the topic of secure computation focused on the stand-alone model, where a single protocol execution takes place. In this paper, we construct protocols for the setting of {\em bounded-concurrent self composition}, where a (single) secure protocol is run many times concurrently, and there is a predetermined bound on the number of concurrent executions. In short, we show that {\em any} two-party functionality can be securely computed under bounded-concurrent self composition, in the {\sf plain model} (where the only setup assumption made is that the parties communicate via authenticated channels). Our protocol provides the first feasibility result for general two-party computation in the plain model, {\em for any model of concurrency}. All previous protocols assumed a trusted setup phase in order to obtain a common reference string. On the downside, the number of rounds of communication in our protocol is super-linear in the bound on the number of concurrent executions. However, we believe that our constructions will lead to more efficient
protocols for this task.
Algorithms in Braid Groups
Braid Groups have recently been considered for use in Public-Key
Cryptographic Systems. The most notable of these system has been the
Birman-Ko-Lee system presented at Crypto 2000. This article gives a brief introduction into braid groups and the hard problems on which public key systems have been defined. It suggests a canonical form max run form using the Artin generators and supplies some supporting algorithms necessary for cryptographic operations.
Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format
Vaudenay has shown in [5] that a CBC encryption mode ([2], [9]) combined with the PKCS#5 padding [3] scheme allows an attacker to invert the underlying block cipher, provided she has access to a valid-padding oracle which for each input ciphertext tells her whether the corresponding plaintext has a valid padding or not. Having on mind the countermeasures against this attack, different padding schemes have been studied in [1]. The best one is referred to as the ABYT-PAD. It is designed for byte-oriented messages. It removes the valid-padding oracle, thereby defeating Vaudenay's attack, since all deciphered plaintexts are valid in this padding scheme. In this paper, we try to combine the well-known cryptographic message syntax standard PKCS#7 [8] with the use of ABYT-PAD instead of PKCS#5. Let us assume that we have access to a PKCS#7CONF oracle that tells us for a given ciphertext (encapsulated in the PKCS#7 structure) whether the deciphered plaintext is correct or not according to the PKCS#7 (v1.6) syntax. This is probably a very natural assumption, because applications usually have to reflect this situation in its behavior. It could be a message for the user, an API error message, an entry in the log file, different timing behavior, etc. We show that access to such an oracle again enables an attacker to invert the underlying block cipher. The attack requires single captured ciphertext and approximately 128 oracle calls per one ciphertext byte. It shows that we cannot hope to fully solve problems with side channel attacks on the CBC encryption mode by using a “magic” padding method or an obscure message-encoding format. Strong cryptographic integrity checks of ciphertexts should be incorporated instead.
Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic Curves
It is widely believed that genus four hyperelliptic curve
cryptosystems (HECC) are not attractive for practical applications
because of their complexity compared to systems based on lower
genera, especially elliptic curves. Our contribution shows that
for low cost security applications genus-4 hyperelliptic curves
(HEC) can outperform genus-2 HEC and that we can achieve a
performance similar to genus-3 HEC. Furthermore our implementation
results show that a genus-4 HECC is an alternative cryptosystem to
systems based on elliptic curves.
In the work at hand we present for the first time explicit
formulae for genus-4 HEC, resulting in a 60% speed-up compared to
the best published results. In addition we implemented genus-4
HECC on a Pentium4 and an ARM microprocessor. Our implementations
on the ARM show that for genus four HECC are only a factor of 1.66
slower than genus-2 curves considering group order ~2^{190}.
For the same group order ECC and genus-3 HECC are about
a factor of 2 faster than genus-4 curves on the ARM. The two most
surprising results are: 1) for low cost security application,
namely considering an underlying group of order 2^{128}, HECC
with genus 4 outperform genus-2 curves by a factor of 1.46 and has
similar performance to genus-3 curves on the ARM and 2) when
compared to genus-2 and genus-3, genus-4 HECC are better suited to
embedded microprocessors than to general purpose processors.
Secure Proxy Signature Schemes for Delegation of Signing Rights
A proxy signature scheme permits an entity to
delegate its signing rights to another entity. These schemes have
been suggested for use in numerous applications, particularly in
distributed computing. But to date, no proxy signature schemes
with guaranteed security have been proposed; no precise
definitions or proofs of security have been provided for such
schemes. In this paper, we formalize a notion of security for
proxy signature schemes and present provably-secure schemes. We
analyze the security of the well-known delegation-by-certificate
scheme and show that after some slight but important
modifications, the resulting scheme is secure, assuming the
underlying standard signature scheme is secure. We then show that
employment of the recently introduced aggregate signature schemes
permits bandwidth and computational savings. Finally, we analyze
the proxy signature scheme of Kim, Park and Won, which offers
important performance benefits. We propose modifications to this
scheme that preserve its efficiency, and yield a proxy signature
scheme that is provably secure in the random-oracle model, under
the discrete-logarithm assumption.
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
A (public key) Trace and Revoke Scheme combines the functionality
of broadcast encryption with the capability of traitor tracing.
Specifically, (1) a trusted center publishes a single public key
and distributes individual secret keys to the users of the system;
(2) anybody can encrypt a message so that all but a specified
subset of ``revoked'' users can decrypt the resulting ciphertext;
and (3) if a (small) group of users combine their secret keys to
produce a ``pirate decoder'', the center can trace at least one of
the ``traitors'' given access to this decoder.
We construct the first chosen ciphertext (CCA2) secure Trace and
Revoke Scheme based on the DDH assumption. Our scheme is also the
first adaptively secure scheme, allowing the adversary to corrupt
players at any point during execution, while prior works (e.g.,
[NP00,TT01]) only achieves a very weak form of non-adaptive
security even against chosen plaintext attacks. In fact, no CCA2
scheme was known even in the symmetric setting.
Of independent interest, we present a slightly simpler
construction that shows a ``natural separation'' between the
classical notion of CCA2 security and the recently proposed
[Sho01,ADR02] relaxed notion of gCCA2 security.
Trace Zero Subvariety for Cryptosystems
Uncategorized
Uncategorized
We present a kind of group suitable for cryptographic
applications: the trace zero subvariety. The construction is
based on Weil descent from curves of genus two over
extension fields , .
On the Jacobian of the curve the group can be seen as a prime order
subgroup, however, considering the construction as Weil descent we
can argue that the security is equivalent to that of groups based on
low-genus hyperelliptic curves over prime fields.
The advantage is that the complexity to compute scalar multiples
is lower, as one can make use of the Frobenius
endomorphism of the initial curve.
Thus the trace zero subvariety can be used efficiently in protocols
based on the discrete logarithm problem.
Simple Stateless Steganography
We put forward the first secret-key steganographic construction that is
both black-box (i.e., the sender need not have knowledge of the
channel beyond the ability to sample from it) and stateless (i.e.,
the sender and the recipient need not maintain synchronized state when
sending multiple bits). Both of these properties are important: the first
because in many settings it is unrealistic to assume detailed knowledge of
the underlying channel distribution, and the second because maintaining
synchronized state between the sender and the recipient is particularly
problematic in steganography, where communication to resynchronize will
alert the adversary.
For channels of sufficient entropy, our construction is more efficient than
previous black-box constructions. Moreover, it is the first one to
provide a
tradeoff between the number of samples the encoder needs and the rate at
which hiddentext is transmitted.
Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol
This paper analyses the authentication and key agreement protocol adopted by
Universal Mobile Telecommunication System (UMTS), an emerging standard for
third generation (3G) wireless communications. The protocol, known as
{\em 3GPP AKA}, is based on the security framework of GSM and provides significant enhancement to address and correct real and perceived weaknesses in GSM and other wireless communication systems. In this paper, we show that 3GPP AKA is vulnerable to a variant of false base station attack. The vulnerability allows an adversary to re-direct user traffic to an unintended network. It also allows an adversary to use authentication vectors obtained from a corrupted network to impersonate all other networks. In addition, we show that the need of synchronization between a mobile station and its home network incurs considerable difficulty for the normal operation of 3GPP AKA. To provide further enhancement on 3GPP AKA, we
present an authentication and key agreement protocol which defeats
re-direction attack and drastically lowers the impact of network corruption. The proposed protocol also eliminates synchronization between a mobile station and its home network. Following the multi-party simulatability approach, we have developed a formal model of security for symmetric-key based authentication and key agreement protocols in the mobile setting. Within this model, we have analyzed the security of our protocol against a powerful adversary having full control of the communication channels between a user and a network.
Sequential Aggregate Signatures from Trapdoor Permutations
An aggregate signature scheme (recently proposed by Boneh, Gentry,
Lynn and Shacham) is a method for combining signatures from
different signers on different messages into one signature of unit
length. We propose \emph{sequential aggregate signatures}, in which
the set of signers is ordered. The aggregate signature is computed by
having each signer, in turn, add his signature to it. We show how to
realize this in such a way that the size of the aggregate signature is
independent of . This makes sequential aggregate signatures a
natural primitive for certificate chains, whose length can be reduced
by aggregating all signatures in a chain. We give a construction
based on families of certified trapdoor permutations, and show how to
instantiate our scheme based on RSA.
A Structured Multisignature Scheme from the Gap Diffie-Hellman Group
In this paper, the authors propose a new structured multisignature scheme that considers the signing order among co-signers. The proposed scheme can resolve signing structures of serial, parallel, and the mix of them. Moreover, the size and the verification of a structured multisignature is the same as those of an individual signature generated by any co-signer. Arithmetically, the proposed scheme makes use of the Gap Diffie-Hellman (GDH) signature scheme recently presented by Boneh, Shacham, and Lynn. Due to the underlying GDH group, our scheme has the merits of simplicity in construction and efficiency in performance.
Efficient Public Key Generation for Multivariate Cryptosystems
Asymmetric cryptographic systems using multivariate polynomials over finite fields
have been proposed several times since the 1980s. Although some of them have been
successfully broken, the area
is still vital and promises interesting algorithms with low computational costs,
short message, and signature sizes.
In this paper, we present two novel strategies
``base transformation" and ``adapted evaluation"
for the generation of the public key in such schemes.
We demonstrate both at the example of
the Hidden Field Equations (HFE)
system and outline how they can be adapted to similar
systems.
In addition, we compare the running
time of the previously known technique ``polynomial interpolation"
with our new developments
both from a theoretical perspective and by empirical studies.
These experiments confirm our theoretical studies, namely, base transformation
is faster than polynomial interpolation. Especially the first step is
while it is for polynomial interpolation where denotes
the number of variables. Moreover, the running
time of polynomial interpolation is approximately 30\% higher than for base transformation.
Elliptic Curve Point Multiplication
A method for elliptic curve point multiplication is proposed with complex multiplication by Sqrt[-2] or by (1+Sqrt[-7])/2 instead of point duplication, speeding up multiplication about 1.34 times. Higher radix makes it possible to use one point duplication instead of two and to speed up computation about 1.6 times. We employ prime group order factorization in corresponding quadratic order and integer exponent reduction modulo quadratic prime in the Euclidean imaginary quadratic ring.
A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack
We study elliptic curve cryptosystems by first investigating the schemes defined over and
show that the scheme is provably secure against adaptive chosen cipher-text attack under the decisional
Diffie-Hellman assumption. Then we derive a practical elliptic curve cryptosystem by making use of some nice
elliptic curve where the decisional Diffie-Hellman assumption is reserved.
On the Selection of Pairing-Friendly Groups
We propose a simple algorithm to select group generators suitable for pairing-based cryptosystems. The selected parameters are shown to favor implementations of the Tate pairing that are at once conceptually simple and efficient, with an observed performance about 2 to 10 times better than previously reported implementations, depending on the embedding degree. Our algorithm has beneficial side effects: various non-pairing operations become faster, and bandwidth may be saved.
A defect of the implementation schemes of the TTM cryptosystem
We show all the existing TTM implementation schemes have a defect that there exist linearization equations
which are satisfied by the components of the ciphers of the TTM schemes. We further demonstrate that, for the case of the most recent two implementation schemes in two versions of the paper \cite{CM}, where the inventor of TTM used them to refute a claim in \cite{CG}, if we do a linear substitution with the linear equations derived from the linearization equations for a given ciphertext, we can find the plaintext easily by an iteration of the procedure of first search for linear equations by linear combinations and then linear substitution. The computation complexity of the attack on these two schemes is less than over a finite field of size .
Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem
A Tamed Transformation Method (TTM) cryptosystem was proposed by T.T.Moh
in 1999. We describe how the first implementation scheme of the TTM system can be defeated. The computational complexity of our attack is computations on the finite field with elements.
A Forward-Secure Public-Key Encryption Scheme
Cryptographic computations are often carried out on insecure devices
for which the threat of key exposure represents a serious and
realistic concern. In an effort to mitigate the damage caused by
exposure of secret keys stored on such devices, the paradigm of
\emph{forward security} was introduced. In a forward-secure scheme,
secret keys are updated at regular periods of time; exposure of the
secret key corresponding to a given time period does not enable an
adversary to ``break'' the scheme (in the appropriate sense) for
any \emph{prior} time period. A number of constructions of
forward-secure digital signature schemes, key-exchange protocols,
and symmetric-key schemes are known.
We present the first non-trivial constructions of (non-interactive)
forward-secure public-key encryption schemes. Our main construction
achieves security against chosen-plaintext attacks under the decisional
bilinear Diffie-Hellman assumption in the standard model. This
scheme is practical, and all parameters grow at most logarithmically
with the total number of time periods. We also give a slightly more
efficient scheme in the random oracle model. Both our schemes can be
extended to achieve security against chosen-ciphertext attacks and to
support an unbounded number of time periods.
Toward our goal, we introduce the notion of \emph{binary tree
encryption} and show how to construct a binary tree encryption scheme
in the standard model. This new primitive may be of independent
interest. In particular, we use it to construct the first known example
of a (hierarchical) identity-based encryption scheme that is secure
in the standard model. (Here, however, the notion of security we
achieve is slightly weaker than what is achieved in some previous constructions
in the random oracle model.)
Stronger Security Bounds for OMAC, TMAC and XCBC
OMAC, TMAC and XCBC are CBC-type MAC schemes which are provably secure for arbitrary message length. In this paper, we present a more tight upper bound on for each scheme,
where denotes the maximum success (forgery) probability of adversaries. Our bounds are expressed in terms of
the \textit{total length} of all queries of an adversary to the MAC generation oracle while the previous bounds are expressed in terms of the \textit{maximum length} of each query. In particular, a significant improvement occurs if the lengths of queries are heavily unbalanced.
Primitive Specification for SOBER-128
SOBER-128 joins the SOBER family of stream ciphers, with the added functionality of incorporating a Message Authentication Code generator if required. SOBER-128 draws on the research into the previous SOBER ciphers: the design does not differ significantly from its predecessor SOBER-t32. The biggest change is the replacement of the stuttering with a strengthened non-linear function. SOBER-128 is faster and more secure than SOBER-t32.
Non-interactive and Reusable Non-malleable Commitment Schemes
We consider non-malleable (NM) and universally composable (UC)
commitmentschemes in the common reference string (CRS) model.
We show how to construct non-interac\-tive NM commitments that
remain non-malleable even if the adversary has access to an
arbitrary number of commitments from honest players - rather than
one, as in several previous schemes. We show this is a strictly
stronger security notion. Our construction is the first
non-interactive scheme achieving this that can be based
on the minimal assumption of existence of one-way
functions. But it can also be instantiated in a very efficient
version based on the strong RSA assumption. For UC commitments,
we show that existence of a UC commitment scheme in the CRS model
(interactive or not) implies key exchange and - for a uniform
reference string - even implies oblivious transfer. This indicates
that UC commitment is a strictly stronger primitive than NM. Finally,
we show that our strong RSA based construction can be used to improve
the most efficient known UC commitment scheme so it can work with
a CRS of size independent of the number of players, without loss of
efficiency.
Fast arithmetic on Jacobians of Picard curves
In this paper we present a fast addition algorithm in the Jacobian of a Picard curve over a finite field of characteristic different from . This algorithm has a nice geometric interpretation, comparable to the classic "chord and tangent" law for the elliptic curves. Computational cost for addition is and for doubling.
Relation among simulator-based and comparison-based definitions of semantic security
This paper studies the relation among simulator-based and
comparison-based definitions of semantic security.
The definitions are considered in a more general framework
than the ordinal one; namely, an adversary is assumed to have
access to prior information of a plaintext.
If the framework is restricted to the ordinal one,
then all the security notions considered in this paper,
including indistinguishability, are shown to be equivalent.
On the other hand, the equivalence is not necessarily
valid in the general framework.
In fact, it is shown that no encryption scheme is secure
in the sense of comparison-based semantic security
in the strongest forms. Furthermore, a sufficient condition
for the equivalence between semantic security
and indistinguishability is derived.
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid Encryption Problem
Uncategorized
Uncategorized
We present a simple, natural random-oracle (RO) model
scheme, for a practical goal, that is uninstantiable,
meaning is proven in the RO model to meet its goal yet admits
NO standard-model instantiation that meets this goal. The
goal in question is IND-CCA-preserving asymmetric
encryption which formally captures security of the most common
practical usage of asymmetric encryption, namely to transport a
symmetric key in such a way that symmetric encryption under the
latter remains secure. The scheme is an ElGamal variant, called
Hash ElGamal, that resembles numerous existing RO-model schemes,
and on the surface shows no evidence of its anomalous properties.
More generally, we show that a certain goal, that we call
key-verifiable, ciphertext-verifiable IND-CCA-preserving
asymmetric encryption, is achievable in the RO model (by Hash
ElGamal in particular) but unachievable in the standard model.
This helps us better understand the source of the anomalies in
Hash ElGamal and also lifts our uninstantiability result from
being about a specific scheme to being about a primitive or goal.
These results extend our understanding of the gap between the
standard and RO models, and bring concerns raised by previous work
closer to practice by indicating that the problem of RO-model
schemes admitting no secure instantiation can arise in domains
where RO schemes are commonly designed.
Goldbach’s Conjecture on ECDSA Protocols
In this paper, an algorithm on Goldbach’s conjecture is newly defined for computing a large even number as a sum of two primes or a sum of prime and composite. Using the conjecture, an ECDSA (Elliptic Curve Digital Signature Algorithm) protocol is newly proposed for authentication. The protocol describes the process of key generation, signature generation and signature verification as well as security issues.
Almost Security of Cryptographic Boolean Functions
Divisible Voting Scheme
Electronic voting is a prime application of cryptographic tools. Many researches are addressing election or confidence voting in this area.
We address a new type of voting scheme ``Divisible Voting Scheme,'' in which each voter has multiple ballots where the number of ballots can be different among the voters. This type of voting is popular, however there is no secure protocol which achieves this type of voting.
We first define the divisible voting scheme and show naive protocols based on existing voting schemes. Then we propose two efficient divisible voting schemes. The first scheme uses multisets, the second scheme uses -adic representation of number of ballots.
The total cost for a voter is in the first scheme and in the second scheme where is the number of candidates to vote for and is the number of ballots for a voter.
A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures
Mambo et al [6-7] introduced a proxy signature scheme. Neuman [8] extended the scheme for delegation by warrant, which was further extended by Kim et al [4] to partial delegation with a warrant. In this paper we propose a new type of digital proxy signature scheme in which the warrant message can be recovered from the proxy signature. In this scheme the warrant message is conveyed within the proxy signature and recovered by the verifier, i.e., the warrant need not be hashed or sent along with the proxy signature. It saves
both communication bandwidth and storage space.
Proxy Blind Signature Scheme
Blind signature is the concept to ensure anonymity of e-coins. Untracebility and unlinkability are two main properties of real coins, which require mimicking electronically. Whenever a user is
permitted to spend an e-coin, he is in need to fulfill above requirements of blind signature. This paper proposes a proxy blind signature scheme with which a proxy is able to make proxy blind
signature which verifier is able to verify in a way similar to proxy signature schemes.
How to Protect Against a Militant Spammer
We consider how to avoid unsolicited e-mail -- so called spam -- in a stronger adversarial model than has previously been considered. Our primary concern is the proposal of an architecture and of protocols preventing against successful spamming attacks launched by a strong attacker. This attacker is assumed to control the communication media and to be capable of corrupting large numbers of protocol participants. Additionally, the same architecture can be used as a basis to support message integrity and privacy, though this is not a primary goal of our work. This results in a simple and efficient solution that is largely backwards-compatible, and which addresses many of the concerns surrounding e-mail communication.
A Critique of CCM
CCM is a conventional authenticated-encryption scheme obtained from a
128-bit block cipher. The mechanism has been adopted as the mandatory
encryption algorithm in an IEEE 802.11 draft standard [15], and its use
has been proposed more broadly [16,17]. In this note we point out a
number of limitations of CCM. A related note provides an alternative
to CCM [5].
EAX: A Conventional Authenticated-Encryption Mode
We propose a block-cipher mode of operation, called EAX, for
authenticated-encryption with associated-data (AEAD). Given a nonce N, a
message M, and a header H, the mode protects the privacy of M and the
authenticity of both M and H. Strings N,M,H 2\lceil |M|/n \rceil + \lceil |H|/n\rceil + \lceil |N|/n\rceil$ block-cipher
calls when these strings are nonempty and n is the block length of the
underlying block cipher. Among EAX's characteristics are that it is on-line
(the length of a message isn't needed to begin processing it) and a fixed
header can be pre-processed, effectively removing the per-message cost of
binding it to the ciphertext. EAX is obtained by instantiating a simple
generic-composition method, and then collapsing its two keys into one. EAX is
provably secure under a standard complexity-theoretic assumption.
EAX was designed in response to the expressed need of several
standardization bodies, including NIST, IETF and IEEE 802.11, for a patent-free
AEAD scheme. Such a scheme would have to be conventional, meaning it
would make two passes, one aimed at achieving privacy and one aimed at
achieving authenticity. EAX aims to fill this need by doing as well as
possible within the space of conventional schemes with regard to issues of
efficiency, simplicity, elegance, ease of correct use, and provable-security
guarantees. EAX is an alternative to CCM.
On the Security of Some Proxy Signature Schemes
Uncategorized
Uncategorized
Digital signature scheme is an important research topic in cryptography. An ordinary digital signature scheme allows a signer to create signatures of documents and the generated signatures can be verified by any person. A proxy signature scheme, a variation of ordinary digital signature scheme, enables a proxy signer to sign messages on behalf of the original signer. To be used in different applications, many proxy signatures were proposed. In this paper, we review Lee et al.'s strong proxy signature scheme, multi-proxy signature scheme, and its application to a secure mobile agent, Shum and Wei's privacy protected strong proxy signature scheme, and Park and Lee's nominative proxy signature scheme, and show that all these proxy signature schemes are insecure against the original signer's forgery. In other words, these schemes do not possess the unforgeability property which is a desired security requirement for a proxy signature scheme.
Forking Lemmas in the Ring Signatures' Scenario
Pointcheval and Stern introduced in 1996 some forking lemmas useful to prove the security of a family of digital signature schemes. This family includes, for example, Schnorr's scheme and a modification of ElGamal signature scheme.
In this work we generalize these forking lemmas to the ring signatures' scenario. In a ring signature scheme, a signer in a subset (or {\it ring}) of potential signers produces a signature of a message in such a way that the receiver can verify that the signature comes from a member of the ring, but cannot know which member has actually signed.
We propose a new ring signature scheme, based on Schnorr signature scheme, which provides unconditional anonymity. We use the generalized forking lemmas to prove that this scheme is existentially unforgeable under adaptive chosen-message attacks, in the random oracle model.
Signcryption scheme for Identity-based Cryptosystems
An Identity-based cryptosystem is a Public Key cryptosystem in which the public keys of the entities are their identities, or strings derived from their identities. Signcryption combines digital signatures and encryption with a cost significantly smaller than that required for signature-then-encryption. This paper proposes an ID-based signcryption scheme based on bilinear pairings on elliptic curves. It is shown that the new scheme is an improved version of the existing signcryption scheme [10] by comparing the computations in both the schemes.
- « Previous
- 1
- 2
- 3
- Next »