360 likes | 511 Views
Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation. Mark Manulis , Bertram Poettering ASIACCS ‘11 Proceedings of the 6 th ACM Symposium on Information, Computer and Communications Security, March 2011, Pages 286-295, Citation: 4 Presenter: 方竣民
E N D
Practical Affiliation-Hiding Authenticationfrom Improved Polynomial Interpolation Mark Manulis, Bertram Poettering ASIACCS ‘11 Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, March 2011, Pages 286-295, Citation:4 Presenter: 方竣民 Date: 2012/12/03
Outline • Introduction • Initial Technique • Polynomial Interpolation • Optimized Multi-Group AH Protocol • Analysis • Conclusion
Outline • Introduction • Initial Technique • Polynomial Interpolation • Optimized Multi-Group AH Protocol • Analysis • Conclusion
Introduction • Affiliation-hiding (AH) protocols are valuable for hiding identities of communicating users behind their membership of groups. • Improvements advance the area of efficient polynomial interpolation in finite fields.
Introduction You will see : • Implementing polynomial interpolation by lots of mathematical ways and their pseudocode. • One optimized multi-group Affiliation-hiding protocol.
Outline • Introduction • Initial Technique • Polynomial Interpolation • Optimized Multi-Group AH Protocol • Analysis • Conclusion
Index-Hiding Message Encoding Indices , messages Two algorithms iEncode and iDecode
Multi-Group AH Protocol • GA creates public key (n,e,g) • n is the RSA modulus • e the public exponent • g a generator of a large subgroup of • GA keeps private key d • Membership credential cred = • Pseudonym id • , is random exponent t is used to generate session key.
Outline • Introduction • Initial Technique • Polynomial Interpolation • Optimized Multi-Group AH Protocol • Analysis • Conclusion
Interpolation Without Precomputation • As Algorithm1, it has quadratic running time • Algo1 already solves the problem of polynomial interpolation in reasonable time.
Interpolation Without Precomputation • Most divisions can be replaced by multiplications, e.g. • It is solved by algorithm2 with performance: • But, algorithm2 needs extra storage for n-1 variables
Interpolation With Precomputation • In some occasions polynomial interpolations have to be computed many times in succession.
Compare Algo2 and Algo3 • Device: Intel XEON 2.66GHz. • Using gcryptlibrary. Algorithm2 Algorithm3
Interleaved IHME • These fields may become rather large, e.g. . • IHME’s running time is still ,so it will be very slow.
Interleaved IHME For instance, an IHME setting with and Could split all messages into 8 chunks Each of length We get new field • The gain in efficiency might be superlinear.
V-fold IHME => => is a prime, is a nature number. index space message space
Comparison v-fold/IHME by Algo2,3 80*14=1120
Outline • Introduction • Initial Technique • Polynomial Interpolation • Optimized Multi-Group AH Protocol • Analysis • Conclusion
Group Initialization Phase • Performance in this phase is not very important, because it is only executing once. • They improve on storage size of group parameters.
Group Initialization Phase • A safe prime is a prime number such that ,where is a prime as well.
User Registration Phase • By altering the generation of user credentials to: cred = with
Multi-Group Handshake Protocol • Users have a set • at least; in first-round messages are encoded over a much small field of elements
Multi-Group Handshake Protocol • In second-round, the per-group key confirmation messages are of length • Where bits would suffice. • It mades the field size to be elements.
Outline • Introduction • Initial Technique • Polynomial Interpolation • Optimized Multi-Group AH Protocol • Analysis • Conclusion
Analysis Symmetric Key Size Is it possible < ? Asymmetric Key Size
Outline • Introduction • Initial Technique • Polynomial Interpolation • Optimized Multi-Group AH Protocol • Analysis • Conclusion
Conclusion • They heavily modified the group management and handshake algorihms to achieve considerably better performance. • It showed that AH authentication in the multi-group setting, and provided appropriate performance measurements .