180 likes | 300 Views
Identity based s ignature s chemes by using p airings. Parshuram Budhathoki Department of M athematical S cience FAU 02/21/2013. Goal:. Alice wants to send a message to Bob. S he wants to make sure that Bob could verify it, and no one can change the message during the process.
E N D
Identity based signature schemes by using pairings ParshuramBudhathokiDepartment of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU
Goal: Alice wants to send a message to Bob. She wants to make sure that Bob could verify it, and no one can change the message during the process. So, she signs her message by using her identity. • Possible Identity : • email id : alice@fau.edu • phone : 561297alice • Address : 777 Glades Road Bob Now after getting message, Bob uses Alice’s identity to verify either its from Alice or someone else. And he could verify that it is written by Alice. ID based signature scheme Alice Cyber Security Seminar, FAU
Outline: • Signature Scheme in ID Based Cryptography • Pairings • Hash Functions • Attack Model • Secure Scheme • Diffie-Hellman Problem • Hess’s Scheme Cyber Security Seminar, FAU
Signature Scheme in ID Based Cryptography: • Setup • Extract • Sign • Verify Cyber Security Seminar, FAU
Signature Scheme in ID Based Cryptography: 2.Extract Trust Authority (TA) 1. Setup Secret Key 3. Sign Public Parameter 4. Verify Private Key for Alice Verify ( Signature, ID ) ID:= alice@fau.edu Verifier Signature:=Sign( Message, Private Key ) Alice Cyber Security Seminar, FAU
Pairing e(P,Q) Range Domain Domain Domain P e V G1 G G Domain Q G2 Cyber Security Seminar, FAU
Pairing Let (G,+) and (V, ∙ ) denote cyclic groups of prime order q , P ∈ G, a generator of G and a pairing e: G x G V isa map which satisfies the followingproperties: Bilinearity : ∀ P, Q , R ∈ G we have e(P+R, Q)= e(P,Q) e(R,Q) and e(P, R+Q)= e(P,R) e(P,Q) 2) Non-degeneracy : There exists P, Q ∈ G such that e(P,Q) ≠1. e is efficiently computable. Cyber Security Seminar, FAU
Hash Functions: Range H H(x) Fixed size Domain No Inverse x Any size Cyber Security Seminar, FAU
Hash Function: • One way transformation • Input := Random size, Output:= Fixed size • H(x1 ) = H(x2) for x1 ≠ x2 , Not possible Cyber Security Seminar, FAU
Private key for ID1 AttackModel: Signature for ID2 and message M GAME Here is the hash value of this & that … Challenger Setup Give me a private key for ID1 Give me a hash value for this and that … Public Parameters Give me a signature for ID2 and message M Adversary Cyber Security Seminar, FAU
AttackModel: GAME Adversary outputs ( ID, M, Signature ) , such that ID and (ID, M) are not equal to the inputs of any query. And, Adversary wins the game if Signature is a valid signature for ID and M. Adversary Cyber Security Seminar, FAU
Secure Scheme We say ID based signature scheme is secure against existential forgery on adaptively chosen message and ID attacks if no polynomial time adversary has a non-negligible probability of success against a challenger in previous Game. Cyber Security Seminar, FAU
Diffie-Hellman Problem: Let G be a cyclic group of order q with generator P. The Diffie-Hellman Problem (DHP) in G is to find, on input (aP, bP, P), with uniformly and independently chosen a,b from {1,…, q}, the value abP. Cyber Security Seminar, FAU
Hess Scheme Let (G, +) and (V,.) denote cyclic groups of prime order q such that G = <P>, and let e: G × G V be a pairing. • The hash functions : • h: {0,1}* × V Zq* • H: {0,1}* G* Where G* := G\{0} Assumption : DHP in G is hard. Cyber Security Seminar, FAU
Hess Scheme: TA • Setup Algorithm: • Chooses s from Zq* • Master Key := s • Public key Q:= sP 2.Extract Master Key=s 1. Setup 3. Sign Public Key Q= sP 4. Verify Extract Algorithm: SID := s H(ID) SID Verify Algorithm: Compute r = e(U, P) e(H(ID), -Q)V Accept the signature if V = h(M, r) ID:= alice@fau.edu Verifier Sign Algorithm: Alice picks random k from Zq* r = e(SID , P )k V = h(M, r) U = (V + k) SID Alice Signature := (U, V) Cyber Security Seminar, FAU
Correctness of Verification : e ( U, P) . e(H(ID), -Q)V = e ( (V + k) sH(ID), P ) . e( H(ID), -sP)V= e( H(ID), P)s(V+k) e(H(ID), P)-sV = e(H(ID), P)sk = e(sH(ID), P)k = r 2. Accepts if V= h(M, r) Cyber Security Seminar, FAU
Summary • Did we achieve our goal ? • Do we know any Id based signature scheme ? • We have proposed an Id based signature scheme !!! Cyber Security Seminar, FAU
Questions ? Thank You Cyber Security Seminar, FAU