All papers (Page 227 of 24087 results)
How to Generate Universally Verifiable Signatures in Ad-Hoc Networks
This paper addresses the problem of making signatures of one domain (an ad-hoc network) available in another domain (the Internet).
Universal verifiability is a highly desirable property when signed documents need to be permanently non-repudiable so as to prevent dishonest signers from disavowing signatures they have produced. As a practical solution, we construct a new signature scheme where a valid signature should be generated by a couple of distinct signing keys. In the random oracle model, the signature scheme is provably secure in the sense of existential unforgeability under adaptive chosen message attacks assuming the hardness of the computational Diffie-Hellman problem in the Gap Diffie-Hellman groups.
Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing
Side-channel attacks are easy-to-implement whilst powerful attacks against cryptographic implementations, and their targets range from primitives, protocols, modules, and devices to even systems. These attacks pose a serious threat to the security of cryptographic modules. In consequence, cryptographic implementations have to be evaluated for their resistivity against such attacks and the incorporation of different countermeasures has to be considered. This paper surveys the methods and techniques employed in these attacks, the destructive effects of such attacks, the countermeasures against such attacks and evaluation of their feasibility and applicability. Finally, the necessity and feasibility of adopting this kind of physical security testing and evaluation in the development of FIPS 140-3 standard are explored. This paper is not only a survey paper, but also more a position paper.
On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version)
Prouff has introduced recently, at FSE 2005, the notion of transparency order of S-boxes. This new characteristic is related to the ability of an S-box, used in a cryptosystem in which the round keys are introduced by addition, to thwart single-bit or multi-bit DPA attacks on the system. If this parameter has sufficiently small value, then the S-box is able to withstand DPA attacks without that ad-hoc modifications in the implementation be necessary (these modifications make the encryption about twice slower). We prove lower bounds on the transparency order of highly nonlinear S-boxes. We show that some highly nonlinear functions (in odd or even numbers of variables) have very bad transparency orders: the inverse functions (used as S-box in the AES), the Gold functions and the Kasami functions (at least under some assumption).
A New Short Signature Scheme Without Random Oracles from Bilinear Pairings
Uncategorized
Uncategorized
In this paper, we propose a new signature scheme that is
existentially unforgeable under a chosen message attack without random oracle. The security of our scheme depends on a
new complexity assumption called the $k$+1 square roots
assumption. We also discuss the relationship between the $k$+1
square roots assumption and some related problems and provide some
conjectures. Moreover, the $k$+1 square roots assumption can be
used to construct shorter signatures under the random oracle
model. As some applications, a new chameleon hash signature scheme
and a on-line/off-line signature scheme and a new efficient
anonymous credential scheme based on the proposed signature scheme
are presented.
Practical Group Signatures without Random Oracles
Uncategorized
Uncategorized
We provide a construction for a
group signature scheme that is provably secure in a universally composable framework,
within the standard model with trusted parameters.
Our proposed scheme is fairly simple and its efficiency falls
within small factors of the most efficient group signature schemes
with provable security in any model (including random oracles).
Security of our constructions require new
cryptographic assumptions, namely the Strong LRSW, EDH, and Strong SXDH assumptions. Evidence for any assumption we introduce is provided by proving hardness in the generic group model.
Our second contribution is the first definition of security for group signatures based on the simulatability
of real protocol executions in an ideal setting that captures
the basic properties of unforgeability, anonymity, unlinkability, and exculpability for
group signature schemes.
Some Explicit Formulae of NAF and its Left-to-Right Analogue
Non-Adjacent Form (NAF) is a canonical form of signed binary representation of integers. We present some explicit formulae of NAF and its left-to-right analogue (FAN) for randomly chosen n-bit integers. Interestingly, we prove that the zero-run length appeared in FAN is asymptotically 16/7, which is longer than that of the standard NAF. We also apply the proposed formulae to the speed estimation of elliptic curve cryptosystems.
Key Mixing in Block Ciphers through Addition modulo $2^n$
The classical technique to perform key mixing in block ciphers
is through exclusive-or (exor). In this paper we show that
when the $n$-bit key is mixed in a block cipher of size $n$
bits via addition modulo $2^n$, the bias of the linear approximations
falls exponentially fast. Experimental results have been provided
to show that such a scheme cannot be cryptanalyzed
using Linear Cryptanalysis.
One-Wayness Equivalent to General Factoring
This paper shows the first practical semantically secure public-key encryption scheme such that its one-wayness is equivalent to
{\it general} factoring in the {\it standard} model (in the sense of IND-CPA).
Next our proof technique is applied to Rabin-Paillier encryption scheme and a variant of RSA-Paillier encryption scheme to prove their exactly tight one-wayness.
Compact Group Signatures Without Random Oracles
We present the first efficient group signature scheme that is provably
secure without random oracles. We achieve this result by combining
provably secure hierarchical signatures in bilinear groups with a
novel adaptation of the recent Non-Interactive Zero Knowledge proofs
of Groth, Ostrovsky, and Sahai. The size of signatures in our scheme is
logarithmic in the number of signers; we prove it secure under the
Computational Diffie-Hellman and the Subgroup Decision assumptions in
the model of Bellare, Micciancio, and Warinshi, as relaxed by Boneh,
Boyen, and Shacham.
Breaking RSA May Be As Difficult As Factoring
If factoring is hard, this paper shows that straight line programs cannot efficiently solve the low public exponent RSA problem. More precisely, no efficient algorithm can take an RSA public key as input and then output a straight line program that efficiently solves the low public exponent RSA problem for the given public key --- unless factoring is easy.
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs
The standard class of adversaries considered in cryptography is that of {\em strict} polynomial-time probabilistic machines. However, {\em expected} polynomial-time machines are often also considered. For example, there are many zero-knowledge protocols for which the only known simulation techniques run in expected (and not strict) polynomial time. In addition, it has been shown that expected polynomial-time simulation is {\em essential} for achieving constant-round black-box zero-knowledge protocols. This reliance on expected polynomial-time simulation introduces a number of conceptual and technical difficulties. In this paper, we develop techniques for dealing with expected polynomial-time adversaries in simulation-based security proofs.
A New Protocol for Conditional Disclosure of Secrets And Its Applications
Many protocols that are based on homomorphic encryption are private only if a client submits inputs from a limited range $S$. Conditional disclosure of secrets (CDS) helps to overcome this restriction. In a CDS protocol for a set $S$, the client obtains server's secret if and only if the client's inputs belong to $S$ and thus the server can guard itself against malformed queries. We extend the existing CDS protocols to work over additively homomorphic cryptosystems for every set from $NP/poly$. The new construction is modular and easy to apply. As an example, we derive a new oblivious transfer protocol with log-squared communication and a millionaire's protocol with logarithmic communication. We also implement private, universally verifiable and robust multi-candidate electronic voting so that all voters only transmit an encryption of their vote. The only hardness assumption in all these protocols is that the underlying public-key cryptosystem is IND-CPA secure and the plaintext order does not have small factors.
Exclusion-Intersection Encryption
Identity-based encryption (IBE) has shown to be a useful cryptographic scheme enabling secure yet flexible role-based access control. We propose a new variant of IBE named as exclusion-intersection encryption: during encryption, the sender can specify the targeted groups that are legitimate and interested in reading the documents; there exists a trusted key generation centre generating the intersection private decryption keys on request. This special private key can only be used to decrypt the ciphertext which is of all the specified groups' interests, its holders are excluded from decrypting when the documents are not targeted to all these groups (e.g., the ciphertext of only a single group's interest). While recent advances in cryptographic techniques (e.g., attribute-based encryption or wicked IBE) can support a more general access control policy, the private key size may be as long as the number of attributes or identifiers that can be specified in a ciphertext, which is undesirable, especially when each user may receive a number of such keys for different decryption power. One of the applications of our notion is to support an ad-hoc joint project of two or more groups which needs extra helpers that are not from any particular group. We also present an online/offline variant such that encryption can be computed quickly after offline pre-computation.
Representing small identically self-dual matroids by self-dual codes
The matroid associated to a linear code is the representable matroid that is defined by the columns of any generator matrix. The matroid associated to a self-dual code is identically self-dual, but it is not known whether every identically self-dual representable matroid can be represented by a self-dual code.
This open problem was proposed by Cramer et al ("On Codes, Matroids and Secure Multi-Party Computation from Linear Secret Sharing Schemes", Crypto 2005), who proved it to be equivalent to an open problem on the complexity of multiplicative linear secret sharing schemes.
Some contributions to its solution are given in this paper. A new family of identically self-dual matroids that can be represented by self-dual codes is presented. Besides, we prove that every identically self-dual matroid on at most eight points is representable by a self-dual code.
Truncated differential cryptanalysis of five rounds of Salsa20
We present an attack on Salsa20 reduced to five of its twenty rounds. This attack uses many clusters of truncated differentials and requires 2^{165} work and 2^{6} plaintexts.
Computation of Tate Pairing for Supersingular Curves over characteristic 5 and 7
We compute Tate pairing over supersingular elliptic curves via the generic BGhES\cite{BGES} method for $p=5,7$. In those cases, the point multiplication by $p$ is efficiently computed by the Frobenius endomorphism. The function in a cycle can be efficiently computed by the method of continued fraction.
Efficient Broadcast Encryption Scheme with Log-Key Storage
In this paper, we present a broadcast encryption scheme with efficient transmission cost under the \emph{log-key} restriction. Given $n$ users and $r$ revoked users, our scheme has the transmission cost of $O(r)$ and requires the storage of $O(\log n)$ keys at each receiver. These are optimal complexities in broadcast encryptions using one-way hash functions (or pseudo-random generators.) To achieve these complexities, the stratified subset difference (SSD) scheme and the $\overline{B1}$ scheme were introduced by Goodrich et al. and Hwang et al. respectively. However,
their schemes have the disadvantage that transmission cost increases linearly according to the number of stratifications. By assigning the related keys between stratifications, our scheme remedies the defect and achieves very efficient transmission cost even in an environment where the key storage is restricted. To the best of our knowledge, our scheme has the most efficient transmission cost in the existing schemes with log-key storage. In addition, our result is comparable to other schemes that allow a large key storage.
Secret color images sharing schemes based on XOR operation
Uncategorized
Uncategorized
This paper presents two new constructions for the secret color images sharing schemes .One is a (n, n) threshold scheme, which can be constructed based on XOR operation. The other is a (2, n) threshold scheme, which can be constructed by using AND and XOR operations. The two schemes have no pixel expansion, and the time complexity for constructing shared images is O(k1n), excluding the time needed for generating n distinct random matrices (here k1 is the size of the shared image). The reconstructed images can be obtained in the two schemes by using the XOR operation alone. The relative differences of the two schemes are 1 and 1/2, respectively. The time complexity of the recovered images is O(k1n) and O(2k1), respectively. The two schemes also provide perfect secrecy.
On a Traitor Tracing Scheme from ACISP 2003
At ACISP 2003 conference, Narayanan, Rangan and Kim proposed a secret-key traitor tracing scheme used for pay TV system. In this note, we point out a flaw in their scheme.
Resource Fairness and Composability of Cryptographic Protocols
We introduce the notion of {\em resource-fair} protocols.
Informally, this property states that if one party learns the
output of the protocol, then so can all other parties, as long as
they expend roughly the same amount of resources. As opposed to
similar previously proposed definitions, our definition follows
the standard simulation paradigm and enjoys strong composability
properties. In particular, our definition is similar to the
security definition in the universal composability (UC) framework,
but works in a model that allows any party to request additional
resources from the environment to deal with dishonest parties that
may prematurely abort.
In this model we specify the ideally fair functionality as
allowing parties to ``invest resources'' in return for outputs,
but in such an event offering all other parties a fair deal. (The
formulation of fair dealings is kept independent of any particular
functionality, by defining it using a ``wrapper.'') Thus, by
relaxing the notion of fairness, we avoid a well-known
impossibility result for fair multi-party computation with
corrupted majority; in particular, our definition admits
constructions that tolerate arbitrary number of corruptions. We
also show that, as in the UC framework, protocols in our framework
may be arbitrarily and concurrently composed.
Turning to constructions, we define a ``commit-prove-fair-open''
functionality and design an efficient resource-fair protocol that
securely realizes it, using a new variant of a cryptographic
primitive known as ``time-lines.'' With (the fairly wrapped
version of) this functionality we show that some of the existing
secure multi-party computation protocols can be easily transformed
into resource-fair protocols while preserving their security.
Secure and {\sl Practical} Identity-Based Encryption
In this paper, we present a variant of Waters' Identity-Based
Encryption scheme with a much smaller public-key size (only a few
kilobytes). We show that this variant is semantically secure against
passive adversaries in the standard model.\smallskip
In essence, the new scheme divides Waters' public key size by a
factor $\ell$ at the cost of (negligibly) reducing security by
$\ell$ bits. Therefore, our construction settles an open question
asked by Waters and constitutes the first fully secure {\sl
practical} Identity-Based Encryption scheme.
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks
We introduce new methods for detecting control-flow side channel attacks, transforming C source code to eliminate such attacks, and
checking that the transformed code is free of control-flow side channels. We model control-flow side channels with a program counter
transcript, in which the value of the program counter at each step is
leaked to an adversary. The program counter transcript model captures a class of side channel attacks that includes timing attacks and error
disclosure attacks. We further show that the model formalizes previous
ad hoc approaches to preventing side channel attacks. We then give
a dynamic testing procedure for finding code fragments that may reveal
sensitive information by key-dependent behavior, and we show our method finds side channel vulnerabilities in real implementations of IDEA and RC5, in binary modular exponentiation, and in the lsh implementation of the ssh protocol.
Further, we propose a generic source-to-source transformation that produces programs provably secure against control-flow side channel attacks. We implemented this transform for C together with a static checker that conservatively checks x86 assembly for violations of program counter security; our checker allows us to compile with optimizations while retaining assurance the resulting code is
secure. We then measured our technique's effect on the performance of
binary modular exponentiation and real-world implementations in C of RC5 and IDEA: we found it has a performance overhead of at most 5X and a stack space overhead of at most 2X. Our approach to side channel security is practical, generally applicable, and provably secure against an interesting class of side channel attacks.
Searchable Keyword-Based Encryption
Uncategorized
Uncategorized
To solve the problem of searching on encrypted data, many keyword search schemes have been proposed in recent years. The goal of such schemes is to enable a user to give an untrusted storage server the ability only to test whether an encrypted document contains a few keywords without learning anything else about the document. In this paper, we are concerned with decrypting the searched results as well as searching for desired documents. In the previously proposed schemes, except for the work by Waters et al.[WBDS04], a user decrypts searched documents using his private key, $A_{priv}$, or a symmetric key. Our another goal is to enable a user to give a proxy the ability to decrypt only the ciphertexts containing desired keywords, but not other ciphertexts. We propose a new mechanism, Searchable Keyword-Based Encryption (SKBE) which satisfies both the above goals. As a result of adding the delegation of decryption ability, our mechanism works more securely and efficiently in several
applications, such as email gateways, secure audit logs, and decryption key delegation systems, than any of the previously proposed schemes. We formalize this mechanism, define its security model and propose an efficient construction whose security is proved in a random oracle model under the Bilinear Diffie-Hellman Inversion assumption. The scheme is constructed based on the Public Key Encryption with Conjunctive Field Keyword Search scheme in [PKL04] by
using a hybrid encryption technique.
Efficient Compilers for Authenticated Group Key Exchange
In this paper we propose two compilers which are designed to transform a group key exchange protocol secure against any passive adversary into an authenticated group key exchange protocol with key confirmation which is secure against any passive adversary, active adversary, or malicious insider. We show that the first proposed compiler gives protocols that are more efficient than those produced by the compiler of Katz and Yung. The second proposed compiler further reduces the computational complexity of the output protocols by using a Trusted Third Party (TTP). We moreover show that, although the protocols produced by the novel compilers have lower computational complexity than the protocols produced by the Katz-Yung compiler, the protocols nevertheless achieve key confirmation, unlike the protocols output by the Katz-Yung compiler.
Derandomization in Cryptography
We give two applications of Nisan--Wigderson-type ("non-cryptographic") pseudorandom generators in cryptography. Specifically, assuming the existence of an appropriate NW-type generator, we construct:
A one-message witness-indistinguishable proof system for every language in NP, based on any trapdoor permutation. This proof system does not assume a shared random string or any setup assumption, so it is actually an "NP proof system."
A noninteractive bit commitment scheme based on any one-way function.
The specific NW-type generator we need is a hitting set generator fooling nondeterministic circuits. It is known how to construct such a generator if ETIME = DTIME(2^O(n)) has a function of nondeterministic circuit complexity 2^\Omega(n) (Miltersen and Vinodchandran, FOCS `99).
Our witness-indistinguishable proofs are obtained by using the NW-type generator to derandomize the ZAPs of Dwork and Naor (FOCS `00). To our knowledge, this is the first construction of an NP proof system achieving a secrecy property.
Our commitment scheme is obtained by derandomizing the interactive commitment scheme of Naor (J. Cryptology, 1991). Previous constructions of noninteractive commitment schemes were only known under incomparable assumptions.
Additive Proofs of Knowledge - A New Notion For Non-Interactive Proofs
Uncategorized
Uncategorized
In this paper, we study the opacity property of verifiably encrypted signatures (VES) of Boneh et al. (proposed in Eurocrypt 2003). Informally, opacity implies that although some given aggregate signatures can verified, no useful information about the individual signatures is leaked. However, the very fact that an aggregate signature can be verified leaks certain information - that the individual signature is indeed well-formed. Apart from this, is there any other information leaked? In this paper, we show that there is absolutely no other information leaked about the individual signatures when the aggregation contains only two signatures. In more formal terms, we show that VES are Zero-Knowledge (ZK). We then extend the ZK property of VES to propose efficient Additive Non-Interactive Witness-Indistinguishable (A-NIWI) proofs. Intuitively an A-NIWI proof can be considered as a Proof of Knowledge (PoK) of another A-NIWI proof.
Elliptic Curves with Low Embedding Degree
Motivated by the needs of the {\it pairing based cryptography\/}, Miyaji, Nakabayashi and Takano have suggested a construction of so-called MNT elliptic curves with low embedding degree. We give some heuristic arguments which suggest that there are only about $z^{1/2+o(1)}$ of MNT curves with complex multiplication discriminant up to $z$. We also show that there are very few finite fields over which elliptic curves with small embedding degree and small complex multiplication discriminant may exist (regardless of the way they are constructed).
On a (Flawed) Proposal to Build More Pairing-Friendly Curves
In a recent letter, Cui, Duan and Chan propose a generalisation of the Scott-Barreto method to build a larger family of MNT curves, and they claim that their proposal is also applicable to other curve construction methods. Here we show that the Cui-Duan-Chan technique is irrecoverably flawed.
Strict Avalanche Criterion Over Finite Fields
Uncategorized
Uncategorized
Boolean functions on $GF(2)$ which satisfy the Strict Avalanche
Criterion ($SAC$) play an important
role in the art of information security. In this paper, we extend the conception
$SAC$ to finite fields $GF(p)$. A necessary and sufficient condition is given by
using spectral analysis. Also, based on an interesting permutation
polynomial theorem, we prove various facts about ($n-1$)-th order $SAC$ functions on
$GF(p)$. We also construct many such functions.
Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security
Uncategorized
Uncategorized
A tree-based key transport protocol is presented which can be seen as a generalizing variant of the star- and tree-based protocols proposed by Burmester and Desmedt at EUROCRYPT '94. Our scheme does not rely on the availability of globally verifiable signatures or arbitrary point-to-point connections, and its security against active adversaries is proven in the standard model under the Decision Diffie Hellman assumption.
An infinite class of quadratic APN functions which are not equivalent to power mappings
We exhibit an infinite class of almost
perfect nonlinear quadratic polynomials from $\mathbb{F}_{2^n}$ to
$\mathbb{F}_{2^n}$ ($n\geq 12$, $n$ divisible by 3 but not by 9).
We prove that these functions are EA-inequivalent to any power
function. In the forthcoming version of the present paper we will
proof that these functions are CCZ-inequivalent to any Gold
function and to any Kasami function, in particular for $n=12$,
they are therefore CCZ-inequivalent to power functions.
Normal Basis Multiplication Algorithms for GF(2n) (Full Version)
Uncategorized
Uncategorized
In this paper, we propose a new normal basis multiplication algorithm for GF(2n). This algorithm can be used to design not only fast software algorithms but also low complexity bit-parallel multipliers in some GF(2n)s. Especially, for some values of n that no Gaussian normal basis exists in GF(2n), i.e., 8|n, this algorithm provides an alternative way to construct low complexity normal basis multipliers. Two improvements on a recently proposed software normal basis multiplication algorithm are also presented. Time and memory complexities of these normal basis multiplication algorithms are compared with respect to software performance. It is shown that they have some specific behavior in different applications. For example, GF(2571) is one of the five binary fields recommended by NIST for ECDSA (Elliptic Curve Digital Signature Algorithm) applications. In this field, our experiments show that the new algorithm is even faster than the polynomial basis Montgomery multiplication algorithm: 525 us v. 819 us.
Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings
Recently, a number of ID-based two-party
authenticated key agreement protocols which make of bilinear
pairings have been proposed \cite {CJL,MB,Sh,S,X}. In this paper, we
show that the Xie's protocol \cite {X} does not provide implicit key
authentication and key-compromise impersonation resilience. Also, we
point out the vulnerability of the Choi {\it et al}'s protocol \cite
{CJL} against signature forgery attacks.
Exponential Memory-Bound Functions for Proof of Work Protocols
In Year 2005, Internet users were twice more likely to receive
unsolicited electronic messages, known as spams, than regular emails.
Proof of work protocols are designed to deter such phenomena
and other denial-of-service attacks by requiring computed stamps
based on hard-to-solve problems with easy-to-verify solutions.
As cpu-intensive computations are badly hit over time by Moore's law,
memory-bound computations have been suggested to deal with heterogeneous hardware.
We introduce new practical, optimal, proven and possibly memory-bound
functions suitable to these protocols,
in which the client-side work to compute the response is intrinsically
exponential with respect to the server-side work needed to set or check the challenge.
One-way non-interactive solution-verification variants are also presented.
Although simple implementations of such functions are bound
by memory latency, optimized versions are shown to be bound
by memory bandwidth instead.
ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks
ID-based encryption allows for a sender to encrypt a message to an identity without access to a public key certificate. Based on the bilinear pairing, Boneh and Franklin proposed the first practical ID-based encryption scheme and used the padding technique of Fujisaki-Okamto to extend it to be a chosen ciphertext secure version. In this letter, we would like to use another padding technique to propose a new ID-based encryption scheme secure against chosen ciphertext attacks. The security of our scheme is based on the Gap bilinear Diffie-Hellman assumption in the random oracle model.
Pairing-Based Two-Party Authenticated Key Agreement Protocol
To achieve secure data communications, two parties should be authenticated by each other and agree on a secret session key by exchanging messages over an insecure channel. In this paper, based on the bilinear pairing, we present a new two-party authenticated key agreement protocol, and use the techniques from provable security to examine the security of our protocol within Bellare-Rogaway model.
On the Security of A Group Signature Scheme
Uncategorized
Uncategorized
As a special digital signature, a group signature scheme al-
lows a group member to sign message on behalf of the group in an anony-mous and unlinkability way, In case of a dispute, the group manager can reveal the actual identity of signer. Anonymity and unlinkability are
basic properties of group signature, which distinguish other signature
scheme. Recently, based on the work of Camenisch and Lysyanskaya,
which is known to be the most e±cient scheme so far, E.Y.Choi et.al
propose an e±cient group signature scheme with member revocation at
TrustBus 2005. Unfortunately, in this work we show that the scheme
has linkability, Namely, any one can distinguish whether two di®erent
group signatures are produced by the same signer, and that the revo-
cation manager cannot trace the actual identity of a signer by a group
signature. Finally, we give the corresponding attack to the scheme.
Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations
In this paper we propose a definition and construction of a new
family of one-way candidate functions ${\cal R}_N:Q^N \rightarrow
Q^N$, where $Q=\{0,1,\ldots,s-1\}$ is an alphabet with $s$
elements. Special instances of these functions can have the
additional property to be permutations (i.e. one-way
permutations). These one-way functions have the property that for
achieving the security level of $2^n$ computations in order to
invert them, only $n$ bits of input are needed. The construction
is based on quasigroup string transformations. Since quasigroups
in general do not have algebraic properties such as associativity,
commutativity, neutral elements, inverting these functions seems
to require exponentially many readings from the lookup table that
defines them (a Latin Square) in order to check the satisfiability
for the initial conditions, thus making them natural candidates
for one-way functions.
Errors in Computational Complexity Proofs for Protocols
Uncategorized
Uncategorized
Proofs are invaluable tools in assuring protocol implementers about the security properties of protocols. However, several instances of undetected flaws in the proofs of protocols (resulting in flawed protocols) undermine the credibility of provably-secure protocols. In this work, we examine several protocols with claimed proofs of security by Boyd & Gonzalez Nieto (2003), Jakobsson & Pointcheval (2001), and Wong & Chan (2001), and an authenticator by Bellare, Canetti, & Krawczyk (1998). Using these protocols as case studies, we reveal previously unpublished flaws in these protocols and their proofs. We hope our analysis will enable similar mistakes to be avoided in the future.
Is SHA-1 conceptually sound?
Uncategorized
Uncategorized
We argue that if the message expansion code of SHA-1 is replaced
by a linear code with a better minimum distance, then the resulting
hash function is collision resistant. To support this argument,
we characterize the disturbance vectors which are used to build
local collision attacks as a linear code. This linear code is the xor-sum of two codes, the message expansion code and a linear code representing the underlying block cipher in SHA-1.
We also show that the following constraint satisfaction problem is
$\np$-hard. The constraints are restricted to being XOR constraints,
or Majority constraints on at most three variables each. The
instances are further restricted by requiring that the constraints
can be listed in a sequence C_1, C_2,...,C_m, such that for
every constraint C_i, two of the variables in it occur only in
constraints C_j, with |j-i|< 48. This problem is similar to the
problem modeling the one-way function property of SHA-1.
Oblivious Transfer and Linear Functions
We study unconditionally secure 1-out-of-2 Oblivious Transfer (1-2 OT). We first point out that a standard security requirement for 1-2 OT of bits, namely that the receiver only learns one of the bits sent, holds if and only if the receiver has no information on the XOR of the two bits. We then generalize this to 1-2 OT of strings and show that the security can be characterized in terms of binary linear functions. More precisely, we show that the receiver learns only one of the two strings sent if and only if he has no information on the result of
applying any binary linear function (which non-trivially depends on both inputs) to the two strings.
We then argue that this result not only gives new insight into the nature of 1-2 OT, but it in particular provides a very powerful tool for analyzing 1-2 OT protocols. We demonstrate this by showing that with our characterization at hand, the reduceability of 1-2 OT (of strings) to a wide range of weaker primitives follows by a very simple argument. This is in sharp contrast to previous literature, where reductions of 1-2 OT to weaker flavors have rather complicated and sometimes even incorrect proofs.
Last updated: 2006-07-17
On Proofs of Security for Certificateless Cryptosystems
Certificateless public-key encryption has recently been proposed as an attractive alternative to certificate-based and identity-based encryption schemes. The attraction of certificateless PKE is that it combines the implicit public key authentication of an identity-based scheme with the escrow-free property of a certificate-based scheme. However, all the certificateless schemes that have been thusfar presented have either had the security proved in a reduced security model, or have relied on the random oracle model. Indeed, some authors have gone as far as suggesting that it is impossible to prove the full security of a certificateless scheme in the standard model. This paper examines this claim and comes to the conclusion that, while some provable security techniques may be denied to us, there is no reason why the security of a certificateless scheme cannot be proven in the standard model.
Last updated: 2006-08-23
Knapsack Diffie-Hellman: A New Family of Diffie-Hellman
Diffie-Hellman problems have been widely involved in the design of
various cryptographic protocols. Its general family is based on the
discrete logarithm over a finite field. Since 2000, its another
family which is based on elliptic curve discrete logarithm as well
as bilinear pairing, e.g. Weil or Tate pairing, has been attracted
significant studies. Thereafter, various cryptographic protocols
have been proposed using Diffie-Hellman problem associated with
bilinear pairings. This paper we will present a new family of
Diffie-Hellman problem by utilizing subset sum problem. It is named
as Knapsack Diffie-Hellman Problems with bilinear pairings. We will
propose a number of definitions on the family and then analyze their
relationships.
Batch Verification of Validity of Bids in Homomorphic E-auction
Bid opening in e-auction is efficient when a homomorphic secret sharing function is employed to seal the bids and homomorphic secret reconstruction is employed to open the bids. However, this high efficiency is based on an assumption: the bids are valid (e.g. within a special range). An undetected invalid bid can compromise correctness and fairness of the auction. Unfortunately, validity verification of the bids is ignored in the auction schemes employing homomorphic secret sharing (called homomorphic auction in this paper). In this paper, an attack against the homomorphic auction in the absence of bid validity check is presented and a necessary bid validity check mechanism is proposed. Then a batch cryptographic technique is introduced and applied to improve the efficiency of bid validity check.
Group Signatures with Efficient Concurrent Join
A group signature is a basic privacy mechanism. The group joining operation
is a critical component of such a scheme. To date all secure
group signature schemes either employed a trusted-party aided join operation
or a complex joining protocol requiring many interactions between the prospective user
and the Group Manager (GM).
In addition no efficient scheme employed a join protocol proven secure against
adversaries that have the capability
to dynamically initiate multiple concurrent join sessions during an attack.
This work presents the first efficient group signature scheme with a simple
Joining protocol that is based on a ``single message and signature response''
interaction between the prospective user and the GM. This single-message and
signature-response
registration paradigm where no other actions are taken, is
the most efficient possible join interaction and was originally alluded to
in 1997 by Camenisch and Stadler, but its efficient instantiation
remained open till now.
The fact that joining has two short communication flows and does not require secure
channels is highly advantageous:
for example, it allows users to easily join by a
proxy (i.e., a security officer of a company can send a file with all
registration requests in his company and get back their certificates
for distribution back to members of the company). It further allows
an easy and non-interactive global system re-keying operation as well
as straightforward treatment of multi-group signatures.
We present a strong security model for group signatures (the first
explicitly taking into account concurrent join attacks) and an efficient
scheme with a single-message and signature-response join protocol.
The present manuscript is a full version containing proofs, minor corrections as well
as a more flexible and efficient protocol construction compared to the proceedings
version.
Countering chosen-ciphertext attacks against noncommutative polly cracker-type cryptosystems.
In [2], Stanislav Bulygin presents a chosen-ciphertext attack against
certain instances of noncommutative polly cracker-type cryptosystems which were proposed in [7] and [9]. In this article, we present generalized versions of this attack, which can be used against virtually all polly cracker-type cryptosystems. We then present a simple but effective techique to counter these attacks. We also present a technique to counter an adaptive chosen-ciphertext attack which was first described by Neil Koblitz in [8].
Zero-Knowledge Blind Identification For Smart Cards Using Bilinear Pairings
Uncategorized
Uncategorized
Identification protocols based on the Computational Diffie Hellman Problem (CDHP) generally assume the intractability of the underlying Decisional Diffie Hellman Problem (DDHP). Due to this, the security of all such schemes in a pairing based scenario is doubtful. In this paper, we propose a two-round zero-knowledge identification protocol using bilinear pairings. Our proposed protocol has two contrasting features to traditional identification schemes: (1) The scheme requires the verifier to toss his coins before the prover. (2) The coin tosses of the verifier are secret while the coin tosses of the prover are not. As a consequence, we obtain a \emph{blind} identification scheme with complete zero knowledge. Traditionally in an identification scheme, a passive adversary watching the communication gains information intended only for the verifier. For instance, from watching the transcript in the Fiat-Shamir zero knowledge identification scheme, an adversary also learns the outcome of the protocol (i.e. whether the identification succeeds or not). The blinding property of our scheme eliminates this disadvantage while still ensuring zero knowledge.
Finally, as a natural extension of our scheme, we present the concept of `all or none' group identification protocol that can be used to authenticate together an arbitrary number of users in a batch such that if the identification fails, it is impossible for the users to know which one cheated. We also prove the security of our scheme and give some interesting applications including anonymous seller credit card payments. The cryptographic primitives can be efficiently encapsulated in smart cards designed for Elliptic Curve Cryptography (ECC). The private key must be included in a tamperproof device inside the smart card.
Special Polynomial Families for Generating More Suitable Elliptic Curves for Pairing-Based Cryptosystems
Constructing non-supersingular elliptic curves for pairing-based cryptosystems have attracted much attention in recent years. The best previous technique builds curves with p = lg(q)/lg(r) = 1 (k = 12) and p = lg(q)/lg(r) = 1.25 (k = 24). When k > 12, most of the previous works address the question by representing r(x) as a cyclotomic polynomial. In this paper, we propose a new method to find more pairing-friendly elliptic curves with arbitrary embedding degree k by certain special polynomial families. The new method generates curves with lg(q)/lg(r) = 1 (k > 48) by random forms of r(x). Different representations of r(x) allow us to obtain many new families of pairing-friendly elliptic curves. In addition, we propose a equation to illustrate how to obtain small values of p by choosing appropriate forms of discriminant D and trace t. Numerous parameters of certain pairing-friendly elliptic curves are presented with support for the theoretical conclusions.
A Universally Composable Scheme for Electronic Cash
We propose a scheme for electronic cash based on symmetric primitives.
The scheme is secure in the framework for universal composability
assuming the existence of a symmetric CCA2-secure encryption scheme,
a CMA-secure signature scheme, and a family of one-way,
collision-free hash functions. In particular, the security proof is
not in the random-oracle model. Due to its high efficiency,
the scheme is well-suited for devices such as smart-cards and mobile
phones. We also show how the proposed scheme can be used as a group
signature scheme with one-time keys.
Last updated: 2005-10-19
A New Approach to Counteract DPA Attacks on Block Ciphers
Uncategorized
Uncategorized
Since the publication of Differential Power Analysis (DPA) in 1998, many countermeasures have been published to counteract this very efficient kind of attacks. All these countermeasures follow the same approach : they try to make sensitive operations uncorrelated with the input. Such a method is very costly in terms of both timing and memory space. In this paper, we suggest a new approach where block ciphers are designed to inherently thwart DPA attacks. The idea we develop in this paper is based on a theoretical analysis of DPA attacks and it essentially consists in embedding existing iterated block ciphers in a secure layer. We analyse the security of our proposal and we show that it induces very small overheads.
Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings
In most of the existing identity-based key agreement schemes, it is usually assumed that either the communicated parties know each other's identifier before the protocol starts or their identifiers are transferred along with the protocol messages. However, these schemes are not suitable for use in many real-world applications aimed to achieve unilateral identity privacy, which means that one communicating party does not want to expose his identifier to an outsider while his partner cannot know his identifier in advance. In this paper, we propose an efficient identity-based two-party key agreement scheme with unilateral identity privacy using pairing, and formally analyze its security in a modified Bellare-Rogaway key agreement security model.
An Improved Power Analysis Attack Against Camellia's Key Schedule
This paper presents an improved simple power analysis attack against the key schedule of Camellia. While the original attack required an exact determination of the Hamming weight of intermediate data values based on power measurements, in this paper, two variants of the simple power analysis attack are presented and shown to be tolerant of errors that might occur in the Hamming weight determinations. In practical applications of the attack such errors are likely to occur due to noise and distortion in the power measurements and their mapping to the Hamming weights of the data.
Further, we propose a practical method to evaluate the susceptibility of other block ciphers to simple power analysis attacks. To resist these attacks, the required design rationale of key schedules and several practical countermeasures are suggested.
Statistical Multiparty Computation Based on Random Walks on Graphs
With respect to a special class of access structures based on connectivity of graphs, we start from a linear secret sharing scheme
and turn it into a secret sharing scheme with perfect security and exponentially small error probability by randomizing the
reconstruction algorithm through random walks on graphs. It reduces the polynomial work space to logarithmic. Then we build the corresponding statistical multiparty computation protocol by using the secret sharing scheme. The results of this paper also imply the inherent connections and influences among secret sharing, randomized algorithms, and secure multi-party computation.
Pairing-based identification schemes
We propose four different public-key identification schemes that make use of bilinear pairings, and prove their security under certain computational assumptions. Each of the schemes is more efficient and/or more secure than any known pairing-based identification scheme.
One-Way Signature Chaining - A New Paradigm For Group Cryptosystems
In this paper, we describe a new cryptographic primitive called \emph{(One-Way) Signature Chaining}. Signature chaining is essentially a method of generating a chain of signatures on the same message by different users. Each signature acts as a ``link'' of the chain. The \emph{one-way}-ness implies that the chaining process is one-way in the sense that more links can be easily added to the chain. However, it is computationally infeasible to remove any intermediate links without removing all the links. The signatures so created are called chain signatures. We give precise definitions of chain signatures and discuss some applications in trust transfer. We also present a practical construction of a CS scheme that is secure under the Computational Diffie-Hellman (CDH) assumption in bilinear maps.
Secure Key-Updating for Lazy Revocation
We consider the problem of efficient key management and user
revocation in cryptographic file systems that allow shared access to
files. A performance-efficient solution to user revocation in such
systems is lazy revocation, a method that delays the re-encryption
of a file until the next write to that file. We formalize the notion
of key-updating schemes for lazy revocation, an abstraction to
manage cryptographic keys in file systems with lazy revocation, and
give a security definition for such schemes. We give two composition
methods that combine two secure key-updating schemes into a new
secure scheme that permits a larger number of user revocations. We
prove the security of two slightly modified existing constructions
and propose a novel binary tree construction that is also provable
secure in our model. Finally, we give a systematic analysis of the
computational and communication complexity of the three
constructions and show that the novel construction improves the
previously known constructions.
Universally Composable Disk Encryption Schemes
Uncategorized
Uncategorized
We propose a formalization of the security of transparent harddisk-encryption using the universal composability framework. We point out that several commercially available schemes for transparent hard disk encryption are built on principles that limit security, and we propose schemes for disk encryption with passive and active security, respectively. As for the efficiency of the schemes, security against active attacks can be obtained with a constant factor overhead in space and a logarithmic overhead in time. Finally, we also also sketch an actively secure scheme that provides some amount of security, even if the adversary is given temporary access to the internal state of the encryption device used.
Classification of Cubic $(n-4)$-resilient Boolean Functions
Carlet and Charpin classified in \cite{CC04} the set of cubic $(n-4)$-resilient Boolean functions into four different types with respect to the Walsh spectrum and the dimension of the linear space. Based on the classification of $RM(3,6)/RM(1,6)$, we completed the classification of the cubic $(n-4)$-resilient Boolean function by deriving the corresponding ANF and autocorrelation spectrum for each of the four types. In the same time, we solved an open problem of \cite{CC04} by proving that all plateaued cubic $(n-4)$-resilient Boolean functions have dimension of the linear space equal either to $n-5$ or $n-6$.
A Fuzzy Sketch with Trapdoor
In 1999, Juels and Wattenberg introduce an effective construction of Fuzzy Sketch, i.e. a way of handling errors into string verification. This allows them to consider data varying into time, such as, for instance, answers to a list of subjective questions. To this end, they utilize an Error Correcting Code.
We here show how to embed a trapdoor into Fuzzy Sketches, reducing to authorized people the ability to correct errors and thus to verify the fuzzy equality to the Fuzzy Sketch.
A Dedicated Processor for the eta Pairing
The $\eta$ pairing is an efficient computation technique based on a generalization of the Duursma Lee method for calculating the Tate pairing. The pairing can be computed very efficiently on genus 2 hyperelliptic curves. In this paper it is demonstrated that this pairing operation is well suited to a dedicated parallel hardware implementation. An $\eta$ pairing processor is described in detail and the architectures required for such a system are discussed. Prototype implementation results are presented over a base field of $\mathbb{F}_{2^{103}}$ and the advantages of implementing the pairing on the dedicated processor are discussed.
Cryptographic Protocols to Prevent Spam
This is a survey of mechanisms to control or prevent spam, with emphsis on cryptographic protocols. We also present a new cryptographic protocol, Secure Automated Resolution Protocol, which can be used to penalize spammers (and for other applications).
On Constructing Universal One-Way Hash Functions from Arbitrary One-Way Functions
A fundamental result in cryptography is that a digital signature scheme can be constructed from an arbitrary one-way function. A proof of this somewhat surprising statement follows from two results: first, Naor and Yung defined the notion of universal one-way hash functions and showed that the existence of such hash functions implies the existence of secure digital signature schemes. Subsequently, Rompel showed that universal one-way hash functions could be constructed from arbitrary one-way functions. Unfortunately, despite the importance of the result, a complete proof of the latter claim has never been published. In fact, a careful reading of Rompel's original conference publication reveals a number of errors in many of his arguments which have (seemingly) never been addressed.
We provide here what is --- as far as we know --- the first complete write-up of Rompel's proof that universal one-way hash functions can be constructed from arbitrary one-way functions.
On the Security of Encryption Modes of MD4, MD5 and HAVAL
MD4 is a cryptographic hash function introduced in 1990 by Rivest.
After MD4 was proposed, several hash functions such as MD5, HAVAL,
RIPEMD, RIPEMD-160, SHA-1 and SHA-256 were designed based on the
MD4 structure. In this paper, we cryptanalyze the compression
functions of MD4, MD5 and 4-, 5-pass HAVAL in encryption modes. We
exploit the recently proposed related-key rectangle and boomerang
techniques to show non-randomness of MD4, MD5 and 4-, 5-pass HAVAL
and to distinguish them from a randomly chosen cipher. The attacks
are highly practical and have been confirmed by our experiments.
A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity
Since the introduction of Identity-based (ID-based) cryptography
by Shamir in 1984, numerous ID-based signature schemes have been
proposed. In 2001, Rivest et al. introduced ring signature that
provides irrevocable signer anonymity and spontaneous group
formation. In recent years, ID-based ring signature schemes have
been proposed and all of them are based on bilinear pairings. In
this paper, we propose the first ID-based threshold ring signature
scheme that is not based on bilinear pairings. We also propose the
first ID-based threshold `linkable' ring signature scheme. We
emphasize that the anonymity of the actual signers is maintained
even against the private key generator (PKG) of the ID-based
system. Finally we show how to add identity escrow to the two
schemes. Due to the different levels of signer anonymity they
support, the schemes proposed in this paper actually form a suite
of ID-based threshold ring signature schemes which is applicable
to many real-world applications with varied anonymity
requirements.
An Effective Method to Implement Group Signature with Revocation
Uncategorized
Uncategorized
This paper presents an effective method to integrate the revocation mechanism into
some group signature schemes that are based on the strong RSA assumption. The mechanism enables
the group manager to either update a group member's certificates, or revoke a group member.
More specifically, a generic method has been proposed for the protocols of sign, verify, and revocation.
We demonstrate the effectiveness of the method by applying it to
a well known group signature scheme. The new construction has better performance while
enjoying an efficient revocation mechanism.
Extracting bits from coordinates of a point of an elliptic curve
In the classic Diffie-Hellman protocol based on a generic group $\G$,
Alice and Bob agree on a common secret $K_{AB}$ (master secret) which
is indistinguishable from another element of $\G$ but not from a
random bits-string of the same length. In this paper, we present a new
deterministic method to extract bits from $K_{AB}$ when $\G$ is an
elliptic curve defined over a quadratic extension of a finite
field. In the last section, we show that it is also possible to
extract a few bits when $\G$ is an elliptic curve defined over a prime
field.
The Weil pairing on elliptic curves over C
To help motivate the Weil pairing, we discuss
it in the context of elliptic curves over the
field of complex numbers.
Evolutionary Design of Trace Form Bent Functions
In order to design bent functions, evolutionary algorithm
based on truth table, algebraic normal form or Walsh spectra are already known. Evolutionary algorithm based on trace function form is not known to authors' knowledge. In this paper, we give an evolutionary algorithm based on the trace representation of boolean function. With the algorithm, we constructed many bent functions and made some analysis work. First we observe that all 4 affinely inequivalent bent classes in 6-variable can be written as the linear sum of 2 or 3 monomial trace functions. We make a conclusion that affine transform can be used to change the linear span, which lead to a method constructing perfect nonlinear s-box of non-Niho type; Second, we find that some exponents take more chances to construct bent functions while some exponents take less. By this observation,
we give each exponent a cost function, which make our algorithm more efficient than exhaustive searching algorithm or random algorithm. This is also the advantage over the algorithms based on the algebraic normal form, truth table, or Walsh spectra because we don't know what kinds of algebraic normal form, truth table, Walsh spectra are more possible to be used to construct bent functions; Third, we classify the obtained bent functions into affinely inequivalent classes and the number of classes is reported.
Exact Maximum Expected Differential and Linear Probability for 2-Round Advanced Encryption Standard (AES)
Provable security of a block cipher against differential~/ linear
cryptanalysis is based on the \emph{maximum expected differential~/ linear probability} (MEDP~/ MELP) over $T \geq 2$ core rounds.
Over the past few years, several results have provided increasingly
tight upper and lower bounds in the case $T=2$ for the Advanced Encryption Standard (AES). We show that the \emph{exact} value
of the 2-round MEDP~/ MELP for the AES is equal to the best known lower bound: $53/2^{34} \approx 1.656 \times 2^{-29}$~/ $109,953,193/2^{54} \approx 1.638 \times 2^{-28}$.
This immediately yields an improved upper bound on the AES MEDP~/ MELP for $T \geq 4$, namely
$\left( 53/2^{34} \right)^4 \approx 1.881 \times 2^{-114}$~/
$\left( 109,953,193/2^{54} \right)^4 \approx 1.802 \times 2^{-110}$.
Efficient Identity-Based Encryption with Tight Security Reduction
Uncategorized
Uncategorized
In a famous paper of Crypto'01, Boneh and Franklin proposed the first identity-based encryption scheme (IBE), around fifteen years after the concept was introduced by Shamir. Their scheme security (more precisely, the notion of resistance against an IND-ID-CCA attacker) relies in the random oracle model. However, the reduction is far from being tight, and notably depends on the number of extractions queries.
In this paper, we present an efficient modification to the Boneh-Franklin scheme that provides a tight reduction. Our scheme is basically an IBE under two keys, one of which is (randomly) detained by the recipient. It can be viewed as a continuation of an idea introduced by Katz and Wang; we will however show how our construction improves this last scheme.
Our scheme features a tight reduction to the list bilinear Diffie-Hellman (LBDH) problem, which can be itself reduced tightly either to the gap bilinear Diffie-Hellman (GBDH) or the decisional bilinear Diffie-Hellman (DBDH) problems. Furthermore, for a relaxed notion of tightness (called weak-tightness) that we introduce and discuss in our paper, we show that there is a weakly tight reduction from our scheme to the computational bilinear Diffie-Hellman (CBDH) problem.
Our scheme is very efficient, as one can precompute most of the quantity involved in the encryption process. Furthermore, the ciphertext size is very short: for proposed parameters, they are |M|+330 bits long.
ID-based Restrictive Partially Blind Signatures and Applications
Uncategorized
Uncategorized
Restrictive blind signatures allow a recipient to receive a blind
signature on a message not known to the signer but the choice of
message is restricted and must conform to certain rules. Partially
blind signatures allow a signer to explicitly include necessary
information (expiration date, collateral conditions, or whatever)
in the resulting signatures under some agreement with receiver.
Restrictive partially blind signatures incorporate the advantages
of these two blind signatures. The existing restrictive partially
blind signature scheme was constructed under certificate-based
(CA-based) public key systems. In this paper we follow Brand's
construction to propose the first identity-based (ID-based)
restrictive blind signature scheme from bilinear pairings.
Furthermore, we first propose an ID-based restrictive partially
blind signature scheme, which is provably secure in the random
oracle model. As an application, we use the proposed signature
scheme to build an untraceable off-line electronic cash system
followed Brand's construction.
Bounds on Birthday Attack Times
Uncategorized
Uncategorized
We analyze a generic birthday attack where distinct inputs to
some function $f$ are selected until two of the inputs map
through $f$ to the same output, meaning that the attack has
succeeded.
We give tight bounds on the probability of attack success
after a given number of inputs are selected as well as
tight bounds on the expected number of inputs that must
be selected for the attack to succeed.
The types of functions considered include random functions
with uniformly random outputs, random functions whose outputs
have some arbitrary (biased) probability distribution,
concrete functions that are balanced (all outputs have the
same number of pre-images), and arbitrary concrete
functions.
In each case the bounds are given in terms of the probability
($1/\beta$) that a pair of inputs give the same output,
which is different for each type of function.
The expected number of steps required to complete a
birthday attack in all cases is between
$0.7\sqrt{\beta}$ and $2\sqrt{\beta}$.
In some cases tighter bounds than this are given.
Compared to previous work in this area, the analysis here gives
tighter bounds and is more applicable to the most efficient
practical methods used to carry out birthday attacks,
such as a generalization of Pollard's rho-method and
parallel collision search.
However, significant challenges remain in proving bounds
for these methods.
Ring Signatures without Random Oracles
Uncategorized
Uncategorized
Since the formalization of ring signature by Rivest, Shamir and Tauman in 2001, there are lots of variations appeared in the literature. Almost all of the variations rely on the random oracle model for security proof.
In this paper, we propose a ring signature scheme based on bilinear pairings, which is proven to be secure against chosen message attack without using the random oracle model. It is one of the first in the literature to achieve this security level.
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Public-key cryptosystem (PKC) is one of inevitable key
technologies in order to accomplish fruitful security applications
in ubiquitous computing systems. The ubiquitous computer only has
scarce computational resources (like Smart cards, RFID, Sensor
Network), however, so that the light weight PKC is necessary for
those miniaturized low-power devices. Recently, XTR is considered
as one of good candidates for more energy efficient cryptosystems.
Among XTR exponentiation algorithms, the most efficient one is the
Improved XTR Single Exponentiation (XTR-ISE) proposed by
Stam-Lenstra. Thus among the family of XTR algorithms, XTR-ISE is
the most efficient one suitable for ubiquitous computer. Even
though the security of such devices against side channel attacks
is very dangerous, there are few works on side channel attacks
against XTR-ISE. In this paper we propose a new collision attack
on XTR-ISE, derived from the structural properties of XTR-ISE. The
analysis complexity of the proposed one is about 2^{40} where
the key size is 160-bit, which is 55% improvement from the
previously best known analysis of Page-Stam. We also propose a
novel countermeasure using a fixed pattern which is secure against
SPA. We deploy a variant of Euclidean algorithm whose one of the
registers is a monotone decreasing function with odd value. From
our estimation of the efficiency of the proposed method, XTR
exponentiation, computing Tr(g^n) with Tr(g) and n, takes
11.2log_2n multiplications in F_{p^2}. In the sense
of both efficiency and security the proposed countermeasure is the
best one among the previous countermeasures- it is about 30%
faster.
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
The ability to link two different sightings of the same
Radio Frequency Identification (RFID) tag enables invasions of privacy.
The problem is aggravated when an item, and the tag attached to it,
changes hands during the course of its lifetime. After such an
ownership transfer, the new owner should be able to read the tag but
the old owner should not.
We address these issues through an RFID
pseudonym protocol. Each time it is queried, the RFID tag emits a
different pseudonym using a pseudo-random function.
Without consent of a special Trusted Center that shares secrets
with the tag, it is infeasible to map the pseudonym to the tag's real
identity. We present a scheme for RFID pseudonyms that works with legacy,
untrusted readers, requires only one message from tag to reader, and is
scalable: decoding tag pseudonyms takes work logarithmic in the number of tags.
Our scheme further allows for time-limited delegation,
so that we can give
an RFID reader the power to disambiguate a limited number of pseudonyms
without further help from the Trusted Center. We show how RFID
pseudonyms facilitate the transfer of ownership of RFID tags between mutually
distrustful parties.
Our scheme requires only limited cryptographic functionality from the tag: we need a pseudo-random function (PRF)
and the ability to update tag state or to generate random numbers.
Tag storage and communication requirements are modest:
we give example parameters for a deployment of one million
tags in which each tag stores only $128$ bits, makes $6$ PRF
evaluations, and sends $158$ bits each time it is read.
Fast genus 2 arithmetic based on Theta functions
In 1986, D. V. Chudnovsky and G. V. Chudnovsky proposed to
use formulae coming from Theta functions for the arithmetic
in Jacobians of genus 2 curves. We follow this idea and
derive fast formulae for the scalar multiplication in the
Kummer surface associated to a genus 2 curve, using a
Montgomery ladder. Our formulae can be used to design very
efficient genus 2 cryptosystems that should be faster than
elliptic curve cryptosystems in some hardware
configurations.
Deterministic Identity-Based Signatures for Partial Aggregation
Aggregate signatures are a useful primitive which allows to aggregate into a single and constant-length signature many signatures on different messages computed by different users. Specific proposals of aggregate signature schemes exist only for PKI-based scenarios. For identity-based scenarios, where public keys of the users are directly derived from their identities, the signature schemes proposed up to now do not seem to allow constant-length aggregation.
We provide an intermediate solution to this problem, by designing a new identity-based signature scheme which allows aggregation when the signatures to be aggregated come all from the same signer. The new scheme is deterministic and enjoys some better properties than the previous proposals. We formally prove that the scheme is unforgeable, in the random oracle model, assuming that the Computational co-Diffie-Hellman problem is hard to solve.
A New Efficient Algorithm for Solving Systems of Multivariate Polynomial Equations
Uncategorized
Uncategorized
The security of many recently proposed cryptosystems is based on the
difficulty of solving large systems of quadratic multivariate
polynomial equations. The classical algorithm for solving such a
system is Buchberger's algorithm for constructing Gröbner bases.
Another algorithm for solving such a system is XL algorithm. For
sparse system, Buchberger's algorithm benefits from sparsity of the
system, but its complexity is impractical and hard to determine.
XL could not make a good use of sparse structure of the system,
since XL has no good strategy of choosing the multiply monomials.
In this paper, based on Extended Dixon Resultants, a new algorithm
DR is proposed to solve systems of multivariate polynomial
equations. The basic idea of DR is to apply Extended Dixon
Resultants method to system of multivariate polynomial equations, by
taking $x_1 \ldots x_{n-1}$ as variables and $x_n$ as parameter.
The time complexity of DR technique is evaluated, it seems to be
polynomial when the system is sparse and $m=n$ and mixed volume is
polynomial. As far as we know, it is the first algorithm which has
better behavior than exhaustive search for some sparse systems over
large field. Moreover, DR technique is compared with Buchberger's
algorithm and XL technique in this paper. It is shown that DR is far
more efficient than Buchberger's algorithm and XL when $m=n$. DR is
a quite efficient algorithm, it makes a good use of the sparsity of
the sparse system. Besides its efficiency, another advantage of DR
is that its complexity is easy to determine.
What do S-boxes Say in Differential Side Channel Attacks?
Cryptographic devices are vulnerable against the now well-known side channel leakage analysis. Secret data, such as keys, can be revealed by attacks like DPA, DEMA, CPA. However, this kind of attacks also exhibits wrong keys, this phenomenon being known as the "ghost peaks" problem and has been briefly explained in CPA. We give here a comprehension and analysis of the ghost peak problem that occurs in differential analysis regarding to different power consumption model and various weighting techniques.
Meta Ring Signature
In this paper, we propose a new concept ``Meta Ring Signature''. Suppose that a signature text work as a public key, we may achive a new digital signature ``Meta Signature'' such that, the signer of a signature text, in this paper we call basic signature, can sign on to another message by using the basic signature text as the public key of Meta signature scheme. First, we present a concept of Meta Ring Signature such that both basic signature and meta signature are Ring Signature.
A New Efficient ID-Based Authenticated Key Agreement Protocol
Recently Eun-Kyung Ryu, Eun-Jun Yoon, and Kee-Young Yoo proposed
an efficient ID-based authenticated key agreement with
paring.They argued that it is secure and efficient. In
this paper, we show this protocol is doesn't satisfy the
Key-Compromise Impersonate property and it is not secure against
key reveal attack. Then we propose our protocol from this protocol
and shim's protocol, its security and efficiency was analyzed.
Adaptable Group-Oriented Signature
A new type of signature is presented in this paper, named adaptable group-oriented signature. In contrast with traditional group-oriented signature, the new one laid a strong emphasis on how to improve the signer¡¯s efficiency. In fact, this new type of group-oriented signature can be seen as a type of designated verifier signature. In contrast with the ordinary designated verifier signature, it does not designate one member but several members to independently verify the signature. The designated members, who can independently verify the signature, come into a group. This scheme can ensure the anonymity of the verifiers. This type of signature can be used in such system that the compute resource is limited, such as the broadcast protocols of the mobile telephone in the mobile networks.
The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited
The theoretical equivalence between the DLP and DHP problems was shown by Maurer in 1994. His work was then reexamined by Muzereau et al. for the special case of elliptic curves used in practical cryptographic applications. This paper improves on the latter and tries to get the tightest possible reduction in terms of computational equivalence,
using Maurer's method.
Murakami-Kasahara ID-based Key Sharing Scheme Revisited ---In Comparison with Maurer-Yacobi Schemes---
In Sept.1990, the present authors firstly discussed DLP over composite number and presented an ID-based Key Sharing Scheme referred to as MK1. In 1991, Maurer and Yacobi presented a scheme, referred to as MY, which is similar to our scheme, MK1. Unfortunately the schemes MK1 and MY are not secure. In Dec.1990, the present authors presented a secure ID-based key sharing scheme referred to as MK2. With a rapid progress of computer power for the last 15 years, our proposed scheme would have more chance to be applied practically. Regrettably, it has not been widely known that
(i) the schemes MY and MK1 are not secure,
(ii) there exists a secure scheme, MK2.
In this paper, we shall review MK2 and clarify the difference between MK2 and other schemes from the standpoint of security.
Steganography with Imperfect Samplers
Uncategorized
Uncategorized
The goal of steganography is to pass secret messages by disguising
them as innocent-looking covertexts. Real world stegosystems are
often broken because they make invalid assumptions about the system's
ability to sample covertexts. We examine whether it is possible to
weaken this assumption. By modeling the covertext distribution as a
stateful Markov process, we create a sliding scale between real world
and provably secure stegosystems. We also show that insufficient
knowledge of past states can have catastrophic results.
Ring Signatures: Stronger Definitions, and Constructions without Random Oracles
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so that a ring of possible signers (of which the user is a member) is identified, without revealing exactly which member of that ring actually generated the signature. In contrast to group signatures, ring signatures are completely ``ad-hoc'' and do not require any central authority or coordination among the various users (indeed, users do not even need to be aware of each other); furthermore, ring signature schemes grant users fine-grained control over the level of anonymity associated with any particular signature.
This paper has two main areas of focus. First, we examine previous definitions of security for ring signature schemes and suggest that most of these prior definitions are too weak, in the sense that they do not take into account certain realistic attacks. We propose new definitions of anonymity and unforgeability which address these threats, and give separation results proving that our new notions are strictly stronger than previous ones. Second, we show the first constructions of ring signature schemes in the standard model. One scheme is based on generic assumptions and satisfies our strongest definitions of security. Two additional schemes are more efficient, but achieve weaker security guarantees and more limited functionality.
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage
Uncategorized
Uncategorized
The Plutus file system introduced the notion of key rotation as
a means to derive a sequence of temporally-related keys from the most
recent key. In this paper we show that, despite natural intuition to
the contrary, key rotation schemes cannot generically be used to key
other cryptographic objects; in fact, keying an encryption scheme with
the output of a key rotation scheme can yield a composite system that
is insecure. To address these shortcomings, we introduce a new
cryptographic object called a key regression scheme, and we
propose three constructions that are provably secure under standard
cryptographic assumptions. We implement key regression in a secure
file system and empirically show that key regression can significantly
reduce the bandwidth requirements of a content publisher under
realistic workloads using lazy revocation. Our experiments also serve
as the first empirical evaluation of either a key rotation or key
regression scheme.
Elliptic Curves for Pairing Applications
In this paper we address the question of representing the discriminant of an imaginary quadratic field with respect to the basis of a cyclotomic field. This representation allows us to parameterize new families of ordinary elliptic curves over finite prime fields suitable for pairing applications. In particular these curves have small discriminants greater than four and arbitrary embedding degree. Computational results are presented which support the theoretical findings.
On the Hardware Implementation of the MICKEY-128 Stream Cipher
Encryption algorithms are becoming more necessary to ensure the securely transmitted data over insecure communication channels. MICKEY-128 is a recently developed stream cipher with two major advantages: (i) the low hardware complexity, which results in small area and (ii) the high level of security. FPGA device was used for the performance demonstration. Some of the first results of implementing the stream cipher on an FPGA are reported. A maximum throughput equal to 170 Mbps can be achieved, with a clock frequency of 170 MHz.
Towards Security Two-part Authenticated Key Agreement Protocols
We first present a new security 2-AK protocol, which is more secure and more efficient than previously proposed ones. Meanwhile, we point that Xie's ID-2-AK protocol modified from McCullagh-Barreto in CT-RSA 2005 doesn't provide protection against KCI attack likewise, and finally utilize the modular arithmetic, first proposed in MQV and also used in Kim, to get a modified new ID-2-AK protocol. On second thoughts, we give another ID-2-AK protocol utilizing the operation of addition in finite field like our forenamed 2-AK protocol. The two ID-2-AK protocols are in possession of all the desired security attributes. We also compare our new protocols with others in terms of computational cost and security properties.
Nonlinearity of the Round Function
In the paper we present the results which enable to calculate the nonlinearity of round functions with quite large dimensions e.g. 32x32 bits, which are used in some block ciphers. This can be applied to improve the resistance of these ciphers against linear cryptanalysis. The involved method of calculating the nonlinearity is rested on the notion of multi-dimensional Walsh transform. At the end we give the application to linear cryptanalysis of the TGR block cipher.
Keeping Denial-of-Service Attackers in the Dark
We consider the problem of overcoming (Distributed) Denial of Service
(DoS) attacks by realistic adversaries that have knowledge
of their attack's successfulness, e.g., by observing service performance
degradation, or by eavesdropping on messages or parts thereof.
A solution for this problem in a high-speed network environment
necessitates lightweight mechanisms for differentiating between
valid traffic and the attacker's packets.
The main challenge in presenting such a solution is to exploit
existing packet filtering mechanisms in a way that allows fast
processing of packets, but is complex enough so that the attacker
cannot efficiently craft packets that pass the filters.
We show a protocol that mitigates DoS attacks by adversaries that
can eavesdrop and (with some delay) adapt their attacks accordingly.
The protocol uses only available, efficient packet filtering mechanisms
based mainly on (addresses and) port numbers.
Our protocol avoids the use of fixed
ports, and instead performs `pseudo-random port hopping'. We model
the underlying packet-filtering services and define measures for the
capabilities of the adversary and for the success rate of the protocol.
Using these, we provide a novel rigorous analysis of the impact
of DoS on an end-to-end protocol, and show that our protocol
provides effective DoS prevention for realistic attack and
deployment scenarios.
DSAC: An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining
Uncategorized
Uncategorized
Database outsourcing is an important emerging trend which involves
data owners delegating their data management needs to an external
service provider. In this model, a service provider hosts clients'
databases and offers mechanisms to create, store, update and access
(query) outsourced databases. Since a service provider is almost
never fully trusted, security and privacy of outsourced data are
important concerns.
A core security requirement is the integrity and authenticity of
outsourced databases. Whenever someone queries a hosted database,
the results must be demonstrably authentic (with respect to the
actual data owner) to ensure that the data has not been tampered
with. Furthermore, the results must carry a proof of completeness
which will allow the querier to verify that the server has not
omitted any valid tuples that match the query predicate.
Notable prior research (\cite{DpGmMcSs00, McNgDpGmKwSs02, PanTan04})
focused on so-called \textit{Authenticated Data Structures}.
Another prior approach involved the use of special digital signature
schemes. In this paper, we extend the state-of-the-art to provide
both authenticity and completeness guarantees of query replies. Our
work also analyzes the new approach for various base query types and
compares the new approach with Authenticated Data
Structures.\footnote{We also point out some possible security flaws
in the approach suggested in the recent work of \cite{PanTan04}.}
A Key Establishment IP-Core for Ubiquitous Computing
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the investigation and discussion of alternative solutions. We suggest a low hardware-complexity solution for authenticated symmetric key exchange, using a Tree Parity Machine Rekeying Architecture. An authenticated key exchange is formulated from within the tree parity machine interaction concept and requires only few transmissions. It averts a Man-In-The-Middle attack and the currently known attacks on the non-numbertheoretic on principle. A key exchange can be performed within a few milliseconds, given typical limited bandwidth wireless communication channels. A flexible rekeying functionality enables the exploitation of the achievable key exchange rates. Characteristics of a standard-cell ASIC design realization as IP-core in 0.18 micron CMOS-technology are evaluated.
Hidden Exponent RSA and Efficient Key Distribution
In this paper we propose a variant of RSA public key scheme, called ``Hidden Exponent RSA''. Based on this new scheme, we devised an efficient key distribution/management scheme for secure communication among devices in the context of pervasive computing, with emphasis on the simplicity and efficiency of the protocol. We show the new scheme is secure under the strong RSA assumption.
On Fairness in Simulatability-based Cryptographic Systems
Simulatability constitutes the cryptographic notion of a secure refinement and has asserted its position as one of the fundamental concepts of modern cryptography. Although simulatability carefully captures that a distributed protocol does not behave any worse than an ideal specification, it however does not capture any form of liveness guarantees, i.e., that something good eventually happens in the protocol.
We show how one can extend the notion of simulatability to comprise liveness guarantees by imposing specific fairness constraints on the adversary. As the common notion of fairness based on infinite runs and eventual message delivery is not suited for reasoning about polynomial-time, cryptographic systems, we propose a new definition of fairness that enforces the delivery of messages after a polynomial number of steps. We provide strengthened variants of this definition by granting the protocol parties explicit guarantees on the maximum delay of messages. The variants thus capture fairness with explicit timeout signals, and we further distinguish between fairness with local timeouts and fairness with global timeouts.
We compare the resulting notions of fair simulatability, and provide separating examples that help to classify the strengths of the definitions and that show that the different definitions of fairness imply different variants of simulatability.
Speeding Up Pairing Computation
In this note, we describe how to achieve a simple yet substantial speed
up of Miller's algorithm, when not using denominator elimination, and working over quadratic extension fields.
Improved Integral Cryptanalysis of FOX Block Cipher
FOX is a new family of block ciphers presented recently, which is
based upon some results on proven security and has high
performances on various platforms. In this paper, we construct
some distinguishers between 3-round FOX and a random permutation
of the blocks space. By using integral attack and
collision-searching techniques, the distinguishers are used to
attack on 4, 5, 6 and 7-round of FOX64, 4 and 5-round FOX128. The
attack is more efficient than previous integral attack on FOX. The
complexity of improved integral attack is $2^{77.6}$ on 4-round
FOX128, $2^{205.6}$ against 5-round FOX128 respectively. For
FOX64, the complexity of improved integral attack is $2^{45.4}$ on
4-round FOX64, $2^{109.4}$ against 5-round FOX64, $2^{173.4}$
against 6-round FOX64, $2^{237.4}$ against 7-round FOX64
respectively. Therefore, 4-round FOX64/64, 5-round FOX64/128,
6-round FOX64/192, 7-round FOX64/256 and 5-round FOX128/256 are
not immune to the attack in this paper.
Cryptography In the Bounded Quantum-Storage Model
We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's {\em quantum}memory is of bounded size. We show that oblivious transfer and bit
commitment can be implemented in this model using protocols where honest parties need no quantum memory, whereas an adversarial player needs quantum memory of size at least $n/2$ in order to break the protocol, where $n$ is the number of qubits transmitted. This is in sharp contrast to the classical bounded-memory model, where we can only tolerate adversaries with memory of size quadratic in honest players' memory size. Our protocols are efficient, non-interactive and can be implemented using today's technology. On the technical side, a new entropic uncertainty relation involving min-entropy is established.
Perfect Non-Interactive Zero Knowledge for NP
Non-interactive zero-knowledge (NIZK) systems are fundamental cryptographic primitives used in many constructions, including CCA2-secure cryptosystems, digital signatures, and various cryptographic protocols. What makes them especially attractive, is that they work equally well in a concurrent setting, which is notoriously hard for interactive zero-knowledge protocols. However, while for interactive zero-knowledge we know how to construct statistical zero-knowledge argument systems for all NP languages, for non-interactive zero-knowledge, this problem remained open since the inception of NIZK in the late 1980's. Here we resolve two problems regarding NIZK:
- we construct the first perfect NIZK argument system for any NP language.
- we construct the first UC-secure NIZK protocols for any NP language in the presence of a dynamic/adaptive adversary.
While it was already known how to construct efficient prover computational NIZK proofs for any NP language, the known techniques yield large common reference strings and large NIZK proofs. As an additional implication of our techniques, we considerably reduce both the size of the common reference string and the size of the proofs.