cpk in eurocrypt 2007 rump session
TRANSCRIPT
![Page 1: CPK in Eurocrypt 2007 Rump Session](https://reader035.vdocuments.us/reader035/viewer/2022071813/55a2b78b1a28abfc0c8b47d6/html5/thumbnails/1.jpg)
CPK: Bounded Identity Based EncryptionJames HughesGuan Zhi
![Page 2: CPK in Eurocrypt 2007 Rump Session](https://reader035.vdocuments.us/reader035/viewer/2022071813/55a2b78b1a28abfc0c8b47d6/html5/thumbnails/2.jpg)
Identity Based Encryption
• Private matrix to the domain• Private key to the user• Public matrix• Originally described as ECC based system
> Equally valid in discrete log
• Does not require a bilinear map• Patented
> Publication Number WO/2006/074611>NAN, XiangHao >CHEN, Zhong
![Page 3: CPK in Eurocrypt 2007 Rump Session](https://reader035.vdocuments.us/reader035/viewer/2022071813/55a2b78b1a28abfc0c8b47d6/html5/thumbnails/3.jpg)
System Parameters
• Diffie Hellman group with values • A matrix size • A selection of row values are calculated from identity
> > Public function> SHA-256 or known encryption
h1···m = f(Identity)
(g, p)(m, n)
![Page 4: CPK in Eurocrypt 2007 Rump Session](https://reader035.vdocuments.us/reader035/viewer/2022071813/55a2b78b1a28abfc0c8b47d6/html5/thumbnails/4.jpg)
Secret Matrix
S =
!
"#s1,1 · · · s1,m...
. . ....
sn,1 · · · sn,m
$
%&
Private to domain
![Page 5: CPK in Eurocrypt 2007 Rump Session](https://reader035.vdocuments.us/reader035/viewer/2022071813/55a2b78b1a28abfc0c8b47d6/html5/thumbnails/5.jpg)
Secret Key
S =
!
"#s1,1 · · · s1,m...
. . ....
sn,1 · · · sn,m
$
%& SA =m!
i=1
sh(i),i mod p! 1
Private to userPrivate to domain
![Page 6: CPK in Eurocrypt 2007 Rump Session](https://reader035.vdocuments.us/reader035/viewer/2022071813/55a2b78b1a28abfc0c8b47d6/html5/thumbnails/6.jpg)
Public Matrix
S =
!
"#s1,1 · · · s1,m...
. . ....
sn,1 · · · sn,m
$
%&
P =
!
"#p1,1 · · · p1,m...
. . ....
pn,1 · · · pn,m
$
%&
pi,j = gsi,j mod p
SA =m!
i=1
sh(i),i mod p! 1
Private to userPrivate to domain
Public to domain
![Page 7: CPK in Eurocrypt 2007 Rump Session](https://reader035.vdocuments.us/reader035/viewer/2022071813/55a2b78b1a28abfc0c8b47d6/html5/thumbnails/7.jpg)
Public Key
S =
!
"#s1,1 · · · s1,m...
. . ....
sn,1 · · · sn,m
$
%&
P =
!
"#p1,1 · · · p1,m...
. . ....
pn,1 · · · pn,m
$
%&
pi,j = gsi,j mod p
PA =m!
i=1
sh(i),i mod p
SA =m!
i=1
sh(i),i mod p! 1
Private to userPrivate to domain
Public to domain
P
![Page 8: CPK in Eurocrypt 2007 Rump Session](https://reader035.vdocuments.us/reader035/viewer/2022071813/55a2b78b1a28abfc0c8b47d6/html5/thumbnails/8.jpg)
Questions
• Secure?> Public matrix reduces to the DDH
• Collisions?> 32x32 then is 32x5 or 160 bits> Birthday after 280 accounts
• Collusion > of near collision (one column different) provides difference> 32x32 requires ~1300 private keys.
h
![Page 9: CPK in Eurocrypt 2007 Rump Session](https://reader035.vdocuments.us/reader035/viewer/2022071813/55a2b78b1a28abfc0c8b47d6/html5/thumbnails/9.jpg)
Collusion Environment
• Without the threat of Collusion> Verification and not signature> Small matrix
• Without the threat of large scale collusion> Non personal equipment> Medium Matrix
• With the threat of large scale collusion> Authentication module (Chip card, USB token, TPM)> Large matrix
• Special Situations> One to ten million collusion partners> Ultra Large Matrix
![Page 10: CPK in Eurocrypt 2007 Rump Session](https://reader035.vdocuments.us/reader035/viewer/2022071813/55a2b78b1a28abfc0c8b47d6/html5/thumbnails/10.jpg)
• Is this novel?> Boneh Franklin> Murakami> Cocks> Heng, Kurosawa, CR-RSA 2004> Dodis, Katz, Xu, Yung, EC 2002
• Contact Jim or Guan later....