1 / 23

Hybrid Signcryption with Insider Security

Hybrid Signcryption with Insider Security. Alexander W. Dent. Signcryption. Introduced by Zheng 1997. Combines advantages of PKE and signatures: Confidentiality Integrity/Origin authentication Non-repudiation? A relatively new type of primitive.

benito
Download Presentation

Hybrid Signcryption with Insider Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hybrid Signcryption with Insider Security Alexander W. Dent

  2. Signcryption • Introduced by Zheng 1997. • Combines advantages of PKE and signatures: • Confidentiality • Integrity/Origin authentication • Non-repudiation? • A relatively new type of primitive. • We haven’t even agreed a security model yet.

  3. Signcryption • A common parameter generation algorithm. • A receiver key-pair (pkR,skR) generation algorithm. • A sender key-pair (pkS,skS) generation algorithm. • A generation-encryption algorithm. • A verification-decryption algorithm.

  4. Signcryption • An, Dodis and Rabin (2002) security model. • This is a two user model. • Outsider security • Security against all third parties, i.e. anyone who isn’t the sender or receiver. • Insider security • Full security, including integrity protection against attacks made by the receiver. • Baek, Steinfeld and Zheng (2002) model.

  5. Signcryption: confidentiality • No third party can distinguish between a signcryption of one message and a signcryption of another message. • Normal IND criteria, except that we must provide the attacker with encryption and decryption oracles. • We do not consider forward security (with can be expressed using the Baek et al. model).

  6. Signcryption: integrity • Attacker in possession of the receiver’s private key must attempt to forge a signcryption from the sender. • Normal existential unforgeability game. • Attacker has access to an encryption oracle for the sender.

  7. Signcryption: non-repudiation • The ability for a third party to check that a given signcryption is a proper signcryption of a given message. • Not required for most applications. • Most signcryption schemes “cheat” and use NIZK proofs. • A trend that we will continue. • See Malone-Lee (2004).

  8. Hybrid encryption • Involves the use of black-box symmetric algorithms with certain security properties. • Very popular trick: • ECIES/DHAES • Fujisaki-Okamoto and related transforms. • Most use the same “trick” of encrypting a random symmetric key with the asymmetric algorithm. • Formalised by Cramer and Shoup (2004).

  9. Hybrid encryption KEM pk C1 Provides the confidentiality service (against active attackers). Controls the security service by generating random symmetric keys. K DEM m C2

  10. Hybrid signcryption KEM pk C1 K DEM m C2

  11. Hybrid signcryption KEM pkR C1 skS K DEM m C2

  12. Hybrid signcryption • The attacker finds a valid signcryption (C1,C2). • Recovers the key K associated with C1. • Computes C2’=DEMK(m’). • (C1,C2) is a forgery. C1 KEM pkS skR There must be a binding between the message m, the encapsulation C1 and the symmetric key K. K DEM C2 m

  13. Hybrid signcryption KEM pkR C1 skS K DEM m C2

  14. Hybrid signcryption KEM pkR C1 skS K DEM m C2

  15. Hybrid signcryption pkS skR m pkR skS KEM K m DEM VER C1 m C2

  16. Hybrid signcryption • Note that the KEM necessarily provides a signature on the message, where • The signing algorithm is given by KEM. • The verification algorithm is given by VER. • Therefore, the KEM provides the integrity service... • ...and the DEM only has to provide a confidentiality service. • Arguably closer to Fujisaki-Okamoto than Cramer-Shoup.

  17. Hybrid signcryption: confidentiality The KEM must be INP secure, i.e. it must be impossible to tell which message an encapsulation is associated with. The KEM must be IND secure, i.e. produces keys that look random to the attacker. KEM pkR C1 skS K Since the KEM is providing integrity protection, the DEM only needs to be passively secure. The DEM must be IND secure, i.e. it must be impossible to tell which message a ciphertext is an encryption of. DEM m C2

  18. Hybrid signcryption: integrity pkS skR pkR skS KEM K m DEM VER Must be existentially unforgeable, i.e. it must be impossible for any attacker to find a message/encapsulation pair that the VER algorithm accepts as valid. C1 m C2

  19. Hybrid signcryption • Need to present a scheme to demonstrate practicality of this construction paradigm. • Many schemes already exist in the literature. • In particular, the Baek et al. variant of Zheng’s original signcryption scheme is provably secure as a hybrid signcryption scheme. • Note that efficiency can be gained by re-using in the VER variables calculated in the KEM.

  20. Open problems • Can we use this framework to prove the security of previously unproven schemes? • Can we use this framework to develop new schemes? • Schemes with better non-repudiation properties?

  21. Open problems • No satisfactory model for multi-user security. • Multi-user model should allow the attacker to initiate users, replace public keys, corrupt users, make test queries, force users to encrypt messages, force users to decrypt signcryptions. • Similar to Certificateless PKE security model. • Should be easy for outsider security!

  22. Open problems • Tag-KEM construction for PKE introduced by Abe, Gennaro and Kurosawa (2005). • Implicit link between the message (in the form of the DEM encryption C2) and the symmetric key used to encrypt it! • Great potential for more efficient insider secure hybrid signcryption schemes. K K C1 state DEC KEY ENC tag sk C1 pk tag

  23. Conclusions • Signcryption schemes can be built using a hybrid approach, separating the scheme into independent building blocks. • Most known schemes have implicitly used this construction. • However, more work can be done in this particularly under-researched area.

More Related