+ All Categories
Home > Documents > From Selective-ID to Full-ID IBS without Random...

From Selective-ID to Full-ID IBS without Random...

Date post: 11-Feb-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
44
Overview Background The Transformation Conclusion and Future Work From Selective-ID to Full-ID IBS without Random Oracles Sanjit Chatterjee and Chethan Kamath Indian Institute of Science, Bangalore November 3, 2013
Transcript
Page 1: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

From Selective-ID to Full-ID IBS withoutRandom Oracles

Sanjit Chatterjee and Chethan Kamath

Indian Institute of Science, Bangalore

November 3, 2013

Page 2: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Table of contents

Overview

BackgroundFormal DefinitionsThe Selective-Identity ModelConstruction of IBS

The TransformationObjects UsedThe TransformationSecurity

Conclusion and Future Work

Page 3: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Identity-Based Cryptography

• Introduced by Shamir in 1984.

• Any arbitrary string, say e-mail address, can be used as publickey.

• Certificate management can be avoided.

• A trusted private key generator (PKG) generates secret keys.

PKG

msk

mpk

Alice Bob

Page 4: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Identity-Based Cryptography

• Introduced by Shamir in 1984.

• Any arbitrary string, say e-mail address, can be used as publickey.

• Certificate management can be avoided.

• A trusted private key generator (PKG) generates secret keys.

PKG

msk

mpk

Alice Bob

Alice us

kA

Page 5: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Identity-Based Cryptography

• Introduced by Shamir in 1984.

• Any arbitrary string, say e-mail address, can be used as publickey.

• Certificate management can be avoided.

• A trusted private key generator (PKG) generates secret keys.

PKG

msk

mpk

Alice Bob

uskA

Alice

Alice

Page 6: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Identity-Based Cryptography

• Introduced by Shamir in 1984.

• Any arbitrary string, say e-mail address, can be used as publickey.

• Certificate management can be avoided.

• A trusted private key generator (PKG) generates secret keys.

PKG

msk

mpk

Alice Bob

uskA

Alice

Alice uskB

Bob

Bob

Page 7: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Identity-Based Signatures

• IBS is the concept of digital signatures extended toidentity-based setting.

Signer Verifier

PKG

(σ; (id,m))

usk

id

mpk

• Focus of the talk: construction of IBS schemes

Page 8: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Identity-Based Signatures

• IBS is the concept of digital signatures extended toidentity-based setting.

Signer Verifier

PKG

(σ; (id,m))

usk

id

mpk

• Focus of the talk: construction of IBS schemes

Page 9: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

FORMAL DEFINITIONS

Page 10: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Public-Key Signature

Consists of three PPT algorithms {K,S ,V}:• Key Generation, K(κ)

• Used by the signer to generate the key-pair (pk,sk)• pk is published and the sk kept secret

• Signing, Ssk(m)• Used by the signer to generate signature on some message m• The secret key sk used for signing

• Verification, Vpk(σ,m)• Used by the verifier to validate a signature• Outputs 1 if σ is a valid signature on m; else, outputs 0

Page 11: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Identity-Based Signature

Consists of four PPT algorithms {G , E ,S ,V}:• Set-up, G(κ)

• Used by PKG to generate the master key-pair (mpk,msk)• mpk is published and the msk kept secret

• Key Extraction, Emsk(id)• Used by PKG to generate the user secret key (usk)• usk is then distributed through a secure channel

• Signing, Susk(id,m)• Used by the signer (with identity id) to generate signature on

some message m• The user secret key usk used for signing

• Verification, Vmpk(σ, id,m)• Used by the verifier to validate a signature• Outputs 1 if σ is a valid signature on m by the user with

identity id; otherwise, outputs 0

Page 12: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

STANDARD SECURITY MODELS

Page 13: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Security Model for PKS: EU-CMA

COs

Apk

(σ; m)

• Existential unforgeability under chosen-message attack

• C generates key-pair (pk, sk) and passes pk to A.

• Signature Queries: Access to a signing oracle Os

• Forgery: A wins if (σ; m) is valid and non-trivial

• Adversary’s advantage in the game AdvEU−CMAA (κ):

Pr[1← Vpk(σ; m) | (sk, pk)

$←− K(κ); (σ; m)$←− AOs (pk)

]

Page 14: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Security Model for IBS: EU-ID-CMA

CO{s,ε}

Ampk

(σ; (id, m))

• Existential unforgeability with adaptive identity underchosen-message attack

• C generates key-pair (mpk, msk) and passes mpk to A.

• Extract Queries, Signature Queries

• Forgery: A wins if (σ; (id, m)) is valid and non-trivial

• Adversary’s advantage in the game AdvEU−ID−CMAA (κ):

Pr[1← Vmpk(σ; (id, m)) | (msk, mpk) $←− G(κ); (σ; (id, m))

$←− AO{s,ε}(mpk)]

Page 15: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

THE SELECTIVE-IDENTITY MODEL

Page 16: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

sID Model: Salient Features

• Introduced by Canetti et al.

• Weaker than the full model (EU-ID-CMA)• However, easier to design sID-secure protocols

• Adversary has to, beforehand, commit to the target identity• Target identity: the identity on which the adversary forges on• Adversary cannot extract query on the target identity

CO{s,ε}

Aid

mpk

(σ; (id, m))

Page 17: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

CONSTRUCTION OF IBS

Page 18: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Construction of IBS

• Considered easier task than IBE

• Folklore method: EU-ID-CMA-IBS ≡ 2(EU-CMA-PKS)• (EU-CMA-PKS) ≡ (EU-GCMA-PKS)+(CR-CHF)• Implies EU-ID-CMA-IBS ≡ 2((EU-GCMA-PKS)+(CR-CHF))

• From sID Model:• Random Oracle Model: guess the index of the target identity:

polynomial degradation• Standard Model: guess the target identity itself: exponential

degradation

Page 19: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Construction of IBS

• Considered easier task than IBE

• Folklore method: EU-ID-CMA-IBS ≡ 2(EU-CMA-PKS)• (EU-CMA-PKS) ≡ (EU-GCMA-PKS)+(CR-CHF)• Implies EU-ID-CMA-IBS ≡ 2((EU-GCMA-PKS)+(CR-CHF))

• From sID Model:• Random Oracle Model: guess the index of the target identity:

polynomial degradation• Standard Model: guess the target identity itself: exponential

degradation

Page 20: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

...Construction of IBS...

• Goal: construct ID-secure IBS from sID-secure IBS

1. without random oracles2. with sub-exponential degradation (preferably, polynomial)

• Main result: EU-ID-CMA-IBS ≡(EU-sID-CMA-IBS)+(EU-GCMA-PKS)+(CR-CHF)

• Further: EU-ID-CMA-IBS ≡(EU-wID-CMA-IBS)+(EU-GCMA-PKS)+(CR-CHF)

Page 21: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

...Construction of IBS...

• Goal: construct ID-secure IBS from sID-secure IBS

1. without random oracles2. with sub-exponential degradation (preferably, polynomial)

• Main result: EU-ID-CMA-IBS ≡(EU-sID-CMA-IBS)+(EU-GCMA-PKS)+(CR-CHF)

• Further: EU-ID-CMA-IBS ≡(EU-wID-CMA-IBS)+(EU-GCMA-PKS)+(CR-CHF)

Page 22: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

THE TRANSFORMATION

Page 23: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Objects used

1. Chameleon Hash Function

2. GCMA-secure PKS

Page 24: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Chameleon Hash Function

• A family of randomised trapdoor hash functions

• Collision Resistant (CR)

• “Chameleon” property: anyone with trapdoor information canefficiently generate collisions

Page 25: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

...Chameleon Hash Function...

Consists of three PPT {G , h, h−1}:Key Generation, G(κ):• Generates evaluation key ek and trapdoor key td

Hash Evaluation, hek(m, r):• A randomiser r used to evaluate the hash

Collision Generation, h−1td (m, r ,m′):• Outputs randomiser r ′ such that (m, r) and (m′, r ′) is a

collision:hek(m, r) = hek(m′, r ′)

Page 26: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

GCMA-secure PKS

• Adversary has to, beforehand, commit to a set of messages M• The adversary can query with Os on any message from M• Adversary has to forge on a message not in M

COs

AM

pk, σi

(σ; m)

Page 27: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

The Transformation

In a nutshell

• Takes as input:

1. an EU-sID-CMA-secure IBS Is := {Gs , Es ,Ss ,Vs}2. a collision-resistant CHF H := {Gh, h, h

−1}3. a GCMA-secure PKS P := {K,Sp,Vp}

• Outputs an EU-ID-CMA-secure IBS I := {G , E ,S ,V}

The idea:

• CHF used to map identities between I and Is

• PKS used to bind these identities

Page 28: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

The Transformation

In a nutshell

• Takes as input:

1. an EU-sID-CMA-secure IBS Is := {Gs , Es ,Ss ,Vs}2. a collision-resistant CHF H := {Gh, h, h

−1}3. a GCMA-secure PKS P := {K,Sp,Vp}

• Outputs an EU-ID-CMA-secure IBS I := {G , E ,S ,V}

The idea:

• CHF used to map identities between I and Is

• PKS used to bind these identities

Page 29: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

...The Transformation...

Set-up, G(κ):• Invoke Gs , K and Gh to obtain (msks , mpks), (sk, pk) and (ek, td)

• Return msk := (msks , sk) and mpk := (mpks , pk, ek)

Key Extraction, Emsk(id):• Select a random r and compute ids ← hek(id, r)

• Compute usks$←− Es,msks (ids) and σp

$←− Sp,sk(ids)

• Return usk := (usks , r , σp)

Signing, Susk(id,m):

• Compute σs$←− Ss,usks (ids ,m)

• Return σ := (σs , r , σp) as the signature

Verification, Vmpk(σ, id,m):

• Return 1 only if σp and σs are valid signatures

Page 30: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

SECURITY

Page 31: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Security Argument

Strategy:

• Adversaries classified into three: type 1, type 2 and type 3

• type 1: break sID-security; type 2 or type 3: break thebinding

Adversary Reduction From Degradation

type 1 Bs Is O (qs)

type 2 Bp P O (1)

type 3 Bh H O (1)

Table: qs denotes the number of signature queries

Page 32: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Reduction Bs

In a nutshell:

• Break sID-security – plug in challenge msks in the IBS I

• type 1 adversary: target identity was queried to Os

• Strategy: guess the index of this target identity• Hence the O (qs) degradation

Page 33: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

...Reduction Bs ...

Cs

Is

O{s,ε}

Bs

Is I

O{s,ε}

A

Iids

• Invoke K and Gh to obtain (sk, pk) and (ek, td)

• Choose random id, r and commit id := hek(id, r) to Cs asthe target identity; Make a guess ˜

• Cs releases mpks Bs passes mpk := (mpks , pk, ek) to A;

• Extract Queries on id:

1. If query on the `th identity then abort (abort1); else map id toa random ids

2. Query oracle Oε of Cs with id

• Signature Queries on (id,m):

1. If query on the ˜th identity then map id to ids (usingknowledge of trapdoor td); else map to a random ids

2. Query oracle Os of Cs with (id,m)

• Forgery (σ, r , σp): If the forgery is on the `th identity, pass σto Cs ; else abort (abort2)

Page 34: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

...Reduction Bs ...

Cs

Is

O{s,ε}

Bs

Is I

O{s,ε}

A

Iids

mpks

mpk

• Invoke K and Gh to obtain (sk, pk) and (ek, td)

• Choose random id, r and commit id := hek(id, r) to Cs asthe target identity; Make a guess ˜

• Cs releases mpks Bs passes mpk := (mpks , pk, ek) to A;

• Extract Queries on id:

1. If query on the `th identity then abort (abort1); else map id toa random ids

2. Query oracle Oε of Cs with id

• Signature Queries on (id,m):

1. If query on the ˜th identity then map id to ids (usingknowledge of trapdoor td); else map to a random ids

2. Query oracle Os of Cs with (id,m)

• Forgery (σ, r , σp): If the forgery is on the `th identity, pass σto Cs ; else abort (abort2)

Page 35: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

...Reduction Bs ...

Cs

Is

O{s,ε}

Bs

Is I

O{s,ε}

A

Iids

mpks

mpk

• Invoke K and Gh to obtain (sk, pk) and (ek, td)

• Choose random id, r and commit id := hek(id, r) to Cs asthe target identity; Make a guess ˜

• Cs releases mpks Bs passes mpk := (mpks , pk, ek) to A;

• Extract Queries on id:

1. If query on the `th identity then abort (abort1); else map id toa random ids

2. Query oracle Oε of Cs with id

• Signature Queries on (id,m):

1. If query on the ˜th identity then map id to ids (usingknowledge of trapdoor td); else map to a random ids

2. Query oracle Os of Cs with (id,m)

• Forgery (σ, r , σp): If the forgery is on the `th identity, pass σto Cs ; else abort (abort2)

Page 36: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

...Reduction Bs ...

Cs

Is

O{s,ε}

Bs

Is I

O{s,ε}

A

Iids

mpks

mpk

• Invoke K and Gh to obtain (sk, pk) and (ek, td)

• Choose random id, r and commit id := hek(id, r) to Cs asthe target identity; Make a guess ˜

• Cs releases mpks Bs passes mpk := (mpks , pk, ek) to A;

• Extract Queries on id:

1. If query on the `th identity then abort (abort1); else map id toa random ids

2. Query oracle Oε of Cs with id

• Signature Queries on (id,m):

1. If query on the ˜th identity then map id to ids (usingknowledge of trapdoor td); else map to a random ids

2. Query oracle Os of Cs with (id,m)

• Forgery (σ, r , σp): If the forgery is on the `th identity, pass σto Cs ; else abort (abort2)

Page 37: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

...Reduction Bs ...

Cs

Is

O{s,ε}

Bs

Is I

O{s,ε}

A

Iids

mpks

σs

mpk

σ

• Invoke K and Gh to obtain (sk, pk) and (ek, td)

• Choose random id, r and commit id := hek(id, r) to Cs asthe target identity; Make a guess ˜

• Cs releases mpks Bs passes mpk := (mpks , pk, ek) to A;

• Extract Queries on id:

1. If query on the `th identity then abort (abort1); else map id toa random ids

2. Query oracle Oε of Cs with id

• Signature Queries on (id,m):

1. If query on the ˜th identity then map id to ids (usingknowledge of trapdoor td); else map to a random ids

2. Query oracle Os of Cs with (id,m)

• Forgery (σ, r , σp): If the forgery is on the `th identity, pass σto Cs ; else abort (abort2)

Page 38: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Analysis of Bs

• Success probability governed by abort1 and abort2:

AdvEU−sID−CMAB (κ) = Pr [¬abort1 ∧ ¬abort2]×AdvEU−ID−CMAA (κ)

• Pr [¬abort2] is the same as that of guessing ˜

Pr [¬abort2] = 1/qs

• Pr [¬abort1 | ¬abort2] = 1

• Hence

AdvEU−sID−CMAB (κ) = AdvEU−ID−CMAA (κ)/qs

Page 39: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Analysis of Bs

• Success probability governed by abort1 and abort2:

AdvEU−sID−CMAB (κ) = Pr [¬abort1 ∧ ¬abort2]×AdvEU−ID−CMAA (κ)

• Pr [¬abort2] is the same as that of guessing ˜

Pr [¬abort2] = 1/qs

• Pr [¬abort1 | ¬abort2] = 1

• Hence

AdvEU−sID−CMAB (κ) = AdvEU−ID−CMAA (κ)/qs

Page 40: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

TRANSFORMING FROM THE wID MODEL

Page 41: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Transforming from the wID Model

• wID : the weak selective-identity model

• Adversary has to, beforehand, commit to the target identityand a set of query identities• Target identity: the identity on which the adversary forges on• Query identities: the identities which it can query with O{s,ε}• Adversary cannot extract query on the target identity

CO{s,ε}

Aid, Impk

(σ; (id, m))

• A similar transformation holds for wID as well• EU-ID-CMA-IBS ≡

(EU-wID-CMA-IBS)+(EU-GCMA-PKS)+(CR-CHF)

Page 42: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Transforming from the wID Model

• wID : the weak selective-identity model

• Adversary has to, beforehand, commit to the target identityand a set of query identities• Target identity: the identity on which the adversary forges on• Query identities: the identities which it can query with O{s,ε}• Adversary cannot extract query on the target identity

CO{s,ε}

Aid, Impk

(σ; (id, m))

• A similar transformation holds for wID as well• EU-ID-CMA-IBS ≡

(EU-wID-CMA-IBS)+(EU-GCMA-PKS)+(CR-CHF)

Page 43: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

Conclusion and Future Work

• We discussed a generic transformation from sID/wID IBS toID IBS

• Alternative paradigm for construction of IBS

• Linear degradation

Future Work

• Further simplification of the assumptions

• Transformation using fewer objects

Page 44: From Selective-ID to Full-ID IBS without Random Oraclespub.ist.ac.at/~ckamath/Resources/Documents/CK13b(Slides).pdfOverview Background The TransformationConclusion and Future Work

Overview Background The Transformation Conclusion and Future Work

THANK YOU!


Recommended