SlideShare a Scribd company logo
1 of 10
Download to read offline
CPK:
Bounded Identity Based
Encryption
James Hughes
Guan Zhi
Identity Based Encryption
• Private matrix to the domain
• Private key to the user
• Public matrix
• Originally described as ECC based system
  > Equally valid in discrete log
• Does not require a bilinear map
• Patented
  > Publication Number WO/2006/074611
    >NAN, XiangHao
    >CHEN, Zhong
System Parameters
• Diffie Hellman group with values (g, p)
• A matrix size (m, n)
• A selection of row values are calculated from identity
  > h1···m = f (Identity)
  > Public function
  > SHA-256 or known encryption
Secret Matrix

                       
     s1,1 · · · s1,m
     . ..        .
      .       ..
  S= .           .
     sn,1 · · · sn,m
          Private to domain
Secret Key

                       
     s1,1 · · · s1,m                 m
     . ..        .
      .       ..             SA =                   mod p − 1
  S= .                                    sh(i),i
                  .
                                     i=1
     sn,1 · · · sn,m
          Private to domain                            Private to user
Public Matrix

                            
     s1,1 · · · s1,m                     m
     . ..        .
      .       ..                 SA =                   mod p − 1
  S= .                                        sh(i),i
                  .
                                         i=1
     sn,1 · · · sn,m
              Private to domain                            Private to user
  pi,j = g si,j mod p
                        
         p1,1 · · · p1,m
        . ..         .
           .      ..
  P = .              .
           pn,1 · · · pn,m
                                                         Public to domain
Public Key

                            
     s1,1 · · · s1,m                      m
     . ..        .
      .       ..                 SA =                    mod p − 1
  S= .                                         sh(i),i
                  .
                                         i=1
     sn,1 · · · sn,m
              Private to domain                              Private to user
  pi,j = g si,j mod p
                        
         p1,1 · · · p1,m                 m
        . ..         .
           .      ..             PA =                    mod p
  P = .                                       s
                                               P h(i),i
                      .
                                         i=1
           pn,1 · · · pn,m
                                                           Public to domain
Questions
• Secure?
  > Public matrix reduces to the DDH
• Collisions?
  > 32x32 then h is 32x5 or 160 bits
  > Birthday after 280 accounts
• Collusion
  > of near collision (one column different) provides difference
  > 32x32 requires ~1300 private keys.
Collusion Environment
• Without the threat of Collusion
  > Verification and not signature
  > Small matrix
• Without the threat of large scale collusion
  > Non personal equipment
  > Medium Matrix
• With the threat of large scale collusion
  > Authentication module (Chip card, USB token, TPM)
  > Large matrix
• Special Situations
  > One to ten million collusion partners
  > Ultra Large Matrix
• Is this novel?
  > Boneh Franklin
  > Murakami
  > Cocks
  > Heng, Kurosawa, CR-RSA 2004
  > Dodis, Katz, Xu, Yung, EC 2002

• Contact Jim or Guan later....

More Related Content

Viewers also liked

A Web Marketing and Social Media Primer for Traditional Industries
A Web Marketing and Social Media Primer for Traditional IndustriesA Web Marketing and Social Media Primer for Traditional Industries
A Web Marketing and Social Media Primer for Traditional IndustriesMark Graham
 
Challenges facing Industrial Sector In Sudan
Challenges facing Industrial Sector In SudanChallenges facing Industrial Sector In Sudan
Challenges facing Industrial Sector In SudanMohamed Suliman Hussein
 
Cola wars in india
Cola wars in indiaCola wars in india
Cola wars in indiaRahul Rathi
 
Magazine advertisment analysis
Magazine advertisment analysisMagazine advertisment analysis
Magazine advertisment analysiswilsonkateemily
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorNitesh Kumar
 
Presentation on television advertisements
Presentation on television advertisementsPresentation on television advertisements
Presentation on television advertisementsPriya Singh
 
How to Read an Advertisement
How to Read an AdvertisementHow to Read an Advertisement
How to Read an Advertisementjpahls
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbhijit Akotkar
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionPapitha Velumani
 
Secondary sector
Secondary sectorSecondary sector
Secondary sectorgeobip
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationshalini singh
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis zaidsalfawzan
 

Viewers also liked (20)

A Web Marketing and Social Media Primer for Traditional Industries
A Web Marketing and Social Media Primer for Traditional IndustriesA Web Marketing and Social Media Primer for Traditional Industries
A Web Marketing and Social Media Primer for Traditional Industries
 
Challenges facing Industrial Sector In Sudan
Challenges facing Industrial Sector In SudanChallenges facing Industrial Sector In Sudan
Challenges facing Industrial Sector In Sudan
 
Sse cola wars_group#4a_2011
Sse cola wars_group#4a_2011Sse cola wars_group#4a_2011
Sse cola wars_group#4a_2011
 
Cola wars in india
Cola wars in indiaCola wars in india
Cola wars in india
 
Sadara Corporate Awareness
Sadara Corporate AwarenessSadara Corporate Awareness
Sadara Corporate Awareness
 
Ads analysis
Ads analysisAds analysis
Ads analysis
 
Magazine advertisment analysis
Magazine advertisment analysisMagazine advertisment analysis
Magazine advertisment analysis
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Presentation on television advertisements
Presentation on television advertisementsPresentation on television advertisements
Presentation on television advertisements
 
How to Read an Advertisement
How to Read an AdvertisementHow to Read an Advertisement
How to Read an Advertisement
 
Format preserving encryption bachelor thesis
Format preserving encryption bachelor thesisFormat preserving encryption bachelor thesis
Format preserving encryption bachelor thesis
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Laws on retrenchment and HR implications
Laws on retrenchment and HR implicationsLaws on retrenchment and HR implications
Laws on retrenchment and HR implications
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
Secondary sector
Secondary sectorSecondary sector
Secondary sector
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis
 
Mark zuckerberg
Mark zuckerbergMark zuckerberg
Mark zuckerberg
 
Advertisment
AdvertismentAdvertisment
Advertisment
 

More from Zhi Guan

USB Token Design and Implementation
USB Token Design and ImplementationUSB Token Design and Implementation
USB Token Design and ImplementationZhi Guan
 
CPK Theory And Parctice
CPK Theory And ParcticeCPK Theory And Parctice
CPK Theory And ParcticeZhi Guan
 
CPK Cryptosystem In Solaris
CPK Cryptosystem In SolarisCPK Cryptosystem In Solaris
CPK Cryptosystem In SolarisZhi Guan
 
A Survey of Identity-Based Encryption
A Survey of Identity-Based EncryptionA Survey of Identity-Based Encryption
A Survey of Identity-Based EncryptionZhi Guan
 
Ph D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing SecurityPh D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing SecurityZhi Guan
 
Red Office Documents Security Proposal
Red Office Documents Security ProposalRed Office Documents Security Proposal
Red Office Documents Security ProposalZhi Guan
 
ICDCS‘08 WebIBC
ICDCS‘08 WebIBCICDCS‘08 WebIBC
ICDCS‘08 WebIBCZhi Guan
 
Crypto With OpenSSL
Crypto With OpenSSLCrypto With OpenSSL
Crypto With OpenSSLZhi Guan
 
Code Signing with CPK
Code Signing with CPKCode Signing with CPK
Code Signing with CPKZhi Guan
 

More from Zhi Guan (10)

USB Token Design and Implementation
USB Token Design and ImplementationUSB Token Design and Implementation
USB Token Design and Implementation
 
CPK Theory And Parctice
CPK Theory And ParcticeCPK Theory And Parctice
CPK Theory And Parctice
 
CPK Cryptosystem In Solaris
CPK Cryptosystem In SolarisCPK Cryptosystem In Solaris
CPK Cryptosystem In Solaris
 
Easy CPK
Easy CPKEasy CPK
Easy CPK
 
A Survey of Identity-Based Encryption
A Survey of Identity-Based EncryptionA Survey of Identity-Based Encryption
A Survey of Identity-Based Encryption
 
Ph D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing SecurityPh D Proposal, Cloud Computing Security
Ph D Proposal, Cloud Computing Security
 
Red Office Documents Security Proposal
Red Office Documents Security ProposalRed Office Documents Security Proposal
Red Office Documents Security Proposal
 
ICDCS‘08 WebIBC
ICDCS‘08 WebIBCICDCS‘08 WebIBC
ICDCS‘08 WebIBC
 
Crypto With OpenSSL
Crypto With OpenSSLCrypto With OpenSSL
Crypto With OpenSSL
 
Code Signing with CPK
Code Signing with CPKCode Signing with CPK
Code Signing with CPK
 

Recently uploaded

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 

Recently uploaded (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 

CPK: Bounded Identity Based Encryption

  • 2. Identity Based Encryption • Private matrix to the domain • Private key to the user • Public matrix • Originally described as ECC based system > Equally valid in discrete log • Does not require a bilinear map • Patented > Publication Number WO/2006/074611 >NAN, XiangHao >CHEN, Zhong
  • 3. System Parameters • Diffie Hellman group with values (g, p) • A matrix size (m, n) • A selection of row values are calculated from identity > h1···m = f (Identity) > Public function > SHA-256 or known encryption
  • 4. Secret Matrix   s1,1 · · · s1,m  . .. . . .. S= . . sn,1 · · · sn,m Private to domain
  • 5. Secret Key   s1,1 · · · s1,m m  . .. . . .. SA = mod p − 1 S= . sh(i),i . i=1 sn,1 · · · sn,m Private to domain Private to user
  • 6. Public Matrix   s1,1 · · · s1,m m  . .. . . .. SA = mod p − 1 S= . sh(i),i . i=1 sn,1 · · · sn,m Private to domain Private to user pi,j = g si,j mod p   p1,1 · · · p1,m  . .. . . .. P = . . pn,1 · · · pn,m Public to domain
  • 7. Public Key   s1,1 · · · s1,m m  . .. . . .. SA = mod p − 1 S= . sh(i),i . i=1 sn,1 · · · sn,m Private to domain Private to user pi,j = g si,j mod p   p1,1 · · · p1,m m  . .. . . .. PA = mod p P = . s P h(i),i . i=1 pn,1 · · · pn,m Public to domain
  • 8. Questions • Secure? > Public matrix reduces to the DDH • Collisions? > 32x32 then h is 32x5 or 160 bits > Birthday after 280 accounts • Collusion > of near collision (one column different) provides difference > 32x32 requires ~1300 private keys.
  • 9. Collusion Environment • Without the threat of Collusion > Verification and not signature > Small matrix • Without the threat of large scale collusion > Non personal equipment > Medium Matrix • With the threat of large scale collusion > Authentication module (Chip card, USB token, TPM) > Large matrix • Special Situations > One to ten million collusion partners > Ultra Large Matrix
  • 10. • Is this novel? > Boneh Franklin > Murakami > Cocks > Heng, Kurosawa, CR-RSA 2004 > Dodis, Katz, Xu, Yung, EC 2002 • Contact Jim or Guan later....