practical affiliation-hiding authentication from improved polynomial interpolation

36
Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation Mark Manulis, Bertram Poettering ASIACCS ‘11 Proceedings of the 6 th ACM Symposium on Information, Computer and Communications Security, March 2011, Pages 286-295, Citation: 4 Presenter: 方方方 Date: 2012/12/03 1

Upload: adair

Post on 20-Feb-2016

54 views

Category:

Documents


1 download

DESCRIPTION

Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation. Mark Manulis , Bertram Poettering ASIACCS ‘11 Proceedings of the 6 th ACM Symposium on Information, Computer and Communications Security, March 2011, Pages 286-295, Citation: 4 Presenter: 方竣民 - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

1

Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

Mark Manulis, Bertram PoetteringASIACCS ‘11 Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security,

March 2011, Pages 286-295, Citation: 4Presenter: 方竣民Date: 2012/12/03

Page 2: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

2

Outline

• Introduction• Initial Technique• Polynomial Interpolation• Optimized Multi-Group AH Protocol• Analysis• Conclusion

Page 3: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

3

Outline

• Introduction• Initial Technique• Polynomial Interpolation• Optimized Multi-Group AH Protocol• Analysis• Conclusion

Page 4: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

4

Introduction

• Affiliation-hiding (AH) protocols are valuable for hiding identities of communicating users behind their membership of groups.

• Improvements advance the area of efficient polynomial interpolation in finite fields.

Page 5: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

5

Introduction

You will see :• Implementing polynomial interpolation by lots

of mathematical ways and their pseudocode.

• One optimized multi-group Affiliation-hiding protocol.

Page 6: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

6

Outline

• Introduction• Initial Technique• Polynomial Interpolation• Optimized Multi-Group AH Protocol• Analysis• Conclusion

Page 7: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

7

Index-Hiding Message Encoding

Indices , messagesTwo algorithms iEncode and iDecode

Page 8: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

8

Multi-Group AH Protocol

• GA creates public key (n,e,g)– n is the RSA modulus– e the public exponent– g a generator of a large subgroup of

• GA keeps private key d• Membership credential cred = • Pseudonym id• , is random exponent

t is used to generate session key.

Page 9: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

9

Outline

• Introduction• Initial Technique• Polynomial Interpolation• Optimized Multi-Group AH Protocol• Analysis• Conclusion

Page 10: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

10

Interpolation Without Precomputation

• As Algorithm1, it has quadratic running time

• Algo1 already solves the problem of polynomial interpolation in reasonable time.

Page 11: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

11

Algorithm1 Polynomial Interpolation

Page 12: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

12

Interpolation Without Precomputation

• Most divisions can be replaced by multiplications, e.g.

• It is solved by algorithm2 with performance:

• But, algorithm2 needs extra storage for n-1 variables

Page 13: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

13

Algorithm2 Interpolation with Deferred Inversion

Page 14: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

14

Interpolation With Precomputation

• In some occasions polynomial interpolations have to be computed many times in succession.

Page 15: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

15

Algorithm3 Interpolation after Precomputiation

Page 16: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

16

Compare Algo2 and Algo3

• Device: Intel XEON 2.66GHz.• Using gcrypt library.

Algorithm2

Algorithm3

Page 17: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

17

Within/Without Precomputation

Page 18: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

18

Interleaved IHME

• These fields may become rather large, e.g. .

• IHME’s running time is still ,so it will be very slow.

Page 19: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

19

Interleaved IHME

For instance, an IHME setting with andCould split all messages into 8 chunks

Each of length We get new field

• The gain in efficiency might be superlinear.

Page 20: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

20

V-fold IHME

=> => is a prime, is a nature number. index space message space

Page 21: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

21

Comparison v-fold/IHME by Algo2,3

80*14=1120

Page 22: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

22

Outline

• Introduction• Initial Technique• Polynomial Interpolation• Optimized Multi-Group AH Protocol• Analysis• Conclusion

Page 23: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

23

Group Initialization Phase

• Performance in this phase is not very important, because it is only executing once.

• They improve on storage size of group parameters.

Page 24: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

24

Group Initialization Phase

• A safe prime is a prime number such that ,where is a prime as well.

Page 25: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

25

Implementing CreateGroup

Page 26: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

26

User Registration Phase

• By altering the generation of user credentials to:

cred = with

Page 27: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

27

Implementing Adduser

Page 28: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

28

Multi-Group Handshake Protocol

• Users have a set•

• at least; in first-round messages are encoded over a much small field of elements

Page 29: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

29

Multi-Group Handshake Protocol

• In second-round, the per-group key confirmation messages are of length

• Where bits would suffice.

• It mades the field size to be elements.

Page 30: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

30

Multi-Group Handshake ProtocolPart1

Page 31: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

31

Multi-Group Handshake ProtocolPart2

Page 32: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

32

Multi-Group Handshake ProtocolPart3

Page 33: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

33

Outline

• Introduction• Initial Technique• Polynomial Interpolation• Optimized Multi-Group AH Protocol• Analysis• Conclusion

Page 34: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

34

Analysis

Symmetric Key Size Asymmetric Key Size

Is it possible < ?

Page 35: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

35

Outline

• Introduction• Initial Technique• Polynomial Interpolation• Optimized Multi-Group AH Protocol• Analysis• Conclusion

Page 36: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

36

Conclusion

• They heavily modified the group management and handshake algorihms to achieve considerably better performance.

• It showed that AH authentication in the multi-group setting, and provided appropriate performance measurements .