<< 2012-3 >>
Cryptography Group
 
Optimizing Baby Step-Giant Step methods

E. Ellen Teske, U. Waterloo, Canada.

An important problem in public-key cryptography is the discrete logarithm problem: given a finite cyclic group generated by the group element g, and a group element h, find x such that g^x =h. An efficient method to solve this equation is Shanks' baby step-giant step method. In our talk we discuss the algorithm and recent improvements on its worst-case performance. Moreover, we solve the problem of minimizing its average running time if we know the probability distribution for the unknown x.


The XTR Cryptosystem

S. Galbraith, U. Bristol.

The XTR public key cryptosystem is a recent invention of Arjen Lenstra and Eric Verheul. Rather than being a new cryptosystem it is a a new representation of a certain subgroup of the multiplicative group of a finite field. The cryptosystem itself is just the usual digital signature standard (DSS). The XTR representation gives improvements to the computation time and storage requirement compared with the more traditional representations of subgroups of finite fields.


The LOCO-I Lossless Image Compression Algorithm:
Principles and Standardization into JPEG-LS

G. Seroussi, HP Labs Palo Alto.

LOCO-I (LOw COmplexity LOssless COmpression for Images) is the algorithm at the core of JPEG-LS, the new ISO/ITU standard for lossless and near-lossless compression of continuous-tone images. It is conceived as a "low complexity projection" of the universal context modeling paradigm, matching its modeling unit to a simple coding unit. By combining simplicity with the compression potential of context models, the algorithm "enjoys the best of both worlds." It is based on a simple fixed context model, which approaches the capability of the more complex universal techniques for capturing high-order dependencies. The model is tuned for efficient performance in conjunction with an extended family of Golomb-type codes, which are adaptively chosen, and an embedded alphabet extension for coding of low-entropy image regions. LOCO-I attains compression ratios similar or superior to those obtained with state-of-the-art schemes based on arithmetic coding. Moreover, it is within a few percentage points of the best available compression ratios, at a much lower complexity level. We discuss the principles underlying the design of LOCO-I, and its standardization into JPEG-LS.

(LOCO-I is joint work with Marcelo Weinberger, HP Labs, and Guillermo Sapiro, U. of Minnesota, formerly with HP Labs.)


Convertible Undeniable Standard RSA Signatures

W. Mao, HP Labs Bristol.

A convertible undeniable signature is issued as an undeniable signature which can provide good privacy service in its early lifecycle. Later when necessary, it can be converted into an ordinary signature by a designated party and thereafter assures good accountability just as an ordinary digital signature does. We propose an RSA-based convertible undeniable signature which, in its stage of undeniable signature verification, operates in modulo the square of a standard RSA modulus and thereafter becomes a standard RSA-based undeniable (convertible) signature. This solves an open problem for designing efficient RSA-based undeniable signatures using the general form of composite modulus and achieves an efficiency for such schemes suitable for practical applications.

(This is joint work with Kenny Paterson, HP Labs)


The composition of ideal secret sharing schemes and matroids

S.L. Ng, RHBNC.

A secret sharing scheme is a method of dividing a secret among a set of participants in such a way that only certain subsets of participants, called the authorised subsets, can reconstruct the secret. The collection of authorised subsets is called the access structure. In an ideal secret sharing scheme, the access structure is uniquely determined by its minimal sets. In this talk we discuss some recent results in the characterisation of these sets. The relationship between matroids and ideal access structures is well-known and we will be discussing most of the results in terms of matroids.

(This is joint work with Mike Walker, Vodafone)


The Weil pairing and its applications in cryptography

T. Garefalakis, U. Toronto, Canada

We present a generalization of the Weil pairing that, in special cases, is equivalent to the Tate pairing. The applications of the pairing to cryptography are both constructive and distructive.


The hidden number problem

P. Nguyen, ENS, France

The hidden number problem was introduced in 1996 by Boneh and Venkatesan to study the bit-security of the Diffie-Hellman key exchange in prime fields. The problem is the following: recover a hidden number \alpha in a prime field \F_p such that for many known random t_i \in F_p, approximations of \alpha t_i are known.

Recently, variants of the hidden number problem have been studied to obtain stronger security results, but also attacks on DSA-type signature schemes under the assumption that the random nonce (used at each signature generation) is partially known. In this talk, we will survey results on the hidden number problem and its variants.


Towards the Verification of the SET Protocol

L.C Paulson, U. Cambridge

Secure Electronic Transactions is possibly the most complex security protocol in use, with over 1000 pages of official documentation. Lessons will be reported from work on its first phase: Cardholder Registration.

(This is joint work with Giampaolo Bella, Fabio Massacci and Piero Tramontano)


Introduction to Quantum Computation: The hidden subgroup problem: Factoring, DLOG and Graph Isomorphism

R. Jozsa, U. Bristol

Amongst the most remarkable successes of quantum computation are Shor's efficient quantum algorithms for the computational tasks of integer factorisation and the evaluation of discrete logarithms. In this talk we review the essential ingredients of these algorithms and draw out the unifying generalization of the so-called abelian hidden subgroup problem. This involves an unexpectedly harmonious alignment of the formalism of quantum physics with the elegant mathematical theory of group representations and fourier transforms on finite groups. Finally we consider the non-abelian hidden subgroup problem mentioning some open questions where future quantum algorithms may be expected to have a substantial impact.


Quantum Message Authentication Codes

H. Barnum, U. Bristol

I give an introduction to the best-known class of quantum error-correcting and error-detecting codes, stabilizer codes. I then describe a protocol which assures the recipient of a quantum state (or classical message) that it has come from a sender with whom he has previously shared secret key. The protocol works by encoding the state in a secret quantum error-detecting code randomly chosen from a special class associated to an algebraic curve over a finite field. Its security is "information-theoretic" or "unconditional", that is, it is based on shared secret key and not on any assumed limitations on the adversary's computational power. The protocol is more secure than classically possible when used to authenticate classical messages, and as with the best information-theoretically secure classical protocols (such as the Carter-Wegman universal hash-function protocols), security has very weak dependence on message length so that the key used may be much shorter than the message.


Introduction to Elliptic Curve Cryptography (ECC)

S. Galbraith, U. Bristol

This talk will give a brief introduction to the ideas behind elliptic curve cryptography (ECC). ECC is a public key cryptographic technique which can provide increased security for reduced bandwidth, power consumption or computing time. As such it is becoming increasinly important in constrained environments such as PDA's.

In this talk the elliptic curve group law will be discussed. Algorithms for the EC-DLP such as Baby-Step/Giant-Step, Pollard rho, MOV/FR and SmartASS will also be described. A brief introduction to how systems can actually be constructed via Schoof's algorithm will also be given.

This talk is a repeat of that given at the LMS Durham Symposium on Computational Number Theory.


ECC : Protocols, implementations and standards

N. Smart, U. Bristol

This talk will expand on the previous one and go into more details from a cryptographic perspective. ECC is a public key cryptographic technique which can provide increased security for reduced bandwidth, power consumption or computing time. As such it is becoming increasinly important in constrained environments such as PDA's.

This talk will look at a variety of protocols which are associated with ECC, focusing on those which are more widely known and deployed. In particular the talk will discuss EC-DH, EC-DSA, MQV and Implicit Certificates. The talk will then go on to discuss implementation issues and standardization efforts.

This talk is a repeat of that given at the LMS Durham Symposium on Computational Number Theory.


Formally Modelling Secrecy

J. Jurjens, U. Oxford

We present a notion of secrecy (following the standard approach of Dolev and Yao (1983)) in a formal model which is preserved under refinement and composable. Both these properties are considered to be useful and are notoriously difficult to achieve for security properties (``refinement paradox''). As an example for a use of this notion, we analyse a variant of the Internet security protocol TLS (current successor of SSL) proposed at INFCOM'99, uncovering a previously unpublished flaw.


Paillier's cryptosystem revisited

N. Howgrave-Graham, IBM T.J. Watson Research Labs

The talk will start by recapping the history of achieving provable semantic security with RSA-type cryptography in the standard (rather than RO) model (i.e. not OAEP). This will start with the notion of probabilistic encryption as introduced by Goldwasser and Micali, and end with the recent cryptosystem proposed by Paillier. We then show two different ways of extending Paillier's work. Firstly we show that the semantic security can be based on a computational rather than a decisional assumption, and then we show that a related cryptosystem may be made considerably more efficient under a slightly different (but plausible) assumption. This is joint work with Dario Catalano, Rosario Gennaro and Phong Nguyen.


Identity Based Cryptosystems

C. Cocks, Cheltenham

Cryptographic systems in which a user can choose his public key to equal his identity (email address for example) were first proposed by Shamir in 1984. One advantage of such systems is that they can permit secure communication without the need for directories of public keys. The talk will discuss progress in the development of identity based cryptosystems.


Authentication by Correspondence

D. Gollman, Microsoft Research Cambridge

In the attempt to capture the concept of entity authentication in a precise fashion, most researchers have settled on correspondence properties. This holds for the cryptographic world, see e.g. the work inspired by Bellare and Rogaway, and for protocol analysis using formal methods. I will trace the history of correspondence properties, query whether they properly capture entity authentication at all, and use the example of two International Standards on entity authentication to show that this term does not even have single 'intuitive' interpretation. I conclude that some correspondence properties could be viewed as the formalisation of one of those intuitive aspects of entity authentication, whilst others do not have any familiar interpretation and only emerged for the sake of verification.


Undetachable signatures, threshold signatures and mobile agents

C. Mitchell, RHBNC

This talk is concerned with security issues which arise when a mobile agent is required to sign transactions on behalf of a user. The simplest solution would be for the mobile agent to be given the user's private signature key. However, this is undesirable since the mobile agent may run on platforms over which the user has no direct control. A number of authors have previously considered this problem, resulting in the notion of an undetachable signature. Such a scheme gives the agent only the ability to sign certain types of transaction on behalf of the user, reducing the risk to the user's signature capability. We consider a 'pragmatic' alternative to the use of undetachable signatures, and show that this alternative has potential practical advantages.

The rest of the talk is concerned with a related problem, namely where the user distributes signing capability over a number of agents. This deals with a threat not properly dealt with by the undetachable signatures approach, since even if an agent has a very restricted signing capability, this capability might still be misused, e.g. to authorise sub-optimal transactions. This situation provides an application for a threshold signature, a means of computing a signature which requires the co-operation of a collection of agents of a specified size (from amongst the set of all agents). We consider a simple alternative to the use of threshold signatures which, in certain cases, may have practical advantages. Finally, we consider how the notions of threshold signatures and undetachable signatures can be combined to give an 'undetachable threshold signature'. We present a practical example of such a scheme. Such a scheme allows a specifically restricted signing power to be distributed across multiple agents.

The work reported in the talk has formed part of the Software Based Systems area of the Core 2 Research Programme of the Virtual Centre of Excellence in Mobile and Personal Communications, Mobile VCE, www.mobilevce.co.uk, whose funding support, including that of the EPSRC, is gratefully acknowledged. More detailed technical reports on this research are available to Industrial Members of Mobile VCE.

The content of the talk is joint work of Niklas Borselius, Aaron Wilson and Chris Mitchell.


Counting points on curves in small characteristic

P. Gaudry, LIX Ecole Polytechnique

Counting points is a difficult task when one builds a cryptosystem based on the discrete logarithm problem in elliptic curves. Before two years ago, the only algorithms to do it were variants of the algorithm of Schoof. In 1999, Satoh showed that p-adic methods could be used in this context and he improved the theoretical complexity of this problem when the characteristic of the base field is small. Two years later, his method has been improved in several ways and has become of practical use in cryptography.

Firstly, in this talk, we will recall Satoh's algorithm as it was originally designed. Then we will explain how Vercauteren modified it to save memory, and the similarities and differences between his method and another one due to Mestre. We will then give some hints on how Mestre's algorithm can be extended to curves of genus 2. And finally, we will say a few words about a completely different technique, due to Kedlaya, which seems to be well designed for high genus curves.


Trends in Algorithm Design

M. Robshaw, RHBNC

By reflecting on proposals for the Advanced Encryption Standard, we illustrate a wide variety of approaches and techniques in the design of modern algorithms.


An Attack on Black-box Traitor Tracing Schemes

J. Yan, U. Cambridge

In Crypto'99, Boneh and Franklin proposed an efficient public key traitor tracing scheme, which was believed to be able to catch all traitors while not accusing any innocent users as long as the number of traitors is at or below a threshold k. Assuming that Decision Diffie-Hellman problem is unsolvable in $G_{q}$, Boneh and Franklin proved that a decoder cannot distinguish invalid ciphertexts from valid ones. However, our novel pirate $P_{3}$ manages to make some invalid ciphertexts distinguishable without violating the assumption, and it can also frame innocent user coalitions to fool the tracer. Neither the Boneh-Franklin's single-key nor arbitrary pirate tracing algorithm presented in their Crypto'99 paper can identify all keys used by $P_{3}$ as claimed, and instead, it is possible for both algorithms to catch NONE of the traitors who contribute keys to $P_{3}$.

"Traffic analysis" is suggested as a simple way to defeat some (black-box) traitor tracing schemes in general: when a tracing algorithm is running, it must present certain "traffic pattern" distinguishable from normal traffic, so an intelligent pirate box may detect and exploit the same pattern to disturb/defeat the tracing algorithm.


Counting points on hyper-elliptic curves in small characteristic with Kedlaya's algorithm.

F. Vercauteren, U. Leuven.

Cryptosystems based on hyper-elliptic curves have similar advantages as the ones based on elliptic curves. However, until recently it was quite impossible to determine the number of points on a random hyper-elliptic curve suitable for cryptography. Thanks to the algorithm of Kedlaya it is now possible to generate secure random hyper-elliptic curves in polynomial time. In this talk we will explore the vast background of this algorithm and discuss the results obtained with our implementation.


How secure is AES (Rijndael)?

N. Ferguson, Counterpane

Niels, one of the Twofish designers, will present the best known attacks on AES. We will also discuss recent results showing that AES has a very simple algebraic representation. This implies that AES depends on a new and untested computational complexity assumption.


Primitive Trinomials and Random Number Generators

R. Brent, U. Oxford.

In this talk, which describes joint work with Samuli Larvala and Paul Zimmermann, we consider the problem of testing trinomials over GF(2) for irreducibility or primitivity. In particular, we consider trinomials whose degree r is the exponent of a Mersenne prime. We describe a new algorithm for testing such trinomials. The algorithm is significantly faster than the standard algorithm, and has been used to find primitive trinomials of degree 3021277. Previously, the highest degree known was 859433.

For certain r, primitive trinomials of degree r do not exist. We show how to overcome this difficulty by finding trinomials with a primitive factor of degree r and overall degree slightly greater than r.

One of the applications is to pseudo-random number generators. Using the new primitive trinomials, we can obtain uniform random number generators with extremely long period and good statistical properties.


Counting points on varieties over finite fields of small characteristic

A. Lauder, U. Oxford

I will present some results recently obtained with Daqing Wan on counting the number of solutions to equations over finite fields, or in fancy language, computing zeta functions. I will begin by introducing the problem in simple and intuitive language, before presenting our first result: that one may efficiently count the number of solutions to any equation, or system of equations, over a finite field of small characteristic. This general result is not of much direct practical use. Next, I will described a much better algorithm for counting solutions to ``Artin-Schreier equations''. This yields a practical method of computing the order of the Jacobian of a hyperelliptic curve in characteristic 2, and as such is of interest in cryptography. The talk will not go into too much detail, except towards the end, but rather will concentrate on conveying the basic methods used.


Algorithms for divisor class groups of curves over finite fields

F. Hess, U. Bristol

The divisor class group of curves over finite fields can be used to build cryptosystems based on the discrete logarithm problem. We discuss some constructive and destructive aspects of this. Among the constructive aspects we mention how to actually represent elements of the divisor class group and how to perform the group laws. The destructive aspects will focus on some ways to attack the discrete logarithm problem.


3G mobile network security

P. Howard, Vodafone

The standardised security features for 3G mobile networks will be reviewed. It will be shown how GSM security features have been enhanced for use in 3G and how new security features have been introduced to combat new threats.


Rijndael and the Advanced Encryption Standard (AES)

Vincent Rijmen, Cryptomathic

We give an overview of the highlights of the AES selection process and discuss the main design features of the 5 finalists. Subsequently, we discuss in some more detail the design principles of Rijndael.


Cryptographic Primitives from the Weil and Tate pairings

K. Paterson, RHUL

We consider constructive applications of the Weil and Tate pairings in cryptography. We will review the identity-based encryption scheme of Boneh and Franklin from Crypto2001. We next look at Joux's tri-partite Diffie-Hellmann key exchange protocol from ANTS in 2000. Then we construct several new cryptographic primitives based on the Weil/Tate pairing. We will not assume the audience has any specialist knowledge in number theory.


Non-symbolic fragmentation for data transmission

H. Ashman, U. Nottingham

In this talk we will introduce and discuss the use of non-symbolic fragmentation of data for secure communications. Non-symbolic fragmentation, or NSF, relies on breaking up data into non-symbolic fragments, which are (usually irregularly-sized) chunks whose boundaries do not necessarily coincide with the boundaries of the symbols making up the data. For example, ASCII data is broken up into fragments which may include 8-bit fragments but also include many other sized fragments. Fragments are then separated with a form of path diversity. The secrecy of the transmission relies on the secrecy of one or more of a number of things: the ordering of the fragments, the sizes of the fragments, and the use of path diversity. Once NSF is in place, it can secure many forms of communication, and is particularly useful for exchanging sensitive information, and for commercial transactions. A sample implementation is described with an evaluation of the technology.

This talk overviews work done for Amino Comunications, Cambridge UK.


Tate Modern

S. Galbraith, RHUL

We describe the modern art of the Tate. Reference will be made to key questions such as identity and the artist, the authenticity of signed works, and more.


Padding for Security

D. Soldera, HP Labs Bristol

We review the various methods that pad an asymmetric encryption scheme that is weakly secure into an encryption scheme that is strongly secure. Terms such as "weakly" and "strongly secure" will be explained to give the audience an intuitive understanding.


Why Physicists find Commitment Confusing

A. Kent, HP Labs Bristol

Quantum cryptography introduces distinctions between protocols that are classically counter-intuitive. I review recent work on physics-based protocols for bit commitment and related tasks, and explain why, if unconditional security is required:

  1. quantum bit commitment (without using relativity) is impossible
  2. relativistic bit commitment is possible
  3. non-relativistic quantum commitment of a bit string, with some bits guaranteed to remain unreadable, is also possible.

On the security of the Elliptic Curve Digital Signature Algorithm (ECDSA)

J. Malone-Lee, U. Bristol

We review standard techniques for proving the security of digital signature algorithms in the random oracle model. We show why these techniques cannot be applied to ECDSA. Finally we consider how minor modifications can produce provably secure signature schemes.


Tightrope walking: a primer on public policy issues

M. Sadler, HP Labs Bristol

When we design and implement secure systems and protocols we often have to deal with strongly conflicting requirements. These requirements often arise from different fundamental views about the ownership of, and rights associated with, electronic information - views that the stakeholders will often seek to protect by legal means. We look at these tensions with some illustrative areas:


Cycling in the fast lane

J. McKee, RHUL

About thirty years ago, Shanks showed how the theory of binary quadratic forms with integer coefficients and positive (but not square) discriminants relates to the theory of integer factorisation. The most familiar (least unfamiliar?) factoring method based on this theory is his SQUFOF (SQUare FOrm Factorisation) method. This involves travelling around a cycle of forms until a `special' form is found. This talk will recall the key ideas in Shanks' method (no prior knowledge expected), and will discuss how one might attempt to travel around the cycle at greater speed.


Mist: A Randomised Exponentiation Algorithm suitable for RSA.

C. Walter, Comdo

Recent attacks using differential power analysis (DPA) have shown how good equipment and poor implementation might be applied to break a single use of RSA on a smart card. The attacks are based on recognising the re-use of operands in the standard square-and-multiply, m-ary or sliding windows exponentiation schemes. A new algorithm is presented which avoids such operand re-use and consequently provides much greater resistance to DPA. It is based on generating random addition chains. Unlike the easier process of generating addition/subtraction chains (which have been applied to ECC), the algorithm does not require the computation of an inverse, and so is also applicable to RSA.

The talk will concentrate on two aspects of the algorithm, namely its efficiency and its security against side channel leakage. The former establishes performance akin to that of 4-ary exponentiation. The latter will assume the attacker can distinguish between squares and multiplies, and perhaps recognise re-use of operands. Under such attacks, it still appears to be computationally infeasible to recover the secret exponent.


Essential Algebraic Structure within the AES

S. Murphy, RHUL

One difficulty in the cryptanalysis of the AES (Advanced Encryption Standard) is the interplay between operations in the two fields GF(2^8) and GF(2). This talk outlines a new approach that avoids this conflict by showing how AES can be expressed using only simple algebraic operations in GF(2^8). One consequence is that AES encryption can be described by an extremely sparse overdetermined multivariate quadratic system over GF(2^8), whose solution would recover an AES key.


And You Will Know Us by the Trail of Dead: Digital Rights Management, Copyright and Lawyers.

A. Charlesworth, U. Bristol

The legal battles between the Recording Industry Association of America (RIAA) and Napster, and the Motion Picture Association of America (MPAA) and 2600, based around the US Digital Millennium Copyright Act (DMCA), suggest that rightholders are willing to use a combination of DRM and the law to exercise their rights over works in the digital environment. But is this merely a justified response to the problems of managing rights on-line, or does this joint use of new technical and legal innovations hide the destruction of user rights, the stifling of technical innovation, and the elimination of competition?


Regulations, revelations, and revolutions

S. Zaba, HP Labs Bristol

Regulations surrounding the general use of cryptographic technologies have ranged from the unremarkable, through the bureaucratic, and on to the bizarre. With illustrations and anecdotes, we will trip lightly through the history and current practice surrounding the regulation of encryption, digital signatures, and privacy rights, in the UK, US, EU, and other jurisdictions. The seminar will be light on both legal theory and conspiracy theories.


Image and Video authentication with Fragile Watermarks

N. Canagarajah, U. Bristol

Digital images such as CCTV footage are increasingly being used as evidence in high profile court cases. However, manipulation and tampering of image and video has become very easy and we need tools to detect such manipulations. This talk will outline the use of digital watermarking for image and video authentication. In particular, we will introduce the use of fragile watermarking techniques as a means of establishing whether or not information has been manipulated. We have developed a number of techniques for image and video authentication. I will discuss some of our recent work based on a Bayesian approach for attack detection and classification which offers significant promise in this area. In particular correlation based watermark detection algorithms have been developed which allow the degradation of the watermark to be measured after different attacks. I will describe our patented double watermarking approach where the difference between the two watermark correlations is then used as the core input to a Bayesian classifier. Finally I will also describe video watermarking systems suitable for MPEG2 and MPEG4 based compression systems which can detect frame reordering, skipping and dropping.


Validating a Web Service Security Abstraction by Typing

A. Gordon, Microsoft Research Cambridge

Based on joint work with Riccardo Pucella, Cornell University Paper to appear at 2002 ACM Workshop on XML Security http://research.microsoft.com/~adg.

An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP. We consider the problem of authenticating requests and responses at the SOAP-level, rather than relying on transport-level security. We propose a security abstraction, inspired by earlier work on secure RPC, in which the methods exported by a web service are annotated with one of three security levels: none, authenticated, or both authenticated and encrypted. We model our abstraction as an object calculus with primitives for defining and calling web services. We describe the semantics of our object calculus by translating to a lower-level language with primitives for message passing and cryptography. To validate our semantics, we embed correspondence assertions that specify the correct authentication of requests and responses. By appeal to the type theory for cryptographic protocols of Gordon and Jeffrey's Cryptyc, we verify the correspondence assertions simply by typing. Finally, we describe an implementation of our semantics via custom SOAP headers.


Security Proofs for Group Key Agreement

C. Boyd, QUT

Provable security for key establishment protocols was first provided by Bellare-Rogaway in 1993 for a simple two-party protocol. Since then many more protocols have been proven secure in the same model. Recently, Bresson-Chevassut-Pointcheval have proven group Diffie-Hellman protocols secure in the Bellare-Rogaway model. One measure of the efficiency of a key establishment protocol is the number of parallel rounds in which it can complete. The protocols proven secure by Bresson et al. require a number of rounds which increases linearly with the number of protocol participants.

In this talk I will aim to achieve the following:


Cryptographic Export Regulations

J. Thong, DTI

The talk will cover the following points:

I hope to explain the differences between the US and UK export licensing system. In the end I hope to give everyone there a better understand on how export control regulation 5P2 actually works.
Combinatorial Schemes to Trace Pirates

S. Blackburn, RHUL

I will survey some of the schemes that have been proposed to protect against piracy (of smartcards or decoder boxes in a Pay TV setting; of digital copies of a film) by enabling pirates to be traced (from the smartcards, decoder boxes or copies of a film they produce). I will concentrate on combinatorial schemes with a flavour of error correcting codes about them, such as IPP codes, traceability codes and frameproof codes.


Constraints in Role-Based Access Control

J. Crampton, RHUL

Separation of duty has been an important theoretical area of research in access control for many years. However, it has rarely been implemented in commercial operating systems and applications. We will review the history of and concepts behind separation of duty constraints and role-based access control. We then introduce a simple method for specifying constraints and discuss a potential method of implementation. The implementation model is based on history-based access control techniques that have been used to implement certain kinds of access control policies for mobile code.


Playing ``Hide-and-Seek'' in Finite Fields: Hidden Number Problem and Its Applications

I. Shparlinski, Macquarie

A survey will be given of recent results on the hidden number problem introduced by Boneh and Venkatesan in 1996 and its numerous generalizations. We describe several cryptographic and computer science applications and outline some possible directions for further research.


Noisy Channel Based Bit Commitment: Optimal Rates

A. Winter, U. Bristol

(joint work with A Nascimento and J Mueller-Quade)

Recently, it was shown that a noisy channel N of fixed parameters can be used to implement information theoretically secure bit commitment between two parties. (Subsequently this was extended to situations where the channel charcteristics are only partially known or under partial control of a cheating party.) In this work we demonstrate how n uses of the channel can be used to implement bit-string commitment, and indeed determine the optimal rate BC(N) for this task for every channel. In the talk the ideas of the proof will be explained, and some open questions presented.


A Quantum Algorithm that breaks Algebraically Homomorphic Encryption

W. van Dam, UC Berkeley, MSRI, HP Palo Alto

(joint work with Sean Hallgren and Lawrence Ip)

Homomorphic encryption concerns the situation where one party (Alice) has a secret input x, and another party (Bob) has a secret function F. Alice wants Bob to evaluate the function value F(x), but she does not want Bob to know x or F(x). Bob, on his part, is only willing to tell Alice the specific value F(x), not the general description of his function F. A solution to this problem is possible with the help of a 'homomorphic' encryption scheme E that allows Bob to calculate the encrypted answer E(F(x)), given the encrypted input E(x).

We say that an encryption scheme E is 'algebraically homomorphic' when it is possible for Bob to calculate from the encrypted numbers E(x) and E(y) the sum E(x+y) and the product E(x*y), again without discovering the secret values x and y.

In this talk I will describe an efficient quantum algorithm that breaks any algebraically homomorphic encryption scheme that uses addition and multiplication over finite fields. The best known classical algorithm for the same problem is by Boneh and Lipton, and has sub-exponential time complexity.


Several SCA-resistant Window Methods for ECC

T. Takagi, Darmstadt

Elliptic curve cryptosystem (ECC) is well-suited for the implementation on memory constraint environments due to its small key size. However, side channel attacks (SCA) can break the secret key of ECC on such devices, if the implementation method is not carefully considered. A cryptographic algorithm on them should be efficient using small memory --- we have to make efforts to optimize the trade-off between efficiency and memory. In this talk, we present several efficient SCA-resistant scalar multiplications for ECC based on window method.


Certificateless Public-Key Cryptography

K. Paterson, RHUL

We introduce the concept of "certificateless public key cryptography" (CL-PKC). In contrast to traditional public key cryptographic systems, CL-PKC does not require the use of certificates to guarantee the authenticity of public keys. It does rely on the use of a trusted third party (TTP) who is in possession of a master key. In these respects, CL-PKC is similar to identity-based public key cryptography (ID-PKC). On the other hand, CL-PKC does not suffer from the key escrow property that seems to be inherent in ID-PKC. Thus CL-PKC can be seen as a model for the use of public key cryptography that is intermediate between traditional certificated PKC and ID-PKC.

We make concrete the concept of CL-PKC by introducing certificateless public key encryption (CL-PKE), signature and key exchange schemes. The schemes are all derived from pairings on elliptic curves. The lack of certificates and the desire to prove the schemes secure in the presence of an adversary who has access to the master key requires the careful development of new security models.

Joint work with Sattam Al-Riyami


Optimizing Optimal Black Box Secret Sharing Schemes

M. Stam, Uni Bristol

(joint work with Ronald Cramer)

A black box secret sharing scheme for a threshold access structure is a linear secret sharing scheme that works over any finite abelian group. If the secret is a single group element, the number of elements in a participant's share is the expansion factor. Frankel and Desmedt introduced the problem and presented black box secret sharing schemes with expansion factor $O(n)$, where $n$ is the number of participants. Cramer and Fehr recently showed that the optimal expansion factor lies in between $\lceil \log_2 n \rceil$ and $\lfloor \log_2 n \rfloor+2$, allowing only a very small gap. We attempt to close this gap by constructing schemes that meet the aforementioned lower bound. This involves finding polynomials with certain desireable properties. For $n \le 128$ these polynomials can be found, for $n \gt 128$ there existence still seems open.


Security APIs - Digital Battlefields

M. Bond, Uni Cambridge

For the last twenty years, computer APIs have been designed that try to enforce security policies on users and the programs they run.

First, the military developed Multi-level Secure (MLS) operating systems to enforce data flow policies on users, whilst corrupt or unwitting virus- infected users tried to break the policy and obtain secret data. APIs for communications equipment were designed to restrict their usage should they fall intro the wrong hands.

Second, in the commercial world, banks used cryptography and developed security APIs to counter the threat from bad people within their ranks trying to steal critical secrets such as customer PINs. Security APIs now govern access to many more types of critical commercial data: signing keys at certification authorities, SSL master keys and credit-dispensing keys for prepayment electricity meters and mobile phone top-up.

So far, these battlefields have been largely out of public view: military force versus spies, banks versus corrupt employees. However, the third era of security APIs will put one in every desktop PC. Initiatives such as Microsoft's Palladium, 'Digital Rights Management', and 'Trusted Computing' all promise more control over who can do what on a PC.

Competition between companies for control of your PC and its associated revenue streams is now heating up. Soon, rival companies may have to defeat each others security APIs in order to allow customers to switch. Some products will have to defeat restrictive API policies just to do their job. Users may find that software on their own computers enforces policies on them that they disagree with.

There are so many colliding interests between different legitimate corporations trying to make money and between corporations and users, that a war is brewing - and your desktop PC will be the new digital battlefield.

This talk examines the origins of security APIs in the commercial setting- corporations versus corrupt employees. It describes what has been achieved, what has gone wrong, and then speculates as to the role of security APIs on the new digital battlefield of the home PC.


A comparison between traditional Public Key Infrastructures and Identity-Based Cryptography

G. Price, RHUL

(Joint work with Kenneth Paterson)

With the recent acceleration in research into Identity-based Public Key Cryptography (ID-PKC), we consider this an opportune moment to compare and contrast ID-PKC with more traditional Public Key Infrastructures (PKI). Because of the similarity in the nature of both approaches, we aim to identify the distinguish features of each. In doing so, we highlight the important questions to be asked when weighing up the benefits and drawbacks of each.


The Security Challenges of Ubiquitous Computing

F. Stajano, Uni. Cambridge

Ubiquitous computing, over a decade in the making, is now no longer just a fashionable research buzzword but a revolutionary change in the way computing affects our society---a change of similar magnitude and scope as those brought about by the World Wide Web. Think of throw-away embedded computers inside shoes, drink cans and postage stamps.

Security engineers will face specific technical challenges such as how to provide the required cryptographic functionality within the smallest possible gate count and the smallest possible power budget: the chips to be embedded in postage stamps will be the size of a grain of sand and will be powered by the energy radiated by an external scanning device.

The more significant security challenges, however, will be the systemic ones. Authentication, authorization, and even concepts as fundamental as ownership require thorough rethinking. The security challenges of the architecture are much greater than those of the mechanisms. At a higher level still, even goals and policies must be revised. One question we should keep asking is simply "Security for whom?" The owner of a device, for example, is no longer necessarily the party whose interests the device will attempt to safeguard.

Ubiquitous computing is happening and will affect everyone. By itself it will never be "secure" (whatever this means) if not for the dedicated efforts of people like us. We are the ones who can make the difference. So, before focusing on the implementation details, let's have a serious look at the big picture.


Towards a Quantum Merit Factor

M. Parker, Uni. Bergen

The challenge to construct mathematical objects which achieve spectral flatness 'everywhere' is at the forefront of many scientific disciplines, whether explicitly or implicitly. The well-known 'Littlewood Conjecture' is a challenge of this type, as is the construction of boolean functions which simultaneously satisfy a range of cryptographic criteria such as resilience and resistance to linear, differential and/or higher-order attacks. In this talk we focus primarily on the 'L_4 Norm' and related 'Aperiodic Merit Factor' as a measure of spectral flatness. We present an infinite construction based on Legendre sequences which achieves a Merit Factor > 6.34, thereby disproving a longstanding conjecture stating 6.0 as the upper bound. We then present infinite constructions for boolean functions whose multidimensional Aperiodic Merit Factor can be exactly computed via simple recursion. Potential spectral weaknesses in the S-boxes of DES and AES are also highlighted. We then present an infinite construction for multipartite quantum states whose (partial) Quantum Merit Factor can also be exactly computed via simple recursion. Moreover we show that the 'best' Quantum Error Correcting Codes achieve the highest (partial) Quantum Merit Factor. Those (graphical) quantum constructions which achieve a non-vanishing asymptotic Merit Factor also indicate the possibility of quantum macro-structures with non-vanishing Quantum Entanglement.


Malign Pointer Manipulation: Security Risks and Defense Techniques

D. Page, Uni. Bristol

The quest for high performance software has resulted in languages such as C omitting strict sematic checks on pointer use. This fact has been harnessed by malign users to attack computer systems that run such software. Most popularly characterised by the infamous "buffer overflow", the general method of corrupting or altering intra-program pointer values produces a large number of security vulerabilities that allow a remote attacker to gain privaleged access to a target device. Indeed, such attacks currently account for around a third to a half of all reported security risks.

In this talk we overview a range of pointer manipulation attacks and describe some of the measures, in both hardware and software, used to combat their use in the wild.


Direct Anonymous Attestation

L. Chen, HP Labs Bristol

This talk will give an introduction to a signature scheme called DAA (direct anonymous attestation) which is concerned with both security and privacy issues. A DAA signature convinces a verifier that the corresponding message was signed by a qualified signer. It does this without revealing the identity of the signer. The scheme provides a variety of balances between security and privacy. Users are allowed to choose whether or not a particular verifier is able to link different signatures from the same signer for this verifier. The scheme has a security proof in the random oracle model based on the strong RSA assumption and the decision Diffie-Hellman assumption.

The scheme was designed for the Trusted Computing Group (TCG), formerly known as the Trusted Computing Platform Alliance (TCPA). Each TCG platform has a Trusted Platform Module (TPM). The TPM is a tamper-resistant piece of hardware. The scheme offers assurance to an external partner that an attestation came from a genuine TPM without identifying the TPM. The scheme has been used in TCG TPM specification version 1.2. This is available at https://www.trustedcomputinggroup.org.

The content of the talk is joint work of Ernie Brickell and Jan Camenisch.


Secure Spontaneous Interaction

T. Kindberg, HP Labs Bristol

A key problem in mobile and ubiquitous computing is that of setting up associations between pairs (or larger groups) of devices so that they may communicate securely over a wireless network. For example, suppose I send a photograph over a local wireless connection from my phone or PDA to a printer when visiting my friend's house. How can I conveniently ensure that the neighbours cannot see it? It is particularly important to be able to solve this problem for spontaneous associations, which must not depend on preexisting security values such as certificates, and when the only reliable means of identifying the target device is physical. This talk concerns protocols for constructing and validating secure spontaneous associations. I shall present our first protocols, which were predicated on special hardware, and more recent work to eliminate that requirement. The problem description and much of the techniques should be broadly understandable by a general audience, but the talk will contain technical material.


Hybrid Encryption

A. Dent, RHUL

Hyrbid encryption has been used for many years, in many different products to send long messages via public key encryption algorithms. Whilst this simple technique is very intuitive, it is not without a certain level of subtlty and requires thought to be implemented correctly. It is also has famously messy security proofs!

This talk will explore some of the ideas behind hybrid encryption, talk about Shoup's KEM-DEM construction for hybrid encryption schemes and suggest some open avenues for research.


In search of the smoke from the gun - information forensics techniques and challenges

A. Clark, Inforenze

So called "High-tech" crime is becoming increasingly prevalent in today's technology rich society. Information systems and their content are frequently included in the evidential capture and analysis phase of the investigation of crime. These systems' architectures are changing from small clusters of stand-alone and networked machines to web-based schemes. It is becoming increasingly difficult to find the "Smoking Gun" in these systems and we have to cast our investigative net further than before.

This talk will discuss the typical forensic processes used in the investigation of computer assisted crime and the challenges that the forensic investigators face.


Consumer security devices: physical attacks and hardware defences

S. Moore, Uni. Cambridge

Consumer security devices like smartcards (e.g. for ID cards) may have their secret key information deduced using invasive and noninvasive techniques. Invasive techniques include reverse engineering, circuit modification and physical probing. These techniques are typically a prelude to more rapid noninvasive attacks which are a bigger worry. Noninvasive attacks include power analysis, electromagnetic analysis (EMA) and laser fault induction.

The talk will review work being undertaken in Cambridge to build more secure and yet inexpensive hardware security devices. Design time security evaluation is at the core of our approach since these security metrics allow us to rapidly explore a wide range of architectural and circuit techniques.


Concurrent Signatures

C. Kudla, RHUL

This talk will introduce the concept of Concurrent Signatures and concurrent signature protocols. These allow two entities A and B to sign (possibly different) messages M_A and M_B in such a way that, from the point of view of any third party, both signatures are ambiguous with respect to the identity of the signing party until an extra piece of information (the keystone) is released by one of the parties. Upon release of the keystone, all ambiguity is removed, and both signatures become binding to their true signers concurrently.

Concurrent signatures fall just short of providing a full solution to the problem of fair exchange of signatures, but we discuss some applications in which concurrent signatures suffice. In contrast to all previous approaches, our ``near solution'' using concurrent signatures is highly efficient and requires neither a trusted arbitrator nor a high degree of interaction between the parties. We also provide a formal model of security for a concurrent signature scheme, and give a concrete, computationally efficient example of such a signature scheme which is provably secure in our model.

The content of this talk is joint work with Liqun Chen and Kenneth Paterson, and will appear in Eurocrypt 2004.


A New Life for Group Signatures

H. Shacham, U. Stanford

Joint work with Dan Boneh and Xavier Boyen

Group signatures, introduced by Chaum and van Heyst, provide anonymity for signers. Any member of the group can sign messages, but the resulting signature keeps the identity of the signer secret. In some systems there is a third party that can undo the signature anonymity (trace) using a special trapdoor.

Within the last year, three developments have given a new life to group signatures: a new, simple security model; real-world applications; and new short and efficient constructions.

The new security model, introduced by Bellare et al. at Eurocrypt 2003, reduces group signature security to three properties: correctness, full-anonymity, and full-traceability.

New applications for group signatures include the trusted computing initiative (TCPA) and vehicle safety ad-hoc networks (DSRC). In each case, group signatures provide privacy guarantees for tamper-resistant embedded devices.

We describe a new short group signature scheme. Signatures in our scheme are approximately the size of a standard RSA signature with the same security. Security of our group signature (in the random oracle model) is based on the Strong Diffie-Hellman assumption recently used by Boneh and Boyen. We also require the Decision Linear assumption in bilinear groups. We prove security of our system using the security definition for group signatures recently given by Bellare et al.


Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography

S. Fehr, CWI Amsterdam

We propose a new adaptively secure version of Feldman's famous (statically secure) VSS scheme. Although Feldman had already addressed adaptive security in the original paper, our solution is advantageous in several ways. Based on our adaptively secure Feldman VSS scheme, we construct the first discrete-log key generation protocol (in the non-erasure model) which is adaptively secure and for which the simulator does not need to rewind the adversary. Due to its non-rewinding feature, it can be proven secure in (a slightly relaxed variant of) Canetti's Universal-Composability framework. As an application, we get (fully) universally-composable threshold Schnorr and DSS signature schemes. These are the first threshold-signature schemes whose security can be proven secure in the Universal-Composability framework.


Escrow Free Cryptographic Workflow

N. Smart, U. Bristol

Joint work with S.S. Al-Riyami and J. Malone-Lee

Cryptographic workflow is a term coined by Paterson for the use of ID based cryptography in a system where the recipient encrypts to keys whose private component may not yet exist. The idea is that the recipient has to then engage in a ``workflow'' to obtain the keys by performing some acts, or showing posession of data, for the relevant authorization authorities. The basic idea having been introduced by Chen, Harrison, Soldera and Smart (later generalized by Smart) and a related concept having been introduced by Li, Du and Boneh in the context of trust negotiation for PKI's.

In this talk we present a full security model for such schemes for arbitrary policies and present a provably secure scheme within the model. In addition our scheme is escrow free, by which we mean that the authorization authorities can determine no information about the actual message being encrypted, a property not holding for prior work in this area.


Biometric user authentication using keystroke dynamics

S.M.Furnell, University of Plymouth

The presentation will discuss the potential of user authentication using the behavioural biometric of keystroke dynamics. This technique has the potential to offer a non-intrusive measure, which can operate transparently in conjunction with the user's normal activities. This not only offers the opportunity to strengthen authentication beyond the traditional password or PIN-based methods, but also to enable it to go beyond a one-off judgement at the start of a user's session.

The talk will explain the principles of user authentication based upon keystroke dynamics, and discuss approaches to the work that have been taken at the University of Plymouth, considering application on both desktop PCs and mobile phone handsets. Particular focus will be given to a long-term user trial in which the effectiveness of the technique was determined from over 5 million keystroke samples, collected from 35 participants (with an optimum false acceptance rate of 4.9% being observed at a rate of 0% false rejection).


Some Computational and Algebraic Aspects of the Advanced Encryption Standard

C. Cid, RHUL

Since been officially selected as the Advanced Encryption Standard (AES) in 2000, Rijndael has continued to receive great attention and had its security continuously evaluated by the cryptographic community. The cipher has a simple and elegant structure, and given its careful design criteria, it seems unlikely that its security can be affected by conventional methods of cryptanalysis.

On the other hand, Rijndael has also a highly algebraic structure: the cipher round transformations are based on simple operations on the finite field GF(256). Its selection as the AES has led to a growing interest in the study of algebraic aspects of block ciphers and related analytic techniques. These techniques are algebraic rather than statistical, and involve areas such as computational algebraic geometry, commutative algebra, computer algebra. We will consider a number of algebraic aspects of the AES, and discuss some of the computational and algebraic techniques that can be used in the analysis of the cipher. In particular, we will consider the representation of the cipher as a large, though surprisingly simple, system of multivariate quadratic equations. We examine some of the approaches that have been proposed for solving such system, and discuss a few experimental results on small versions of the cipher.


Cryptographic key assignment schemes

K. Martin, RHUL

Cryptographic key assignment schemes can be used to model information flow policies that control access to sensitive data. In such a scheme each user is assigned some secret information and a secret key. They can then use their secret infomation to deduce the secret keys of any other user "beneath" them with respect to the access control policy.

We will review a number of proposed cryptographic key assignment schemes, both for partially ordered hierarchies and more general directed graphs. We will look at the factors that determine a "good" key assignment scheme and discuss some open questions regarding optimisation of these schemes.


A Deterministic Signcryption Scheme with Provable Strong Security

W. Mao, HP Labs

We present a stateful signcryption scheme which is the first deterministic public-key cryptographic system to have achieved semantic and stronger security properties. Our scheme, having avoided using a random input, is suitable for low-end (such as handheld or smartcard-based) devices which lack quality entropy for seeding generation of secure random numbers.


Efficient Unconditional Oblivious Transfer from Almost any Discrete Memoryless Channel

K. Morozov, Uni Aarhus

Joint work with C. Crepeau and S. Wolf

Oblivious transfer (OT) is a two-party cryptographic primitive of central importance, in particular in two- and multi-party computation. We show that if noise (which is inherently present in any physical communication channel) is taken into account, then OT can be realised in an unconditionally secure way for both parties, i.e., even against dishonest players with unlimited computing power. We give the exact condition under which a general discrete memoryless noisy channel allows for realising OT and show that only ``trivial'' channels, for which OT is obviously impossible to achieve, have to be excluded.


An Invitation to Noise Based Crypto

A. Nascimento, U. Tokyo

To all of you who think noise is a bad thing!

We will give an introduction to crypto protocols based on noisy channels. Basic results dealing with secret key agreement, commitment schemes and oblivious transfer will be reviewed, some open problems stated and future research directions outlined.

The talk is intended to a general audience.


Private and Secure Key Distillation from Biometrics in a Computational Model

P. Tuyls, Philips Research

Based on semantically secure encryption, we introduce robust, fully private and secure biometric key distillation and verification. Our model incorporates an adversary with side information who has access to a database with reference information. Even though our schemes are based on a master key, no master key needs to be stored in biometric sensors. In our scheme it is possible to derive a polynomial number of keys from a single biometric and we show how to renew keys in a secure and private way without additional interaction with the user. Previous work considers unconditional secure key distillation which can at most reach partial privacy and which can only lead to a small number of keys for each biometric.


Spontaneous Anonymous Group Cryptography

J. Liu, Chinese University of Hong Kong

We introduce a new notion called Spontaneous Anonymous Group (SAG) Cryptography. It allows one to spontaneously form a group of users without any collaboration from other parties. It does not require any Trusted Third Party (TTP). Another great advantage is the setup-freeness property. Without any over-powered manager and setup stage, the spontaneous formation of a group is essentially done by specifying a list of public keys associated with the identities of group members. Ring Signature is a kind of cryptographic protocols in SAG cryptography. Our research focuses on SAG cryptography. We have proposed various ring signature schemes with additional properties, such as separability and linkability. Besides, a new verifiable encryption for a group of uses is proposed. For each of these protocols, we further suggest some practical applications or scenario which may require these protocols to facilitate.


Security Research Undertaken in the University of Manchester

N. Zhang, Uni Manchester

In this talk, I am going to introduce the ideas and outcomes of some of the security research projects undertaken in the School of Computer Science, the University of Manchester. These projects include the Fair Integrated Data Exchange Services (FIDES) project aimed at designing fair exchange and non-repudiation security properties to support secure e-commerce transactions, the mobile agent security project focusing on the design of proxy signature delegation methods, and the FAME-Permis (Flexible Access Middleware Extensions to Permis) project aimed at achieving authentication assurance level linked fine-grained access control in Grid environment.


Generalised Hamming weights and lexicographic codes

K. O'Brien, Uni Bristol.

The ideas of generalised Hamming weights and the weight hierarchy of an error correcting code are motivated by applications in cryptography. The performance of a linear code on the type II wire-tap channel can be completely characterised by its weight hierarchy. Due to the relationship between generalised Hamming weights and the trellis complexity of a code, these concepts are important in coding theory for decoding purposes. We consider generalised weights for lexicographic codes. These codes are generated by applying a greedy algorithm to a lexicographically ordered vector space.


On the Subexponentiality of the Elliptic Curve Discrete Logarithm Problem over Extension Fields

C. Diem, Uni Essen.

The purpose of the talk is to present the following heuristic result.

Let $a, b \in \mathbb{R}$ with $0 \lt a \lt b$. Then there exists a randomized algorithm which computes discrete logarithms in $E(\mathbb{F}_{q^n})$, where $q$ is a prime power, $a \log_2(q) \leq n \leq b \log_2(q)$ and $E/\mathbb{F}_{q^n}$ is any elliptic curve over $\mathbb{F}_{q^n}$, in a subexponential time of $L[\frac{3}{4}]$.

The algorithm is a variant of a recent new index calculus algorithm by Gaudry. The main difference is that we increase the factor base.


Efficient Hardware Implementation of the Tate Pairing

P. Grabher, Graz and Bristol

Although identity based cryptography offers many functional advantages over conventional public key alternatives, the computational costs are significantly greater. The main computational task is the computation of a bilinear map, or pairing, over elliptic curves. We present a hardware accelerator for the Tate pairing over fields of characteristic three. We disregard the mathematical background of the pairing, and concentrate on the hardware aspects of our implementation. We discuss how FPGAs can be used for developing our own IP modules and we give a full description of our hardware architecture. Finally we compare the polynomial basis and the normal basis implementation in terms of performance and size.


Analysis of an Electronic Voting Protocol in the Applied Pi Calculus

M. Ryan, U. Birmingham

Electronic voting promises the possibility of a convenient, efficient and secure facility for recording and tallying votes in an election. Recently highlighted inadequacies of implemented systems have demonstrated the importance of formally verifying the underlying voting protocols. The applied pi calculus is a formalism for modelling such protocols, and allows us to verify properties by using automatic tools, and to rely on manual proof techniques for cases that automatic tools are unable to handle. We model a known protocol for elections known as FOO~92 in the applied pi calculus, and we formalise three of its expected properties, namely fairness, eligibility, and privacy. We use the ProVerif tool to prove that the first two properties are satisfied. In the case of the third property, ProVerif is unable to prove it directly, because its ability to prove observational equivalence between processes is not complete. We provide a manual proof of the required equivalence.


Hardware arithmetic for cryptography

M. Benaissa, U. Sheffield

This seminar presentation addresses the hardware implementation issues pertinent to GF(2^m) arithmetic for cryptography both for FPGA and ASIC. Results of an investigation into design for flexibility in cryptography are also presented. Finally, recommendations for possible useful extensions and alternative avenues are discussed in the context of arising technological and security challenges.


Pret a Voter; Practical, Voter-verifiable Elections

P. Ryan, U. Newcastle

In this talk I will describe the Pret a Voter voter-verifiable scheme. This scheme, based on an earlier scheme due to Chaum, has the surprising property that voters can confirm that their vote is accurately included in the tally, whilst at the same time preserving ballot secrecy.

I then describe some extensions such as the use of re-encryption mixes in place of the decryption mixes and adaptations to the remote voting context. I will then discuss some of the weak spots in the current scheme, including:

I will outline some possible countermeasures to these threats.
Pairings on elliptic curves over finite commutative rings

J. McKee, RHUL

This talk presents joint work with Steven Galbraith.

The Weil and Tate pairings are defined for elliptic curves over fields, including finite fields. The definitions extend to elliptic curves over finite commutative rings, such as Z / NZ . We explore some obstacles in adapting the main ideas in pairing-based cryptography to elliptic curves over such rings. In particular, we show that an oracle that computes reduced Tate pairings over Z / NZ can be used to factorise integers.


Error oracle attacks on CBC mode encryption

C. Mitchell, RHUL

The impact of recently proposed padding oracle attacks and other related attacks on CBC mode encryption is considered. For applications where unauthenticated encryption is required, the use of CBC mode is compared with its major rival, namely the stream cipher. It is argued that, where possible, authenticated encryption should be used, and, where this is not possible, a stream cipher would appear to be a superior choice. This raises a major question mark over the future use of CBC, except as part of a more complex mode designed to provide authenticated encryption.


Simulatable Security and Concurrent Composition

D. Hofheinz, CWI

The idea of simulatable security is introduced, with a view towards protocol composition operations. In particular, a new result is exhibited which states that the standard flavour of simulatable security in the framework of Reactive Simulatability does *not* allow for secure concurrent composition of protocols.


Plaintext Awareness in the Standard Model

A. Dent, RHUL

Plaintext awareness is a technique used to prove the security of public-key encryption schemes. Loosely speaking, it means that it is impossible for an attacker to produce a valid ciphertext for which he does not know the corresponding decryption. This means that a decryption oracle for a scheme that is plaintext aware is of no help to an attacker, because the ciphertexts that the attacker submits to that oracle are either invalid or the attacker already knows the decryption of the ciphertext. However, the first known formalisation of this technique (by Bellare, Desai, Pointcheval and Rogaway) could only guarantee security in the random oracle model. A second formulation (by Bellare and Palacio) appeared in Asiacrypt 2004, but the authors could not prove that any scheme met the level of plaintext awareness necessary to imply IND-CCA2 security.

This talk will review the Bellare-Palacion notion of plaintext awareness and demostrate that it is possible for a scheme (in this case, the Cramer-Shoup scheme) to meet the level of plaintext awareness that implies IND-CCA2 security. While this is not a practical result, the Cramer-Shoup scheme being famously secure in the standard model anyway, it does demonstrate that it may be possible to produce standard model proofs using this new technique.


Trapdoor Mercurial Commitments

D. Catalano, ENS Paris

(Non-interactive) Trapdoor Mercurial Commitments (TMC s) were introduced by Chase et al. [CHL05] and form a key building block for constructing zero-knowledge sets (introduced by Micali, Rabin and Kilian [MRK03]). TMCs are quite similar and certainly imply ordinary (non-interactive) trapdoor commitments (TC s).

Unlike TC s, however, they allow for some additional freedom in the way the message is opened: informally, by allowing one to claim that ``if this commitment can be opened at all, then it would open to this message''. Prior to this work, it was not clear if this addition is critical or not, since all the constructions of TMCs presented in [CHL05] and [MRK03] used strictly stronger assumptions than TCs. We give an affirmative answer to this question, by providing simple constructions of TMCs from any trapdoor bit commitment scheme. Moreover, by plugging in various trapdoor bit commitment schemes, we get, in the trusted parameters (TP) model, all the efficient constructions from [MRK03] and [CHL05], as well as several immediate new (either generic or efficient) constructions. In particular, we get a construction of TMCs from any one-way function in the TP model, and, by using a special flavor of TC s, called hybrid TCs [CV05], even in the (weaker) shared random string (SRS) model.

Our results imply that

Of independent interest, we also give a stronger and yet much simpler definition of mercurial commitments than that of [CHL05], which is also met by our constructions in the TP model.
Taonity: Grid Security from Trusted Computing

W. Mao, HP Labs China

Grid computing is a new direction to advance distributed computing featuring large scale, dynamic and service oriented sharing of resource. Grid security is a key component in grid computing. However, in all grid architectures which mainly follow Globus, a grid middleware standard, grid security is considered as plain and conventional applications of the standard PKI authentication framework and makes little impact on enhancing the grid feature of advanced resource sharing.

A useful security service from Trusted Computing Group (TCG) is behaviour conformation which can confine the users including the owner of a computing platform to behaviour desired by a remote user. This security service is practically achievable because a platform has a tamper protection hardware module Trusted Platform Module (TPM) to set the desired behaviour of the platform users. We consider that a TPM, even sparsely deployed in an initial stage, can be a shared security resource to enable strong grid security solutions. In this talk I will report the work of Project Taonity to advance grid security with TPM as shared security resource. This work leads a grid security standard track under the grid standard organisation Global Grid Forum.


Policy Based Authorisation Using X.509 Attribute Certificates

D. Chadwick, Univerisity of Kent

This talk will describe the PERMIS authorisation system, which has implemented a role based access control system, using an application independent policy decision point (PDP) and an X.509 credential validation service (CVS). Both components are driven by XML policies that specify the trust relationships between the resource owner and the attribute authorities, and the rules for which roles are required to perform which actions. The system also includes a Delegation Service that allows role holders to dynamically issue attribute certificates to other users in accordance with a delegation policy. Because of the flexibility of the design, the same CVS and PDP can be used for the delegation service, as is used for protecting grid resources, Shibboleth resources and in fact any type of resource.


Attacks on LASH

M.-J. O. Saarinen, RHUL

After a brief introduction to hash function concepts and basic collision-finding techniques, I will discuss attacks against the recently circulated preliminary version of the "Bristol" LASH hash function. My best attack has O(2^(n/4)) complexity, compared to the standard O(2^(n/2)) birthday attack. I will also discuss its relationship to the spectacular 2005 breaks of MD5 and SHA-1 (Xiaoyun Wang, Hongbo Yu, and Yiqun Lisa Yin) and what conclusions can be drawn from these.


Identity-based two-party key agreements from pairing: a snapshot

M. Cheng, U. Middlesex

This talk will give a snapshot of identity-based two-party key agreements from parings. Since 2000, using bilinear pairing of elliptic curves in cryptography has been an intensively studied area. As an important primitive, many identity-based key agreements were proposed. In this talk, a few two-party key agreements including Smart, CK, MB, Wang's protocol and some latest proposals will be discussed.


Implications of Superstrong Nonlocality for Cryptography

S. Wehner, CWI

Non-local boxes are hypothetical ``machines'' that give rise to superstrong non-local correlations, leading to a stronger violation of Bell/CHSH inequalities than is possible within the framework of quantum mechanics. We show how non-local boxes can be used to perform any two-party secure computation. We first construct a protocol for bit commitment and then show how to achieve oblivious transfer using non-local boxes. Both have been shown to be impossible using quantum mechanics alone.

Joint work with H. Buhrman, M. Christandl, F. Unger and A. Winter.


Traitor Tracing with Full Public Traceability

D.H. Phan, UCL

In Eurocrypt 2005, with Chabanne and Pointcheval, we introduced an property for traitor tracing schemes, called public traceability, which effectively makes tracing a public operation allowing anyone with access to public key to execute the tracing algorithm and identify a traitor. Our proposed scheme works well for two users. However, the multi-user system achieves only local public traceability.

In this talk, we give a solution to this problem by proposing a generic construction for a hybrid traitor tracing scheme achieving full-public-traceability. The scheme has blackbox tracing and always correctly identifies a traitor. Security of the scheme is in related CCA model which will be shown to be a natural choice in multi-receiver case. The hybrid structure makes the system efficient: the ciphertext length is the same as plaintext length plus a header and computation efficiency is effectively the same as the symmetric key encryption system used for the encryption of content. Headers in ciphertexts can be made logarithmic to the size of the user group by using codes having identifying parent property which preserves the important property of full-public-traceability.


Cryptographic hashing: basics, blockciphers and beyond

T. Shrimpton, Portland State University

We will take a closer look at one of cryptography's least flashy, yet most widely used objects, the hash function. The cryptographic community has been rocked over the last two years by a series of attacks on MD5 (broken), SHA-0 (broken), SHA-1 (teetering) and others. Now seems like a good time to revisit exactly what are these objects, what they are supposed to do for us, and how we go about constructing them. We will do this, giving special attention to blockcipher-based hash functions, their security models and performance.


Tag-Based Encryption

E. Kiltz, CWI

One of the celebrated applications of Identity-Based Encryption (IBE) is the Canetti, Halevi, and Katz (CHK) transformation from any (selective-identity secure) IBE scheme into a full chosen-ciphertext secure encryption scheme. Since such IBE schemes in the standard model are known from previous work this immediately provides new chosen-ciphertext secure encryption schemes in the standard model. This paper revisits the notion of Tag-Based Encryption (TBE) and provides security definitions for the selective-tag case. Even though TBE schemes belong to a more general class of cryptographic schemes than IBE, we observe that (selective-tag secure) TBE is a sufficient primitive for the CHK transformation and therefore implies chosen-ciphertext secure encryption.

We exemplify the usefulness of our TBE approach by constructing a TBE scheme based on the Hashed Diffie-Hellman assumption. In contrast to all known IBE schemes our TBE construction does not deploy pairings. The resulting scheme, when viewed as a key-encapsulation mechanism, leads to the most efficient chosen-ciphertext secure encapsulation scheme in the standard model.


Light-Weight Cryptography for Ubiquitous Computing

C. Paar, Ruhr Univ Bochum

For many year, the cryptographic engineering community had worked on the problem of implementing symmetric and asymmetric ciphers as fast as possible. Typical problems were RSA accelerators or high-speed DES engines. However, the advent of ubiquitous computing has led to many pervasive devices which are extremely cost-constrained. An extreme example are RFID tags but there are numerous other pervasive application -- ranging from automotive parts over sensor networks to consumer products such as computer gadgets -- which are extremely cost sensitive and for which cryptographic solutions have to provided with an optimized cost-performance ratio.

In this talk, I will present our research over the last few years in the area of light-weight cryptography. For asymmetric solutions, efficient hardware implementations of elliptic curve cryptosystems will be presented. It will be shown that a small Instruction Set Extension can enable an one-euro, 8-bit microcontroller to perform full-size ECC operations at very competitive performance levels. We will also describe a tiny ECC hardware engine which can provide elliptic curves with as little as 10,000 gates. In the symmetric case, I will present the smallest known DES hardware implementation. Our light-weight DES variant, DESL, further reduces the area requirements to 1800 gates. For higher security levels, both implementations can be equipped with key whitening at little extra costs.


Seven-Property-Preserving Iterated Hashing: The RMC Construction

G. Neven, K.U. Leuven

Nearly all modern hash functions are constructed by iterating a compression function. These compression functions are assumed to be secure relative to some security notion, like collision resistance, and we say the notion is preserved by the construction if the iterated hash is also secure relative to the notion. At FSE’04, Rogaway and Shrimpton formalized seven security notions for hash functions: collision resistance (Coll), three variants of second-preimage resistance (Sec, aSec, eSec), and three variants of preimage resistance (Pre, aPre, ePre).

After investigation of a large number of existing constructions (including the widely-used strengthened Merkle-Damgard construction), we found that none of them preserves all seven notions. In particular, all fail to preserve (at least) aSec and aPre. We propose a new iterated hash function, the Randomized Mask-then-Compress (RMC) construction, and prove that it is the first to preserve all of the notions. It does this using a salt, and (quite controversially) a small-input random oracle that is called a logarithmic number of times in the number of message blocks.


Security proofs for key-exchange algorithms: MQV and variants

S. Kunz-Jacques, ENS Paris

MQV is a well-known authenticated key-exchange algorithm which is now a de facto standard. Its lack of security proof has been subject to controversy, especially after a proven variant of MQV, HMQV, was presented at Crypto'05 by H. Krawczyk. After a presentation of the Canetti-Krawczyk security model, we will show that a protocol closer to MQV than HMQV can be proven under reasonable hypotheses; however the algorithmic assumption underlying the proof has to be tailored to MQV. We will also review the security implications of ephemeral data leakage for both MQV and HMQV, and present new variants of MQV that have better properties in this area, which can ease actual implementations of these protocols. The results exposed were originally presented at SCN'06.


Cryptographic Techniques in Privacy-Preserving Data Mining

H. Lipmaa, UCL

The primary task of data-mining is to develop models about aggregated data, for example about the habits of Internet users, about loyal customers, etc. The main question of privacy-preserving data-mining (PPDM) is, can we develop accurate models without access to precise information in individual data records? The latter question has proven to be difficult to solve. One can divide the techniques of PPDM in two large groups: the randomization approach (related to the well-known statistical Randomized Response Technique), and the cryptographic approach.

In this tutorial, we will give an overview of the cryptographic approach that has many benefits but also several drawbacks. Most importantly, data mining tasks routinely deal with huge amounts of data. Mining this data, even without any privacy concerns, is non-trivial. Cryptography, even on much smaller amounts of data, is also non-trivial. Mixing the two usually results in PPDM solutions that are very complicated, and --- most importantly --- unlikely to be practical. Given this, it is important, in a collaboration between two communities, to come up with security definitions for PPDM that potentially have efficient cryptographic implementations.


Proving tight security for Rabin-Williams signatures

D. Bernstein, U. Illinois at Chicago

Variants of the Rabin-Williams public-key signature system have, for twenty-five years, held the speed records for signature verification. Are these systems secure?

There are many other signature systems of RSA/Rabin type. One can break each system by factoring the signer's public key $n$ or by breaking the system's hash function $H$. Are there other attacks? This is not an idle concern: some RSA-type systems have been broken by embarrassing attacks that (1) are much faster than known methods to factor $n$ and (2) work for every function $H$ (or a large fraction of choices of $H$), given oracle access to $H$.

Some systems have been proven immune to embarrassing attacks. For example, in the 1993 paper that popularized this line of work (along with the terminology ``secure in the random-oracle model,'' which seems to have engendered considerable confusion), Bellare and Rogaway proved the following security property for the traditional ``FDH'' form of exponent-$e$ RSA: every $H$-generic attack on RSA-FDH can be converted (without serious loss of efficiency) into an algorithm to compute $e$th roots modulo $n$.

Unfortunately, a closer look reveals that most of these proofs merely limit the embarrassment, without actually ruling it out. For example, the Bellare-Rogaway root-finding algorithm has only a $1/h$ chance of success, where $h$ is the number of hash values seen by the FDH attack. Coron introduced a better algorithm having a $1/s$ chance of success, where $s$ is the number of signatures seen by the FDH attack; but $s$ can still be quite large.

Randomized signatures, in which long random strings are prepended to messages before the messages are signed, allow much tighter proofs. For example, every $H$-generic attack on randomized exponent-$e$ RSA (or Rabin's 1979 signature system) can be converted into a algorithm to compute $e$th roots modulo $n$ (or to factor $n$) with a good chance of success. But generating random strings takes time, and transmitting the strings consumes bandwidth. Can we do better?

A 2002 theorem of Coron is widely interpreted as saying that FDH is stuck at $1/s$: tight proofs require randomization. The randomized ``RSA-PSS'' and ``PRab'' systems have tight security proofs and work around the bandwidth problem, but they still take time to generate long random strings, and they are incompatible with the fastest known verification techniques. A tight security proof by Katz and Wang allows much shorter random strings for some RSA variants but breaks down for Rabin-Williams.

In my talk I'll explain three state-of-the-art variants of the Rabin-Williams public-key signature system. All three variants have tight security proofs, and all three provide extremely fast signature verification. What's most surprising is the FDH variant, which has a tight security proof despite hashing unrandomized messages; in the Rabin-Williams context, a minor technical assumption in Coron's theorem turns out to be a major loophole.


Generalised Paillier cryptosystem with a flexible randomiser exponent

O. Obi, U. Sussex

The talk will begin with a description of the Paillier cryptosystem and its attractions, and then, move on to the generalisations developed by Catalano et.al, and Damgard and Jurik.

We then present a generalised Paillier cryptosystem with a flexible randomiser exponent. We show that this extension retains the very desirable homomorphic property which was lost in the Catalano et.al, generalisation. This we achieve by employing a generator which is more natural than that used in other works. Also a decryption expression which extends that introduced by Paillier is presented.

This is joint work with Falah Ali and Elias Stipidis


Oblivious-Transfer Amplification

J. Wullschleger, ETH Zurich

Oblivious transfer (OT) is an important primitive in cryptography or, more precisely, two- and multi-party computation due to its universality. Unfortunately, OT cannot be achieved in an unconditionally secure way for both parties from scratch. Therefore, it is a natural question what information-theoretic primitives or computational assumptions OT can be based on.

First, we show how to realize unconditionally secure OT from a weak variant of OT called universal OT, for which a malicious receiver can virtually obtain any possible information he wants, as long as he does not get all the information. Our result, that improves the efficiency of the reduction by a factor of two, is based on a novel distributed leftover hash-lemma which is of independent interest. We then carry over our results to the quantum setting and show how they can be applied in the bounded quantum storage model.

Second, we give conditions for when OT can be obtained from a faulty variant of OT called weak OT, for which it can occur that any of the parties obtains too much information, or the result is incorrect. These bounds and protocols, which correct on previous results by Damgard et. al., are of central interest since in most known realizations of OT from weak primitives, such as noisy channels, a weak OT is constructed first. Here, we carry over our results to the computational setting and show how a computationally secure weak OT can be strengthened.


Danger! Computer Security meets Artificial Immune Systems

U. Aickelin and J. Twycross, U. Nottingham

Artificial Immune Systems (AIS) are a collection of algorithms inspired by aspects of the human immune system. The arguably most obvious application of AIS was to detect intrusions in computer networks. If we can fight viruses with our immune systems, then surely we can fight computer viruses with a computer immune system? Early AIS approaches used a technique called Negative Selection, which did not provide a sufficient level of protection against intrusions. Problems were found with scalability and large numbers of false positives (false alarms) were generated. In 2003, Aickelin and his colleagues proposed that the reason for the poor performance of the AIS is that Negative Selection is based on outdated concepts in immunology. It was proposed that the incorporation of the Danger Theory, a modern principle of immunology, could improve the performance of AIS when applied to intrusion detection. The result of the proposal is the Danger Project - an interdisciplinary collaboration between computer security experts, computer scientists, and 'wet-lab' immunologists. Recently, Uwe has investigated how OR models such as set covering problems can help direct future research. A summary of the above is the focus of this part of the seminar.

Jamie will then present a novel biologically-inspired algorithm called tlr which has been developed as part of the Danger Project. tlr is based on aspects of the interaction between the biological innate and adaptive immune systems. It models two types of immune system cells, dendritic cells and T cells, and is implemented as a multiagent system. When applied to a computer security problem, process anomaly detection, tlr is able to detect anomalies in application behaviour which a high true positive and low false positive rate. It shows how the incorporation of innate immune system mechanisms with traditional artificial immune system algorithms can result in significant performance increases.


Attacking the IPsec Standards in Encryption-only Configurations

K. Paterson, RHUL

We describe new attacks which break any RFC-compliant implementation of IPsec making use of encryption-only ESP in tunnel mode. The new attacks are both efficient and realistic: they are ciphertext-only and need only the capability to eavesdrop on ESP-encrypted traffic and to inject traffic into the network. We report on our experiences in applying the attacks to a variety of implementations of IPsec.

Joint work with Jean Paul Degabriele (currently with Hewlett-Packard Labs).


New Approaches for Building Cryptographic Hash Functions

T. Ristenpart, UCSD

Cryptographic hash functions are a fundamental primitive, utilized in numerous security applications. With the recent attacks against many widely deployed hash functions (e.g., MD5, SHA-1), the search is on for new, secure hash functions to re-establish security of all the various protocols that rely on them. At the same time, hash functions like SHA-1 have seen expanded usage into applications that demand security properties not handled by traditional design approaches. In this talk, I'll discuss the goal of building a single hash function simultaneously secure for multiple applications, the challenges and pitfalls of this goal, and two new approaches we've recently proposed for building hash functions secure in a broad sense.

(Joint work with Mihir Bellare, Thomas Shrimpton)


Secure Hybrid Encryption from Weakened Key Encapsulation

D. Hofheinz, CWI

We put forward a new paradigm for building hybrid encryption schemes from \term{constrained chosen-ciphertext secure} (CCCA) key-encapsulation mechanisms (KEMs) plus authenticated symmetric encryption. Constrained chosen-ciphertext security is a new security notion for KEMs that we propose. It has less demanding security requirements than standard CCCA security (since it requires the adversary to have a certain plaintext-knowledge when making a decapsulation query) yet we can prove that it is CCCA sufficient for secure hybrid encryption.

Our notion is not only useful to express the Kurosawa-Desmedt public-key encryption scheme and its generalizations to hash-proof systems in an abstract KEM/DEM security framework. It also has a very constructive appeal, which we demonstrate with a new encryption scheme whose security relies on a class of intractability assumptions that we show (in the generic group model) strictly weaker than the Decision Diffie-Hellman (DDH) assumption. This appears to be the first practical public-key encryption scheme in the literature from an algebraic assumption strictly weaker than DDH.

(Joint work with Eike Kiltz)


Algebraic Cryptanalysis of Stream Ciphers

N. Courtois, UCL

In this talk we will overview algebraic attacks on LFSR-based stream ciphers give several different formulations of the attack and explain which is the most powerful. Notions of algebraic immunity for Boolean functions will be discussed. Finally, we will explain some more recent algebraic attacks.


Authentication protocols based on human comparison of short digests in security pervasive computing.

L. Nguyen, Oxford

There has recently been a lot of research in the area of Pervasive Computing. One of the main challenges is how we can establish secure communication over the un-trusted high-bandwidth network (the Internet) without any initial knowledge or a Public Key Infrastructure. An approach studied by a number of researchers is to build security though human work creating a low-bandwidth empirical (or authentication) channel where the transmitted information is authentic and cannot be faked or modified. An example is conversation between the users of systems. In this talk, we give a brief analytical survey of authentication protocols of this type as well as concentrating on our contribution to this area. These are our proposed group protocols and a new cryptographic primitive termed a Digest function that uniformly and efficiently digests/compresses many kilobytes of information into a short string output (perhaps 16 bits).

We start with non-interactive schemes, for example: the one proposed by Gehrmann, Mitchell and Nyberg, and point out that the scheme does not optimise the human work because of the short length of the key inputted into the Digest function that also leads to an off-line attack. We then move on to analyse a number of strategies used to build interactive pair-wise and group protocols that minimise the human work relative to the amount of security obtained as well as optimising the computation processing. Many of the protocols are based on the human comparison of a single short authentication string, transmitted over the empirical channel that is the output of the Digest function. We finish the talk with our suggested implementation of the Digest function, based on matrix multiplication and pseudo-random number generation, as well as some theoretical results about the digest.


Composable Security in the Bounded-Quantum-Storage Model

J. Wullschelger, U. Bristol

As shown by Mayers, and Lo and Chau, even in the quantum setting it is impossible to achieve bit commitment and oblivious transfer in an unconditionally secure way. Damgaard et al. (FOCS '05, CRYPTO '07) showed how to securely implement bit commitment and oblivious transfer in a weaker setting called the bounded-quantum-storage model, where the adversary is only allowed to store a limited number of qubits. However, their security definitions did only apply to the standalone setting, and it was not clear if their protocols could be composed.

We first give a simple attack that shows that these protocols (without any refinements to the model) are not composable. Then, we present a new, simulation-based definition for security in the bounded-quantum-storage model, and show that this definition allows for sequential composition of protocols. Finally, we prove the security of the randomized oblivious transfer protocol in our refined model. Secure implementations of oblivious transfer and bit commitment then follow easily by a (classical) reduction to randomized oblivious transfer.

This is joint work with Stephanie Wehner.


Compact Ecash and Applications

A. Lysyanskaya, Brown U.

The main idea of electronic cash (ecash) is that, even though the same party (a Bank) is responsible for giving out electronic coins, and for later accepting them for deposit, the withdrawal and the spending protocols are designed in such a way that it is impossible to identify when a particular coin was spent. I.e., the withdrawal protocol does not reveal any information to the Bank that would later enable it to trace how a coin was spent. Since a coin is represented by data, and it is easy to duplicate data, an electronic cash scheme requires a mechanism that prevents a user from spending the same coin twice (double-spending), for example by identifying double-spenders and tracing all transactions that they have carried out. Therefore, ecash is an example of balancing anonymity with accountability: a user remains anonymous until she violates a particular condition (spends a coin more than once).

In this talk, I will give several examples of balancing anonymity with accountability along these lines. First, I will first present a scheme that allows a user to withdraw a wallet, such that the user can spend N coins anonymously, but will get identified should she spend N +1 times. (The complexity of each operation here only has a logarithmic dependence on N.) Then I will show that this can be extended to, for example, allow a user to spend at most M coins anonymously with a particular merchant, or, as another example, spend at most L coins anonymously in one day.

Based on joint papers with Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, and Mira Meyerovich.


Block Cipher Distinguishers

R. Phan, Loughborough U.

We revisit the security of block ciphers in the sense of adversarial distinguishers triggered by recent results of Knudsen and Rijmen, which supports the approach of viewing block ciphers outside the conventional cryptanalytic context of being standalone encryption primitives. We discuss some notions to capture security in this sense, and give some results applied to reduced rounds of the AES.

Part of this work is jointly with Marine Minier.


Toric forms of elliptic curves

W. Castryck, K.U. Leuven

Since the introduction of ECC, a number of alternatives to the Weierstrass form have been proposed to speed up elliptic curve arithmetic: Hessian forms, Jacobian forms, Jacobi quartic forms, Montgomery forms, Edwards forms, ... We will show that all these models naturally belong to the family of so-called toric forms. These split up in sixteen equivalence classes, five of which are represented by the examples given above. Investigating the nine other classes should either result in new useful forms, either provide evidence for the optimality of Edwards arithmetic.


Point compression and multiplication for pairing based cryptography

S. Galbraith, RHUL

I will discuss elliptic curve point compression in the context of pairing based cryptography. I will also present a method to speed up point multiplication in pairing friendly groups.


A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks

F.-X. Standaert, U.C. Louvain

The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this challenge, this work proposes a framework for the analysis of cryptographic implementations that includes a theoretical model and an application methodology. The model is based on weak and commonly accepted hypotheses about side-channels that computations give rise to. It allows quantifying the effect of practically relevant leakage functions with a combination of security and information theoretic metrics, respectively measuring the quality of an implementation and the strength of an adversary. From a theoretical point of view, we demonstrate formal connections between these metrics and discuss their intuitive meaning. From a practical point of view, the model implies a unified methodology for the analysis of side-channel key recovery. The proposed solution allows getting rid of most of the subjective parameters that were limiting previous specialized and often ad hoc approaches in the evaluation of physically observable devices. It typically determines the extent to which basic (but practically essential) questions such as ``How to compare two implementations?" or ``How to compare two side-channel adversaries?" can be fairly answered. In order to justify the interest and relevance of these theoretical results, we will cover a few applications of the model, based upon both simulations and real measurements of cryptographic hardware devices.

Joint work with Tal Malkin and Moti Yung.


Composition of Password-based Protocols

M. Ryan, U. Birmingham

We investigate the composition of protocols that share a common secret. This situation arises when users employ the same password on different services. More precisely we study whether resistance against guessing attacks composes when the same password is used. We model guessing attacks using a definition based on static equivalence in a cryptographic process calculus close to the applied pi calculus. We show that resistance against guessing attacks composes in the presence of a passive attacker. However, composition does not preserve resistance against guessing attacks for an active attacker. We therefore propose a simple syntactic criterion under which we show this composition to hold. Finally, we present a protocol transformation that ensures this syntactic criterion and preserves resistance against guessing attacks.

Joint work with Stephanie Delaune and Steve Kremer


Pairing-Based Non-interactive Zero-Knowledge Proofs

J. Groth, U.C.L.

Non-interactive zero-knowledge proofs make it possible to prove the truth of a statement without revealing any other information. Non-interactive zero-knowledge proofs have been used widely in the theory of cryptography, but due to efficiency problems have not yet found many practical applications. In recent joint works with Rafail Ostrovsky and Amit Sahai we have found new techniques from pairing-based cryptography that yield efficient non-interactive zero-knowledge proofs. In this talk, we will go over some of these new and efficient non-interactive zero-knowledge proofs.


Deterministic Encryption: Recent Results and Future Directions

A. O'Neill, Georgia Tech.

A public-key encryption scheme is said to be deterministic if its encryption algorithm does not use random coins. Deterministic encryption has applications to database and file system encryption, electronic voting, and more. However, until recently, the only known security definition achievable by a deterministic encryption scheme was one-wayness, which is a rather weak notion from a modern cryptographic standpoint. A series of recent works has addressed this issue and proposed new and stronger security definitions for deterministic encryption, shown some interesting relations between them, and given constructions in both the random oracle and standard models. In this talk I will try to give an overview of these results and highlight what I feel are interesting directions for future research.


Volatile FPGA security -- current problems and possible solutions

S. Drimer, Cambridge

We can divide "FPGA design security" into two problems. The first is protecting data stored and processed inside of the FPGA, and the second is protecting configuration data as it is distributed from system-local storage or remote sources. I will introduce the FPGA security framework, threat model, and discuss possible solutions for some of the open issues to do with distributing FPGA designs, especially when cores from multiple distrusting sources are integrated into a single design. In addition, I will use a recent AES implementation to discuss how to better report FPGA design results for the purpose of comparisson, validation, and re-use.

This talk is based on the following papers:


Security of Sanitizable Signatures Revisited

M. Fischlin, T.U. Darmstadt

Sanitizable signature schemes, as defined by Ateniese at al. (ESORICS 2005), allow a signer to partly delegate signing rights to another party, called the sanitizer. That is, the sanitizer is able to modify a predetermined part of the original message such that the integrity and authenticity of the unchanged part is still verifiable. Ateniese et al. identify five security requirements for such schemes (unforgeability, immutability, privacy, transparency and accountability) but do not provide formal specifications for these properties. They also present a scheme allegedly satisfying these requirements.

Here we revisit the security requirements for sanitizable signatures and, for the first time, present a comprehensive formal treatment. Besides a full characterization of the requirements we also investigate the relationship of the properties, showing for example -diametrically to a claim by Ateniese et al.- that unforgeability follows from accountability. We then provide a full security proof for a modification of the original scheme according to our model.

This is joint work with Christina Brzuska, Tobias Freudenreich, Anja Lehmann, Marcus Page, Jakob Schelbert, Dominique Schroeder and Florian Volk (TU Darmstadt).


Applying Recreational Mathematics to Secure Multiparty Computation

Y. Desmedt, UCL

The problem of a mice traveling through a maze is well known. The maze can be represented using a planar graph. We present a variant of the maze. We consider a grid vertex colored planar graph in which an adversary can choose up to t colors and remove all vertices that have these colors and their adjacent edges. We call the grid in which these vertices and adjacent edges are removed a reduced grid. The problem is that a mice must be able to move in the reduced grid from the first row to the last row, and from the first column to the last column, and this for all possible reductions. We present three types of solutions to construct such grids. The efficiency of these solutions is discussed.

The problem finds its origin in the problem of secure multiparty computation. Imagine going to a medical doctor who needs to prescribe some medication, which might be counterindicated. The typical solution is to disclose all medical records to the doctor. If secure multiparty computation would be used, the medical doctor only learns from the distributed medical databases whether the medication is, or is not, counterindicated. We consider the problem of parties each having a secret belonging to a non-abelian group. The parties want to compute the product of these secrets without leaking anything that does not follow trivially from the product. Our solution is black box, i.e., independent of the non-abelian group. This has applications to threshold block ciphers and post-quantum cryptography.

This is joint work with Josef Pieprzyk, Ron Steinfeld and Huaxiong Wang. Parts of it were presented at Crypto 2007 and appeared in the proceedings.


Anonymous proxy signatures

G. Fuchsbauer, ENS

We define a general model for consecutive delegations of signing rights with the following properties: The delegatee actually signing and all intermediate delegators remain anonymous. As for group signatures, in case of misuse, a special authority can open signatures to reveal the chain of delegations and the signer's identity. The scheme satisfies a strong notion of non-frameability generalizing the one for dynamic group signatures. We give formal definitions of security and show them to be satisfiable by constructing an instantiation proven secure under general assumptions in the standard model. Our primitive is a proper generalization of both group signatures and proxy signatures and can be regarded as non-frameable dynamic hierarchical group signatures.


A Cryptographic Compiler for Information-Flow Security

C. Fournet, Microsoft

Joint work with Tamara Rezk and Gurvan le Guernic (MSR-INRIA Joint Centre http://msr-inria.inria.fr/projects/sec)

We relate two notions of security: one simple and abstract, based on information flows in programs, the other more concrete, based on cryptography.

In language-based security, confidentiality and integrity policies specify the permitted flows of information between parts of a system with different levels of trust. These policies enable a simple treatment of security, but their enforcement is delicate.

We consider cryptographic enforcement mechanisms for distributed programs with untrusted components. Such programs may represent, for instance, distributed systems connected by some untrusted network. We develop a compiler from a small imperative language with locality and security annotations down to cryptographic implementations in F#. In source programs, security depends on a policy for reading and writing the shared variables. In their implementations, shared memory is unprotected, and security depends instead on encryption and signing.

We rely on standard primitives and hypotheses for cryptography, stated in terms of probabilistic polynomial-time algorithms and games. Relying on a new type system, we show that our compiler preserves all information-flow properties: an adversary that interacts with the trusted components of our code and entirely controls its untrusted components gains illegal information only with negligible probability.


Trust Management for Secure Information Flows

S. Balfe, RHUL

In both the commercial and defence sectors a compelling need is emerging for the rapid, yet secure, dissemination of information across traditional organisational boundaries. In this talk we present a novel trust management paradigm for securing pan-organisational information flows that aims to address the threat of information disclosure. Our trust management system is built around an economic model and a trust-based encryption primitive wherein: (i) entities purchase a key from a Trust Authority (TA) which is bound to a voluntarily reported trust score r, (ii) information flows are encrypted such that a flow tagged with a recipient trust score R can be decrypted by the recipient only if it possesses the key corresponding to a voluntarily reported score r \le R, (iii) the economic model (the price of keys) is set such that a dishonest entity wishing to maximise information leakage is incentivised to report an honest trust score r to the TA.

This talk covers two important contributions. First, we quantify fundamental tradeoffs on information flow rate, information leakage rate and error in estimating recipient trust score R. Second, we present a suite of encryption schemes that realise our trust-based encryption primitive and identify computation and communication tradeoffs between them.


Trusted Mobile Platforms

E. Gallery, RHUL

This talk will explore the design and operation of a trusted mobile platform, as defined within the Trusted Computing Group’s Mobile Phone Working Group.


A Compiler for Security

T. Rezk, INRIA Sophia-Antipolis

The area of provable or computational cryptography that started to develop since the early 90s proposes that the only assumptions on the adversary that can be justified are his/her computational abilities. Reasoning with arbitrary adversaries involves the handling of polynomial and probabilistic hypotheses on complex programs. Can we let the programmer specify security policies at an abstract level and let the compiler implement them using provable cryptography? This presentation will describe work in progress with Cedric Fournet and Gurvan Le Guernic on programming language abstractions for provable cryptography, and a compiler that implements it.


Verifiable Random Functions from Identity-based Key Encapsulation

D. Catalano, Universita di Catania

We propose a methodology to construct verifiable random functions from a class of identity based key encapsulation mechanisms (IB-KEM) that we call VRF suitable. Informally, an IB-KEM is VRF suitable if it provides what we call unique decryption (i.e. given a ciphertext C produced with respect to an identity ID, all the secret keys corresponding to identity ID', decrypt to the same value, even if ID\neq ID') and it satisfies an additional property that we call pseudorandom decapsulation. In a nutshell, pseudorandom decapsulation means that if one decrypts a ciphertext C, produced with respect to an identity ID, using the decryption key corresponding to any other identity ID' the resulting value looks random to a polynomially bounded observer. Interestingly, we show that most known IB-KEMs already achieve pseudorandom decapsulation. Our construction is of interest both from a theoretical and a practical perspective. Indeed, apart from establishing a connection between two seemingly unrelated primitives, our methodology is direct in the sense that, in contrast to most previous constructions, it avoids the inefficient Goldreich-Levin hardcore bit transformation.


Stateless authentication protocols

C. Mitchell, RHUL

The value of authentication protocols which minimise (or even eliminate) the need for stored state in addressing DoS attacks is well-established - note in particular the 1997 paper of Aura and Nikander. However, although there is now a substantial literature on this topic, it would seem much remains to be explored. In this talk we explore the design of a novel stateless protocol, which has certain implementation advantages. Specifically, neither party needs to maintain significant stored state.


Further OpenSSL Key Theft

B. Brumley, TKK

We show how to steal private keys in OpenSSL's implementation of elliptic curve cryptography. We accomplish this using a cache attack that exploits memory access patterns. This is automated by a new framework for cache-timing data analysis making use of vector quantization and hidden Markov model cryptanalysis. In general, it facilitates recovery of critical algorithm state such as key material.


Extracting Unknown Keys from Unknown Algorithms Encrypting Unknown Fixed Messages and Returning no Results

D. Naccache, ENS

In addition to its usual complexity assumptions, cryptography silently assumes that information can be physically protected in a single location. As we now know, real-life devices are not ideal and confidential information leaks through different physical channels. Whilst most aspects of side channel leakage (cryptophthora) are now well understood, no attacks on totally unknown algorithms are known to date. This talk escribes such an attack. By totally unknown we mean that no information on the algorithm's mathematical description (including the plaintext size), the microprocessor or the chip's power consumption model is available to the attacker.


Certificateless Onion Routing

D. Fiore, U. Catania

Onion routing protocols allow users to establish anonymous channels to preserve their privacy over a public network. Several protocols implementing this primitive have been proposed in recent years, and TOR, a real-life implementation, provides an onion routing service to thousands of users over the internet.

This paper presents Certificateless Onion Routing a new approach to the problem. Starting from the identity based solution (PB-OR) of Kate et al., we adopt the certificateless setting introduced by Al-Riyami and Paterson. Such a setting is particularly well suited in practice as it retains the good aspects of identity based cryptography (no PKI is required) and traditional public key cryptography (there is no key escrow). Next, we present a novel certificateless anonymous key-agreement (KA) protocol and we show how to turn it into a very efficient (and provably secure!) certificateless onion routing protocol. When compared with Tor and PB-OR, our protocol offers better performances, especially when current security levels (i.e. 128 bits) are considered. In particular, our scheme significantly improves the computational costs required from each router. In this sense our solution is up to 7 times faster than PB-OR and up to 11 times faster than Tor.


Unknown Plaintext Template Attacks

N. Hanley, U. Cork

In power analysis, template attacks can be used to recover secret key information from a device with very few power traces. They work on the premise that the attacker has an identical device to the one under attack, and using this, builds up a set of "templates" to profile the power consumption of the device. These templates can then be used to recover secret information from the attack device. Generally, templates are combined with known plaintext or ciphertext information to recover the secret key, In this talk it is demonstrated how the secret key can be recovered using just the power consumption traces, and practical results on an ARM7 mircoprocessor are shown.


Differential attacks on PIN Processing APIs

G. Steel, INRIA LSV-Cachan

International standards dictate that all processing of customer Personal Identification Numbers (PINs) in the international cash machine network must take place inside special tamper resistant Hardware Security Modules (HSMs). These HSMs have a restricted API designed so that even if an attacker is able to make arbitrary command calls to the device, no customer PINs can be obtained. However, in recent years, a number of attacks have been found on these APIs. Some of them are so-called differential attacks, whereby an attacker makes repeated calls to the API with slightly different parameters, and from the pattern of error messages received, he is able to deduce the value of a PIN. In this talk, I will present some of these attacks, and talk about efforts to analyse them formally. This will include techniques for proving the absence of such attacks in patched APIs, and a practical proposal for improving the security of the network without making large-scale changes to the current infrastructure.


The evolution of Microsoft security mitigations

T. Burrell, Microsoft.

The Security Science team within Microsoft's Trustworthy Computing (TwC) organization aims to find ways to do security smarter, and then enable others to leverage that work. This talk is a view into the exploit mitigations work the Security Science team does, i.e., how do we minimize the security impact of any residual vulnerabilities in both Microsoft and non-Microsoft software; I'll focus on what we've done, why we've done it and how we systematically think about mitigations coverage. I'll describe in more detail an example of such a mitigation in recently released Windows 7 and how we've updated stack buffer overflow protection in the upcoming Visual Studio 2010 release.


Racing to the top, middle or bottom? Experiences in hardware security evaluations

B. Thomas, SiVenture.

A criticism often levelled at security certification schemes is that economic incentives are misaligned and create a “race to the bottom” where the market favours evaluators who are less thorough. This seminar will examine this claim from the perspective of applying the Common Criteria scheme to smartcards and other tamper-resistant hardware, and will give:


Development of the Next Generation of Side-Channel Analysis Resistant Processors

S. Tillich, U. Bristol.

Resistance against side-channel analysis (SCA) attacks is an important requirement for many secure embedded systems. Microprocessors and microcontrollers which include suitable countermeasures can be a vital building block for systems like secure PDAs or smart phones. In the last years, two promising concepts have been proposed for adding SCA-protection to general-purpose processors: Randomized execution and hardware-protected execution. Investigations of the first concept have been in connection with the NONDET processor. The second concept has first been proposed in the context of securing cryptographic instruction set extensions and has been extended in the POWER-TRUST project. We present the principals of both concepts, giving specific details for the hardware-protected execution, highlighting features like multi-tasking support and process separation. Furthermore, opportunities for integrating both concepts as well as combinations with other SCA countermeasures are presented.


A framework for the sound specifications of cryptographic tasks

A. Kiayias, U. Athens.

Nowadays it is widely accepted to formulate the security of a protocol carrying out a given task via the ``trusted-party paradigm,'' where the protocol execution is compared with an ideal process where the outputs are computed by a trusted party that sees all the inputs. A protocol is said to securely carry out a given task if running the protocol with a realistic adversary amounts to ``emulating'' the ideal process with the appropriate trusted party. While this simulation-based security formulation provides strong security guarantees, its usefulness is contingent on the properties and correct specification of the trusted party's program (also known as an ideal functionality), which, as demonstrated in recent years by the coexistence of complex, multiple functionalities for the same task as well as by their ``unstable'' nature, does not seem to be an easy task.

In this talk we address this problem, and describe a recent general methodology for the sound specification of ideal functionalities for cryptographic tasks. First, we introduce the class of canonical ideal functionalities for a cryptographic task, which unifies the syntactic specification of a large class of cryptographic tasks under the same basic template functionality. By endowing the class of canonical functionalities with an algebraic structure we are able to perform operations among functionalities that amount to combinations of security and consistency properties. The constituent functionalities of a task can be derived either directly or, following a translation strategy that will be introduced, from existing "game-based" definitions; such definitions have in many cases captured desired individual properties of cryptographic tasks, albeit in less adversarial settings. We will showcase the methodology by commenting how it applies to a variety of basic cryptographic tasks, including commitments, digital signatures, zero-knowledge proofs, and oblivious transfer.


Selecting Secure Paramters for Lattice-based Cryptography

M. Ruckert, TU Darmstadt.

Encryption and signature schemes based on worst-case lattice problems are promising candidates for the post-quantum era, where classic number-theoretic assumptions are rendered false. Although there have been many important results and breakthroughs in lattice cryptography, the question of how to systematically choose secure parameters in practice is still open. This is mainly due to the fact that most security proofs are essentially asymptotic statements. In addition, the hardness of the underlying complexity assumption is controlled by several interdependent parameters rather than just a simple bit length as in classic schemes. With our work, we close this gap by providing a handy framework for estimating secure parameter sets by relating the hardness of practical lattice basis reduction to symmetric bit security for the first time. Our approach takes various security levels, or attacker types, into account. Moreover, we use it to predict long-term security in a similar fashion as the results that are collected on www.keylength.com. We apply our framework to essentially all published encryption and signature schemes that are based on the learning with errors problem (LWE) or the small integer solution problem (SIS), respectively. Moreover, our results are easily applicable to all modern lattice-based cryptography, such as identity-based encryption or collision-resistant hash functions.


On Cipher-Dependent Related-Key Attacks in the Ideal Cipher Model

P. Farshim, RHUL.

Bellare and Kohno introduced a formal framework for the study of related-key attacks against block ciphers. They established sufficient conditions (output-unpredictability and collision-resistance) on the set of related-key derivation (RKD) functions under which the ideal cipher is secure against related-key attacks, and suggested this could be used to derive security goals for real block ciphers. However, to do so requires the reinterpretation of results proven in the ideal cipher model for the standard model (in which a block cipher is modelled as, say, a pseudorandom permutation family). As we show here, this is a fraught activity. In particular, building on a recent idea of Bernstein, we first demonstrate a related-key attack that applies generically to a large class of block ciphers. The attack exploits the existence of a short description of the block cipher, and so does not apply in the ideal cipher model. However, the specific RKD functions used in the attack are provably output-unpredictable and collision-resistant. In this sense, the attack can be seen as providing a separation between the ideal cipher model and the standard model. Second, we investigate how the related-key attack model of Bellare and Kohno can be extended to include sets of RKD functions that themselves access the ideal cipher. Precisely such related-key functions underlie the generic attack, so our extended modelling allows us to capture a larger universe of related-key attacks in the ideal cipher model. We establish a new set of conditions on related-key functions that is sufficient to prove a theorem analogous to the main result of Bellare and Kohno, but for our extended model. We then exhibit non-trivial classes of practically-relevant RKD functions meeting the new conditions. We go on to discuss standard model interpretations of this theorem, explaining why, although separations between the ideal cipher model and the standard model still exist for this setting, they can be seen as being much less natural than our previous separation. In this manner, we argue that our extension of the Bellare- Kohno model represents a useful advance in the modelling of related-key attacks. Third, we consider the topic of key recovering related-key attacks and its relationship to the Bellare-Kohno formalism. In particular, we address the question of whether lowering the security goal by requiring the adversary to perform key-recovery.


On the (In)Security of IPsec in MAC-then-Encrypt Configurations

J.-P. Degabriele, RHUL

IPsec allows a huge amount of flexibility in the ways in which its component cryptographic mechanisms can be combined to build a secure communications service. This may be good for supporting different security requirements but is potentially bad for security. We demonstrate the reality of this by describing efficient, plaintext-recovering attacks against all configurations of IPsec in which integrity protection is applied prior to encryption - so-called MAC-then-encrypt configurations. We report on the implementation of our attacks against a specific IPsec implementation, and reflect on the implications of our attacks for real-world IPsec deployments as well as for theoretical cryptography.


Time-Specific Encryption

E. Quaglia, RHUL.

In this talk we will introduce and explore the new concept of Time-Specific Encryption (TSE). In (Plain) TSE, a Time Server broadcasts a key at the beginning of each time unit, a Time Instant Key (TIK). The sender of a message can specify any time interval during the encryption process; the receiver can decrypt to recover the message only if it has a TIK that corresponds to a time in that interval. We extend Plain TSE to the public-key and identity-based settings, there receivers are additionally equipped with private keys and either public keys or identities, and where decryption now requires the use of the private key as well as an appropriate TIK. We will briefly introduce security models for the plain, public-key and identity-based settings. We also provide constructions for schemes in the different settings, showing how to obtain Plain TSE using identity-based techniques, how to combine Plain TSE with public-key and identity-based encryption schemes, and how to build schemes that are chosen-ciphertext secure from schemes that are chosen-plaintext secure. We will also suggest applications for our new primitive, and discuss its relationships with existing primitives, such as Timed-Release Encryption and Broadcast Encryption.


High-performance implementations on the Cell Broadband Engine Architecture

J. Bos, EPFL.

The Cell broadband engine (Cell) architecture is the heart of the PlayStation 3 (PS3) game console. In this presentation the details of the Cell architecture are outlined together with implementation techniques how to speed up implementations on this platform. Two projects performed on the 215 PS3s of the laboratory for cryptologic algorithms are discussed; how our Pollard rho implementation solved an 112-bit prime elliptic curve discrete logarithm problem and how our elliptic curve factorization method (ECM) implementation aimed at Mersenne numbers (numbers of the form 2^x - 1) found the current ECM 73-digit record factor.


Fast Elliptic Curve Cryptography in OpenSSL

E. Kasper, Cambridge

Forward secure key exchange ensures that the compromise of a long-term secret key used to derive session keys does not affect the security of past sessions established using that key. In TLS (SSL), forward security can be obtained via ephemeral Diffie-Hellman ciphers.

I'll present an implementation of the NIST P-224 elliptic curve for 64-bit processors. NIST P-224 is a standardized curve that can be used in Diffie-Hellman key exchange, as well as ECDSA digital signatures; the new implementation is over 4 times faster than standard OpenSSL, and in addition, resistant to timing attacks. I'll also discuss various latency reduction mechanisms in TLS, and their effect on forward security.

This work was done during an internship at Google Switzerland, and contributed to the OpenSSL project.


Payment Systems Security

G. French, Barclays

This talk will discuss issues related to payment system security, covering topics such as EMV and CAP. The talk will also look at possible future open research directions in this area.


DoS-resistant key exchange: models and mechanisms

C. Boyd, QUT

Security models for key exchange have been around for many years, but only recently have started to include consideration of denial-of-service attacks. This talk will consider security models for client puzzles and in particular introduce a new model to be presented at CT-RSA 2011. The new model incorporates the possibility that an adversary may attack multiple puzzles simultaneously. In addition we will consider the notion of gradual authentication as applied to key exchange and introduce a new mechanism combining client puzzles and digital signatures with fast verification. This is joint work with Juan Gonzalez, Lakshmi Kuppusamy, Jothi Rangasamy and Douglas Stebila.


Practical Fully-Homomorphic Encryption over the Integers

M. Tibouchi, ENS-Paris

At Eurocrypt 2010, van Dijk et al. described a fully-homomorphic encryption scheme over the integers. The main appeal of the scheme (compared to Gentry's) was its conceptual simplicity; however with a public key size in O(\lambda^{10}), where lambda is the security parameter, the scheme looked completely unpractical. We show how to reduce the public key size down to O(\lambda5), and we describe a practical implementation of the scheme.

Interestingly we obtain significantly better efficiency than the recent Gentry-Halevi implementation of Gentry's scheme, despite using very modest hardware. At the "high" security level, equivalent to the "large" setting of Gentry-Halevi, we obtain an encryption in about 3 minutes and a bootstrapping operation in about 5 minutes, while key generation and decryption take negligible time. Public-key size is also moderate: 250 MB at the "high" level (almost 10 times smaller than Gentry-Halevi).


White-box cryptography -- protecting block cipher implementations against the execution platform.

B. Wyseur, Nagravision

Block ciphers are traditionally used to secure communication against eavesdropping. Their security is based on the confidentiality of a secret key, and designed to withstand black-box types of attacks. For such a model to apply, the cipher implementation must be deployed on a trusted execution platform. In practice however, such a model often does not apply -- for example in a DRM scenario, where a system owner has an incentive to extract secret keys from the software implementation of the DRM client. White-box cryptography aims to address this issue: it is the discipline of implementing cryptographic algorithms such that it is protected from 'white-box' attacks.

This talk will cover practical aspects in white-box cryptography. The first part will explore the initial constructions and focus in particular on implementations of the AES. While this approach is very useful for many practical use cases, subsequent cryptanalysis results will show that the initial strategy in white-box cryptography is fundamentally flawed; it is prone to differential and algebraic cryptanalysis. The second part of this talk will focus on newer approaches: constructions that aim to withstand public scrutiny and aim to solve some practical deployment issues.


The next steps towards leakage-resilient cryptography devices using one-time programs

K. Jarvinen, Helsinki

Implementation attacks form a serious threat to cryptosystems in practice. In CRYPTO 2008, Goldwasser et al. introduced one-time programs as a solution to provide resilience against all implementation attacks. One-time programs utilize Yao's garbled circuits and simple tamper-proof hardware tokens called one-time memories. Our paper published in CHES 2010 was the first effort to evaluate one-time programs in practice. It was concluded that executing one-time programs is expensive in terms of memory and computation time, but they could be feasible alternatives in applications requiring very high resistivity against implementation attacks. The work focused on the computational part of executing one-time programs. In this talk we explore the steps that are still needed before one-time programs can be (efficiently) used in practice. Specifically, we focus on improving computation speed and discuss implementation of one-time memory.


Efficient Fully Secure (Hierarchical) Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae

V. Iovino, U. Salerno

Predicate encryption is an important cryptographic primitive that has found wide applications as it allows for fine-grained key management. In a predicate encryption scheme for a class P of predicates, the owner of the master secret key can derive a secret key Sk_P for any predicate P in some class of predicates. Similarly, when encrypting plaintext M, the sender can specify an attribute vector x for the ciphertext Ct. Then, key Sk_P can decrypt all ciphertexts Ct with attribute vector x such that P (x) = 1. In this paper, we give fully secure implementations for Conjunctions (also called Hidden Vector Encryption in the literature), Disjunctions and k-CNF/DNF predicates that guarantee the security of the plaintext and of the attribute. Our constructions for Disjunctions and Conjunctions are linear in the number of variables. Previous fully secure constructions for Disjunction required time exponential in the number of variables while for Conjunctions the best previous construction was quadratic in the number of variables. We also give reduction of k-CNF and k-DNF formulae to Conjunctions for any constant k. In proving the full security of our constructions, we elaborate on the recent paradigm of dual encryption system introduced in [Waters – Crypto 2009] resulting in a simplified proof strategy that could be of independent interest. We also give a hierarchical version of our scheme that has as special case Anonymous HIBE.


Cyber Security: Whatever that means

D. Ashenden, U. Cranfield

It has been a busy eighteen months in the UK for the seemingly ubiquitous term cyber. It started with the publication of the UK's Cyber Security Strategy in 2009, closely followed by the establishment of the Office of Cyber Security and the Cyber Security Operations Centre. Momentum gathered and in the media we have seen reporting of the Stuxnet worm as an instance of cyber war. Also in recent months we have had speeches from the Director General of the Security Service and the Director of GCHQ discussing cyber espionage and cyber security respectively. Finally we now have the Strategic Defence and Security Review categorising cyber security as a Tier One threat and outlining plans to invest 650 million pounds on a National Cyber Security Programme over the next four years. It is a busy time for cyber.

This seminar will explore meanings of cyber in the current context before examining types of cyber risk. Strategies for cyber security will be discussed and examples of incidents used as a way of illustrating some of the difficulties to be overcome. Finally the implications for academic research will be explored.


Information warfare - what's new then?

B. Collins, Chief Scientific Advisor at BIS and DfT

At BIS Brian provides scientific advice to the Security of State, Ministers and the Management Board, ensuring the use of sound scientific, engineering and technological evidence across the Department. He is also CSA at the DfT, and Professor of Information Systems at Cranfield University. Previously he has held senior positions at Clifford Chance, the Wellcome Trust, and was Chief Scientist and Technical Director at GCHQ and Deputy Director at the Royal Signals and Radar Establishment (RSRE).


Structure Preserving CCA2 Encryption and Its Application to Oblivious Third Parties

M. Kohlweiss, Microsoft

We present the first CCA2 secure public key encryption scheme that is structure preserving, i.e., our encryption scheme uses only algebraic operations. In particular it does not use hash-functions or interpret group elements as bit-strings. This makes our scheme a perfect building block for cryptographic protocols where parties for instance want to prove, to each other, properties about ciphertexts or jointly compute ciphertexts. We also provide a few example protocols for our scheme, for instance a joint computation of a ciphertext of a plaintext shared by two parties, where in the end, only one of the parties learns the ciphertext. This latter protocol serves as a building block for our second contribution which is a set of protocols that implement the concept of oblivious trusted third parties. This concept has been proposed before, but no concrete realization or formal definition of the problem was known.


An Exploration of Mechanisms for Dynamic Cryptographic Instruction Set Extensions

P. Grabher, U. Bristol

Instruction Set Extensions (ISEs) supplement a host processor with special-purpose, typically fixed-function hardware and instructions to use it. For cryptographic use-cases, this is often very effective because of the need for non-standard or niche operations. However, one disadvantage is that of inflexibility, contradicting a need for “algorithm agility”. Using a LEON3-based prototype we explore a different approach, namely provision of re-configurable mechanisms to support dynamic (i.e., changeable at run-time) ISEs. Our results show that such an approach can provide a flexible general-purpose platform capable of supporting previous work with similar advantages, but relies on careful analysis of associated security issues.


Attribute Based Encryption

A. Cullen, BAESystems

This is a presentation of work carried out at BAE Systems Advanced Technology Centre (ATC) to assess Attribute Based Encryption (ABE) as a technology that supports fine-grained access control, motivated by its potential to mitigate problems such as the WikiLeaks release of a substantial diplomatic archive in 2010.

The presentation will commence with a brief overview of ABE but is intended for an audience that is already familiar with the technology. Details of the mathematics are available in the literature and this presentation will include key references.

ATC implemented an ABE demonstration, including both the Key Policy and Ciphertext Policy variants, using the MIRACL library to support the mathematical operations. The presentation will describe the demonstration and implementation experience, and summarise the main performance measurements such as encryption and decryption times. The presentation will then review the ABE capability, indicating both the best features and areas where further developments are desirable.

Encrypted file storage with fine-grained access policies is largely new in corporate networks so the presentation will discuss some of the integration issues that need to be solved before adoption is likely to become widespread in this context. Finally the presentation will conclude by indicating the key research challenges that have emerged from the work at ATC.


Network Security: a Complex Adaptive System

R. Ghanea-Hercock, BT

This talk is about shifting mind sets. The missing piece in our mental model of network security is that it is fundamentally a Complex Adaptive System (CAS). This perspective changes everything from how we react to threats, to how we should plan future defence strategies. The prevailing view considers the interaction between people, process and technology, but still fixates on the fallacious notion that the sum can be captured in a static snapshot, which can then be solved. The truth is this is an eternal arms race with no end, ever. Hence, we need to design defences that adapt, move and react in real time. The ideal is a fully autonomous, self-organising defence system that learns and adapts to real-time threats.


Running Mixnet-Based Elections with Helios

O. Pereira, U.C. Louvain

The Helios voting system is an open-audit web-based voting system that has been used by various institutions in real-stake elections during the last few years. While targeting the simplicity of the election workflow, the homomorphic tallying process used in Helios limits its suitability for many elections (large number of candidates, specific ballot filling rules, ...).

We present a variant of Helios that allows an efficient mixnet-based tallying procedure, and document the various choices we made in terms of election workflow and algorithm selection. In particular, we propose a modified version the TDH2 scheme of Shoup and Gennaro that we found particularly suitable for the encryption of the ballots.

Our Helios variant has been tested during two multi-thousand voter elections. The lessons taken from the first of these elections motivated some changes into our procedure, which have been successfully experimented during the second election.

This is joint work with Philippe Bulens and Damien Giry.


Non-Interactive Key Exchange: Models, Relations and Constructions in the Standard Model

E. Freire, RHUL

Non-interactive key exchange (NIKE) is a fundamental but much-overlooked cryptographic primitive. It appears as a major contribution in the ground-breaking paper of Diffie and Hellman, but, with the exception of appearing briefly in a paper by Cash, Kiltz and Shoup (Eurocrypt 2008), NIKE has remained almost completely unstudied since then. In this paper, we provide different security models for this primitive and explore the relationships between them. We then give a construction for secure NIKE in the standard model that is based on the hardness of a variant of the decisional Bilinear Diffie Hellman Problem for asymmetric pairings. We also study the relationship between NIKE and public key encryption (PKE), showing that a secure NIKE scheme can be generically converted into an IND-CCA secure PKE scheme. Using our concrete NIKE scheme, this leads to a new PKE scheme that is competitive with, for example, the BMW encryption scheme. Our conversion also illustrates the fundamental nature of NIKE in public key cryptography.


The Round Complexity of Verifiable Secret Sharing Revisited

A. Choudhary, U. Bristol

The round complexity of interactive protocols is one of their most important complexity measures. In this work we prove that existing lower bounds for the round complexity of VSS can be circumvented by introducing a negligible probability of error in the reconstruction phase. Previous results show matching lower and upper bounds of three rounds for VSS, with n = 3t + 1, where the reconstruction of the secrets always succeeds, i.e. with probability 1. In contrast we show that with a negligible probability of error in the reconstruction phase:

  1. There exists an efficient 2-round VSS protocol for n = 3t + 1. If we assume that the adversary is non-rushing then we can achieve a 1-round reconstruction phase.
  2. Tere exists an efficient 1-round VSS for t = 1 and n > 3.
  3. We prove that our results are optimal both in resilience and number of sharing rounds by showing:
    • (a) There does not exist a 2-round WSS (and hence VSS) for n ≤ 3t.
    • (b) There does not exist a 1-round VSS protocol for t ≥ 2 and n ≥ 4.
This is a joint work with Arpita Patra, Tal Rabin and C. Pandu Rangan and appeared in CRYPTO 2009.

The talk will have two parts. In the first part I will briefly talk about the kind of problems that I looked into during my PhD. The second part will be related to the Crypto paper.


On the Joint Security of Encryption and Signature, Revisited

S. Thomson, RHUL

We revisit the topic of joint security for combined public key schemes, wherein a single keypair is used for both encryption and signature primitives in a secure manner. While breaking the principle of key separation, such schemes have attractive properties and are sometimes used in practice. We give a general construction for a combined public key scheme having joint security that uses IBE as a component and that works in the standard model. We provide a more efficient direct construction, also in the standard model. We then consider the problem of how to build signcryption schemes from jointly secure combined public key schemes. We provide a construction that uses any such scheme to produce a triple of schemes - signature, encryption, and signcryption - that are jointly secure in an appropriate and strong security model.

Joint work with Kenny Paterson, Jacob Schuldt and Martijn Stam


Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme

P. Scholl, U. Bristol

A key problem with the original implementation of the Gentry Fully Homomorphic Encryption scheme was the slow key generation process. Gentry and Halevi provided a fast technique for $2$-power cyclotomic fields. We present an extension of the Gentry--Halevi key generation technique for arbitrary cyclotomic fields. Our new method is roughly twice as efficient as the previous best methods. Our estimates are backed up with experimental data.


Modular Code-Based Cryptographic Verification

C. Fournet, Microsoft

Type systems are effective tools for verifying the security of cryptographic programs. They provide automation, modularity and scalability, and have been applied to large security protocols. However, they traditionally rely on abstract assumptions on the underlying cryptographic primitives, expressed in symbolic models. Cryptographers usually reason on security assumptions using lower level, computational models that precisely account for the complexity and success probability of attacks. These models are more realistic, but they are harder to formalize and automate.

We present the first modular automated program verification method based on standard cryptographic assumptions. We show how to verify ideal functionalities and protocols written in ML by typing them against new cryptographic interfaces using F7, a refinement type checker coupled with an SMT-solver. We develop a probabilistic core calculus for F7 and formalize its type safety in Coq.

We build typed module and interfaces for MACs, signatures, and encryptions, and establish their authenticity and secrecy properties. We relate their ideal functionalities and concrete implementations, using game-based program transformations behind typed interfaces. We illustrate our method on a series of protocol implementations.

Joint work with Markulf Kohlweiss and Pierre-Yves Strub.


Foundations of Efficient Hashing: Collisions are not Incidental

M. Stam, U. Bristol

We construct a new compression function H from 3n bits to 2n bits that uses two parallel calls to an ideal primitive (an ideal blockcipher or a public random function) from 2n to n bits. This is similar to MDC-2 or the recently proposed MJH. However, unlike these proposals, we achieve collision resistance up to close to 2^(2n/3) queries. This considerably improves upon the existing trivial bound 2^(n/2) (e.g. for MDC-2). Our result relies on two technical innovations.

Firstly, we give an abstract treatment using game playing to describe common techniques employed to prove preimage and collision security of compression functions based on ideal primitives. This abstraction allows us to refine existing techniques and to prove stronger results than were hitherto known. We believe that our framework elucidates existing proofs and consider it of independent interest.

Secondly, the construction itself. A key challenge for our design is to bound the yield, that is the number of full compression function evaluations, in terms of the number of queries to the underlying primitives. To this end, we use an innovative preprocessing function C where any given valid input pair to the underlying ideal primitives corresponds to an incidence between a point and a line in the affine plane GF(2^n)^2. A classical result from discrete geometry--- the Szemerédi--Trotter theorem over finite fields---is subsequently applied to bound the number of these incidences, and with it the yield. An appropriate post-processing function together with a careful (non-trivial) analysis employing our new proof techniques then formally gives us the remarkable collision-resistance bound.

Joint work with Dimitar Jetchev and Onur Özen.


Compromising Adversaries - reducing the gap between Formal Analysis of Security Protocols and security notions for Authenticated Key Exchange

C. Cremers, ETH Zurich

Many recent advances in formal analysis of security protocols have extended the scope and precision of these models and the corresponding tools. However, the underlying adversary model has remained close to the original Dolev-Yao setting, where the adversary fully controls the network and can statically corrupt selected parties. In contrast, security models for AKE protocols have become stronger over time, giving the adversary more and more control over parties, ranging from dynamic corruption to compromise of the local state of parties and revealing the random numbers they generate. In this talk, we highlight some of our recent contributions to closing this gap, by extending the formal models as well as the corresponding tool support.


Modelling of guessing and resource exhaustion attacks

B. Groza, University of Timisoara

As systems are getting larger and more complex, manual analysis becomes tedious and automatic verification is a necessity. This has been often said; however, after successful automatic verification one should keep several issues in mind: models may have errors, model checkers may have bugs and moreover, not all attacks are easy (or even possible) to formalize. In my talk I will focus on two kinds of attacks for which there is little or no support, for automatic verification: guessing and resource exhaustion attacks. I will present our attempts to formalize these attacks in order to make them suitable for automatic verification in the AVANTSSAR project. We have defined guessing rules that are intended for supporting both the (traditional) off-line guessing as well as on-line guessing in the case when the attack cannot be detected by honest protocol participants. For resource exhaustion we have used cost-based rules and we distinguish between excessive but legal protocol use (e.g., flooding) and illegal protocol manipulation that causes participants to waste computation time without reaching the protocol goals. We also highlight attacks that are undetectable by the targeted honest agents or by all protocol participants (both in the case of guessing and resource exhaustion), and present results on practical examples.



New positive results on the provable security of TLS, and a use case where TLS utterly fails.

T. Shrimpton, Portland State University

For more than a decade, researchers have considered the question of whether, or not, the TLS Record Protocol provides provable guarantees of data privacy and integrity. The progression of answers has been: no, not "generically"; yes, if one restricts to specific encryption modes of operation (CBC and CTR), but only under unrealistic assumptions about TLS in practice; yes, under fewer assumptions, but relative to a definition of security that is hard to understand. We'll explore some recent work that answers yes, relative to standard security definitions, and under much more realistic use assumptions. In fact, it can even achieve a bit more than we thought, length-hiding authenticated encryption, as long as an underlying authentication tag is not too short.

We'll then turn this nice positive result on its head, by considering the use of TLS (or any provably secure authenticated encryption scheme) as a client-proxy tunnel through which webpages are downloaded. We'll see that in this setting even a passive eavesdropper can accurately determine which webpage (out of a large, known universe) was downloaded. What's more, the passive attack is very simple, using only coarse measurements about the encrypted channel (such as total bandwidth of the data transfer), and it works even if sophisticated countermeasures are applied prior to sending the web data through the encrypted tunnel.


Efficient quarantining of scanning worms:optimal detection and coordination

A. Ganesh, Uni Bristol

We study defence measures against scanning and model the interaction between worms and detectors as a game. We use epidemiological modelling to characterise the outcome of the game (the pay-off function), as a function of the strategies of the worm and the detector. We design detection rules that are optimal against scanning worms with known characteristics. We then identify specific detection rules that are close to optimal, in a mathematically precise sense, against any scanning worm.

Joint work with Dinan Gunawardena, Peter Key, Laurent Massoulie and Jacob Scott.


Development of Digital Money: From Seashells to Bitcoin

S. Tillich, Uni. Bristol

Everything is getting digital nowadays, so why should money be any different? This talk briefly reviews the development of money (digital and otherwise) and then dives into Bitcoin, an anonymous, decentralized digital currency based on cryptography. Apart from the purely technical aspects, we will also look at the "bigger picture" which shapes the ecosystem of this real-world system - trust, stability/volatility, and human behaviour. We'll also briefly look at another (centralized, non-anonymous) digital currency in order to flesh out the common properties of digital money in general.


Using Information Theory and Statistics to Measure Information Leaks

T. Chothia, Uni. Birmingham

In this talk I will describe how mutual information and min-entropy can be used to quantify information leaks from secure systems.These measures provide meaningful definitions of information leakage that can be applied in a wide range of situations. Using statistical estimation to calculate these values makes it possible to use these techniques to directly test implemented systems. I'll discuss some results on the asymptotics of the estimates that make it possible to calculate confidence interval. As an example, I’ll discuss a time-based traceability attack against the RFID chip in e-passports.

This is joint work with Apratim Guha.


On Security Notions for Functional Encryption

A. O'Neill, Boston University

We consider various security notions for functional encryption (FE), studying relations among them and their achievability. First, we show that indistinguishability (IND) and semantic security (SS) based notions of security are inequivalent for FE, in contrast to the classical setting of public-key encryption. Improving on a contemporaneous result of Boneh, Sahai, and Waters, we go on to show that SS based security is impossible to achieve due to its implicit incorporation of key-revealing selective-opening attacks (SOA-K). Motivated by this impossibility result, we then introduce several relaxations of the SS notion to capture sans-SOA-K semantic security and show they are equivalent to IND for important functionalities corresponding to existing forms of predicate encryption, for which positive results under IND are known.

Partly based on joint work with Mihir Bellare and Srdjan Krstic.


Permutations on finite fields

G. Kyureghyan, INRIA Paris-Rocquencourt and U. Magdeburg

An S-Box of a block cipher is a mapping between vector spaces over the binary field GF(2).If an S-Box has a property characteristic to a linear mapping, it is a proven or potential weakness of the cipher. Hence mappings used as S-Boxes must be as far as possible from linear. However,there are several possibilities to define non-linearity of a mapping. In the talk we introduce several notions of non-linearity. The non-linearity concepts are defined for vector spaces, but some of the classes of non-linear mappings are better studied over finite fields. We present the advantages for endowing the vector space with a field structure. Finally, we present an explicit construction of permutations on finite fields satisfying several properties required in Cryptology.


The true cost of unusable security

A. Sasse, UCL

Service providers use CAPTCHAs to stop bots from creating accounts. It is an example of a security solution that makes genuine human users to work to keep the bots out. In the March issue of Scientific American, technology write David Pogue estimates that CAPTCHAs waste 17 years of human effort every single day. A small but growing number of security researchers has made similar arguments about passwords, certificates, and anti-phishing tools - they consume individual time and effort for little or no discernible reduction of risk. In this talk, I will review this research, and then present examples from our recent research on the impact of such mechanisms on productivity in corporate contexts - and show how designing more usable security reduces cost and increases compliance.


Classical Random Lattices and Modular Subset Sum are Hard on Average

N. Gama, Université de Versaille

In 1996, Ajtai proves that finding short vectors in uniformly drawn lattices of the particular class of SIS lattices allows to solve any lattice problems in the worst case. This worst-case to average-case reduction has motivated many provably-secure lattice-based constructions over the class of SIS lattices. Unfortunately, the overhead in the volume and dimension induced by this reduction is quite large, thus resulting in cryptographic schemes with too high dimensions and key sizes, such as 1GB public keys.

In this paper, we propose a revision of worst-case to average-case reduction, and prove the average hardness of the dense modular subset sum problem, as well as the approximate shortest vector problem on generic random lattices. This closely concurs with experimental results. And instead of resorting to the SIS problem as it is usually the case, our investigation leads to obtaining cryptosystems based on random lattices. The other advantage of our work is that, instead of having to rely on trapdoors for SIS lattices, we can use a significantly more simple and well-known Trapgen for random lattices.

Joint work with Malika Izabachene


Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation

P. Farshim, TU Darmstadt

In this talk, we propose a new cryptographic primitive called Delegatable Homomorphic Encryption (DHE). This allows a Trusted Authority to control/delegate the evaluation of circuits over encrypted data to untrusted workers/evaluators by issuing tokens. This primitive can be both seen as a public-key counterpart to Verifiable Computation, where input generation and output verification are performed by different entities, or as a generalisation of Fully Homomorphic Encryption enabling control over computations on encrypted data. Our primitive comes with a series of extra features: 1) there is a one-time setup procedure for all circuits; 2) senders do not need to be aware of the functions which will be evaluated on the encrypted data, nor do they need to register keys; 3) tokens are independent of senders and receiver; and 4) receivers are able to verify the correctness of computation given short auxiliary information on the input data and the function, independently of the complexity of the computed circuit. We give a modular construction of such a DHE scheme from three components: Fully Homomorphic Encryption (FHE), Functional Encryption (FE), and a (customised) MAC. As a stepping stone, we first define Verifiable Functional Encryption (VFE), and then show how one can build a secure DHE scheme from a VFE and an FHE scheme. We also show how to build the required VFE from a standard FE together with a MAC scheme. All our results hold in the standard model. Finally, we show how one can build a verifiable computation (VC) scheme generically from a DHE. As a corollary, we get the first VC scheme which remains verifiable even if the attacker can observe verification results. (Joint work with Manuel Barbosa) .


Multiparty Computation Secure Against Continual Memory Leakage

S. Goldwasser, MIT

We consider multiparty computation (MPC) within a setting where a malicious adversary may corrupt some parties and {\it leak} information about the secret state of all honest parties. Leakage queries are chosen adaptively, throughout the protocol execution. We will show how to construct a MPC protocol secure against continual memory leakage, with a (necessary) one-time leak-free preprocessing phase in which the players' inputs are shared. More specifically, we prove that any malicious adversary who corrupts (1-\epsilon) fraction of all parties (for any constant \epsilon > 0) and can continuously leak information about the secret state of honest parties for an unbounded number of executions of the MPC protocol, learns nothing beyond the evaluated function values, using the classical simulation-based security definitions. Our construction is based on a number of new primitives, which can be instantiated under DDH and the existence of FHE. This result is joint with Boyle, Jain, and Kalai. There are two new tools we use to achieve the above result which will be discussed as well.

  1. A compiler for transforming any algorithm into one that is secure in the presence of an attacker which gets to observe partial information on the internal state of the computation during execution. This result is unconditional and is of relevance both for running cryptographic algorithms in the presence of side-channel attacks, as well as for running non-cryptographic algorithms, such as a proprietary search algorithm or a game, on a cloud server where parts of the execution's internals might be observed. Joint work with G. Rothblum.
  2. An MPC protocol for computing any efficient function f, without any leak-free stage, with the weaker guarantee that an adversary who corrupts any subset of parties and leaks L bits on the secret states of honest parties learns nothing beyond the function output and L bits of information about the inputs. The construction relies on the linear assumption over bilinear groups. This result is with Kalai, Jain, Garg and Sahai .

Polly Cracker, Revisited

M. Albrecht, Paris

We present a formal treatment of cryptographic constructions - commonly known as "Polly Cracker" - based on the hardness of computing remainders modulo an ideal over multivariate polynomial rings. This work is motivated by the observation that the Ideal Membership (IM) problem is one of the most natural candidates to build homomorphic encryption schemes. To this end, we start by formalising and studying the relation between the ideal remainder problem and the problem of computing a Grobner basis.

We show both positive and negative results.

On the negative side, we define a symmetric Polly Cracker encryption scheme and prove that this scheme only achieves bounded CPA security under the hardness of the IM problem. Furthermore, using results from computational commutative algebra we show that a large class of algebraic transformations cannot convert this scheme to a fully secure Polly Cracker-type scheme.

On the positive side, we formalise noisy variants of the ideal membership, ideal remainder, and Grobner basis problems. These problems can be seen as natural generalisations of the LWE problem and the approximate GCD problem over polynomial rings. After formalising and justifying the hardness of the noisy assumptions we show - following the recent progress on homomorphic encryption - that noisy encoding of messages results in a fully IND-CPA secure somewhat homomorphic encryption scheme. Together with a standard symmetric-to- asymmetric transformation for additively homomorphic schemes, we provide a positive answer to the long standing open problem proposed by Barkee et al. (and later also by Gentry) of constructing a secure Polly Cracker-type cryptosystem reducible to the hardness of solving a random system of equations. Indeed, our results go beyond that by also providing a new family of somewhat homomorphic encryption schemes based on new, but natural, hard problems.


Practical Applications of Homomorphic Encryption

K. Lauter (Microsoft)

The possibility of outsourcing computation to the cloud offers businesses and individuals substantial cost-savings, flexibility, and availability of compute resources, but potentially sacrifices privacy. Homomorphic encryption can help address this problem by allowing the user to upload encrypted data to the cloud, which the cloud can then operate on without having the secret key. The cloud can return encrypted outputs of computations to the user without ever decrypting the data, thus providing hosting of data and services without compromising privacy. Important applications include electronic medical data and financial applications, as well as private targeted advertising. The catch is the degradation of performance and issues of scalability and flexibility. This talk will survey the trade-offs when using homomorphic encryption, and highlight scenarios and functionality where homomorphic encryption seems to be the most appropriate solution. In recent work, we showed that homomorphic encryption can even be used to enable private versions of some basic machine learning algorithms.

This talk will cover several pieces of joint work with Michael Naehrig, Vinod Vaikuntanathan, and Thore Graepel.


Side-Channel assessment of embedded devices

H. Thiebeauld (RFI-Global)

Nowadays most of the security-sensitive embedded devices need to successfully pass a security evaluation in order to be issued on the field. The purpose of such evaluation aims at providing a good level of insurance that a payment device, a payment terminal or an ePassport will not be hacked in reasonable conditions. To do so, an accredited third party laboratory is in charge of applying most recent attack techniques to assess a new product. One type of attack, named Side-channel techniques, target specifically cryptographic algorithms running on a (secure)microcontroller with the aim to extract the secret key, even partially. When a flaw is found, the laboratory needs to quantify the risk that the same attack occurs on the field. This information is later on exploited by the risk managers to define specific rules regarding the product deployment.

The talk will provide an overview of the security evaluation context. The objective is to give an insight of the practical way side-channel attacks are conducted on typical algorithms, such as DES, AES or RSA. Moreover the talk with mention the kind of information an evaluator has in hands to perform a valid assessment in a limited time. Finally some explanations will be given to understand how an attack is rated.


ECM at Work

J. Bos (Microsoft)

The performance of the elliptic curve method (ECM) for integer factorization plays an important role in the security assessment of RSA-based protocols as a cofactorization tool inside the number field sieve. The efficient arithmetic for Edwards curves found an application by speeding up ECM. In this presentation I show techniques based on generating and combining addition chains to optimize Edwards ECM in terms of both performance and memory requirements. This makes our approach very suitable for memory-constrained devices such as graphics processing units (GPU). For commonly used ECM parameters we are able to lower the required memory up to a factor 56 compared to the state-of-the-art Edwards ECM approach. Our ECM implementation on a GTX 580 GPU sets a new throughput record, outperforming the best GPU, CPU and FPGA results reported in literature.

This is joined work with Thorsten Kleinjung.


(Genus) 2 > (Genus) 1

J. Bos (Microsoft)

In this presentation I will give a taxonomy of the best known techniques to realize genus-2 based cryptography. Compared to the standardized genus-1 curves, or elliptic curves, arithmetic on genus-2 curves is typically more involved but allows us to work with moduli of half the size. By studying different modular arithmetic approaches on these curves, we present a range of genus-2 implementations. Our side-channel resistant implementation on the Kummer surface breaks the 120 thousand cycle barrier setting a new software speed record for curve arithmetic compared to all previous genus-1 and genus-2 implementations.

This is joint work with Craig Costello, Huseyin Hisil and Kristin Lauter.


Secure Multiparty Computation almost without Verifiable Secret Sharing

Y. Desmedt (UCL and U. Texas)

Today several organisations, including the US Government use clouds to store important data. Guaranteeing at the same time reliability and privacy is a major challenge. The need for privacy is obvious (although often ignored). The need for reliability has been illustrated, for example, when the internet was deliberately disconnected in Egypt (January 2011) and with the accidental destruction of the cell phone network in the to T?­hoku area during the March 2011 earthquake. To address the aforementioned concerns, fully homomorphic encryption is often championed. Unfortunately, its state of the art is too slow to allow to use it in any reasonable application. A better alternative is secure multiparty computation.

When not tolerating errors, a concern is the need to use Verifiable Secret Sharing (VSS) extensively. In our approach we avoid the need for each shareholder to have to rerun the full VSS protocol after each local computation.

We first briefly summarise the prior work on Black Box Secure Multiparty Computation over Non-Abelian Groups with a Passive Adversary. We then explain the progress made on the topic and then present a solution to the case the adversary is active.


Lucky Thirteen: Breaking the TLS and DTLS Record Protocols

K. Paterson (RHUL)

The Transport Layer Security (TLS) protocol aims to provide confidentiality and integrity of data in transit across untrusted networks. TLS has become the de facto secure protocol of choice for Internet and mobile applications. DTLS is a variant of TLS that is growing in popularity. In this talk, I will present distinguishing and plaintext recovery attacks against TLS and DTLS. The attacks are based on a delicate timing analysis of decryption processing in the two protocols. I will report experimental results demonstrating the feasibility of the attacks in realistic network environments for several different implementations of TLS and DTLS, including the leading OpenSSL implementations. I'll also discuss different countermeasures for the attacks and how they are being adopted by vendors.

Joint work with Nadhem AlFardan.


© 1995-2013 University of Bristol  |  Terms and Conditions  |  Use of Cookies
About this Page