Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes

被引:25
作者
Akinyele, Joseph A. [1 ]
Garman, Christina [1 ]
Hohenberger, Susan [1 ]
机构
[1] Johns Hopkins Univ, Baltimore, MD 21218 USA
来源
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2015年
基金
美国国家科学基金会;
关键词
Automation; Pairing-Based Cryptography; Cryptographic Compilers; Public-Key Encryption; Digital Signatures;
D O I
10.1145/2810103.2813601
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pairing-based cryptography has exploded over the last decade, as this algebraic setting offers good functionality and efficiency. However, there is a huge security gap between how schemes are usually analyzed in the academic literature and how they are typically implemented. The issue at play is that there exist multiple types of pairings: Type I called "symmetric" is typically how schemes are presented and proven secure in the literature, because it is simpler and the complexity assumptions can be weaker; however, Type-III called "asymmetric" is typically the most efficient choice for an implementation in terms of bandwidth and computation time. There are two main complexities when moving from one pairing type to another. First, the change in algebraic setting invalidates the original security proof. Second, there are usually multiple (possibly thousands) of ways to translate from a Type-I to a Type-III scheme, and the "best" translation may depend on the application. Our contribution is the design, development and evaluation of a new software tool, AutoGroup+, that automatically translates from Type-I to Type-III pairings. The output of AutoGroup+ is: (1) "secure" provided the input is "secure" and (2) optimal based on the user's efficiency constraints (excluding software and run-time errors). Prior automation work for pairings was either not guaranteed to be secure or only partially automated and impractically slow. This work addresses the pairing security gap by realizing a fast and secure translation tool.
引用
收藏
页码:1370 / 1381
页数:12
相关论文
共 27 条
[1]  
A. Contributors, ADV CRYPT SOFTW COLL
[2]  
Abe M., 2015, COMMUNICATION
[3]  
Abe M, 2014, LECT NOTES COMPUT SC, V8616, P241, DOI 10.1007/978-3-662-44371-2_14
[4]  
Abe Masayuki, 2012, 2012285 CRYPT EPRINT
[5]  
Akinyele J.A., 2013, Proceedings of the 2013 ACM SIGSAC Conference on Computer #38
[6]  
Communications Security, P399
[7]  
Akinyele J.A., 2012, Proceedings of the 2012 ACM Conference on Computer and Communications Security, P474, DOI [DOI 10.1145/2382196.2382248, 10.1145/2382196.2382248]
[8]  
Akinyele J.A., 2015, 2015290 CRYPT EPRINT
[9]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[10]  
[Anonymous], LECT NOTES COMPUTER