SlideShare a Scribd company logo
Secure Obfuscation for Encrypted Signatures Eurocrypt 2010 (May 31) Satoshi Hada IBM Research - Tokyo
Outline Summary Motivation Theoretical perspective Application perspective Proposed obfuscation Basic idea Example Main result Remarks Relation to signcryption Attacks we can (not) prevent Generalization
The purpose of obfuscation is to hide private information contained in programs while preserving the functionality. byte[] signcrypt(byte[] m){ byte[] key } Obfuscator Before Obfuscation After Obfuscation 2 1 # The obfuscated program preserves the functionality Functionality Whatever adversaries can compute given an obfuscated program can be computed by  black-box access  to the functionality. E.g., we cannot extract the private information from an obfuscated program if we cannot do so by  black-box access  to the functionality. Virtual Black-box Property Requirement Name
Summary: a new positive result on program obfuscation We will show that we can securely obfuscate an encrypted signature scheme. Sign Encrypt Alice’s private signing key Bob’s public encryption key m c σ Message Ciphertext Encrypted Signature We can obfuscate this program NOTE: The message is not encrypted.
Outline Summary Motivation Theoretical perspective Application perspective Proposed obfuscation Basic idea Example Main result Remarks Relation to signcryption Attacks we can (not) prevent Generalization
Motivation: only a few positive results are known and we should look for more positive results. Generic obfuscation is impossible (CRYPTO 2001 Barak et al. ) We need to find specific programs we can securely obfuscate. Negative Point functions (CRYPTO’97 Canetti and many others) Re-encryption (TCC’07 Hehenberger et al.) Vote mixing (TCC’07 Adida et al.) Positive Results Type
Motivation: To use signcryption for Webmail services, service providers need to store users’ private signing keys and execute signcryption on servers. Key leakage is a serious security issue.  Alice’s Web Browser Bob’s Web Browser Server Server Key leakage is a serious security issue!! Standard browsers have no capability of signcryption Signcrypt@ Server
A solution is to obfuscate the signcryption program so that the private signing key can not be abused.  Server Server We can obfuscate this program Alice’s Web Browser Bob’s Web Browser Signcrypt@ Server
Outline Summary Motivation Theoretical perspective Application perspective Proposed obfuscation Basic idea Example Main result Remarks Relation to signcryption Attacks we can (not) prevent Generalization
The basic idea is to design a pair of signature and encryption schemes such that the following two are functionally equivalent: Sign Encrypt m c σ Encrypt Alice’s signing key Bob’s encryption key Sign Obfuscated programs Encrypted  Alice’s signing key Encrypted Signature (to be obfuscated) Message Ciphertext signing a message and then encrypting the signature, encrypting the signing key and then signing the message under the encrypted signing key. Obfuscator The virtual black-box property reduces to the security of encryption.
Example : We realize the basic idea using the BLS signature scheme BLS signature by Boneh, Lynn, and Shacham (Asiacrypt 2001) Key Pair: (v, s) such that v=g s g is a generator of prime order q for a Bilinear group v: public verification key s: private signing key Signature generation σ=Sign(s, m)=H(m) s , where H is a hash function (a random oracle) Key Encapsulation Mechanism (KEM) Key Pair: (pk, sk) pk: public encryption key sk: private decryption key Key encapsulation (r,c)←KEM.Enc(pk)  r is a random key and c is its ciphertext Two required properties A scalar homomorphic property: Given a ciphertext c,  we can compute (r’,c’) such that r’ is a new random key and c’ is a ciphertext of r*r’ (mod q). c is rerandomizable Example Use Paillier encryption scheme as an KEM.Enc satisfying the two requirements
Example: Encrypted signature program Input m Stored Info  private signing key: s public encryption key: pk Code σ=Sign(m, s )=H(m) s (r,c)  ←KEM.E nc(pk) Compute σ r  Output (c, σ r ) Sign Encrypt
Example: Obfuscation (initial attempt) Input m Stored Info private signing key: s public encryption key: pk Code σ=Sign(m, s )=H(m)  s (r,c)  ←KEM.E nc(pk) Compute σ r  Output (c, σ r ) Before Obfuscation Input m Stored Info  c, where (r,c) ←KEM.Enc(pk) s’=s*r mod q Code Sign(m, s’)= H(m) s’ (=σ r ) Output (c, σ r ) Obfuscation After Obfuscation Output is randomly generated Output is fixed for each message Encrypted signing key
Example: Obfuscation Input m Stored Info c, where (r,c) ←KEM.Enc(pk) s’=s*r mod q Code Use the scalar homomorphic property to compute (r’,c’)  s’’=s’*r’ mod q Sign(m, s’’)=H(m) s’’   (=σ r*r’  ) Rerandomize c’ Output (c’, σ r*r’  ) Obfuscation After Obfuscation The output distributions are identical Input m Stored Info private signing key: s public encryption key: pk Code σ=Sign(m, s )=H(m) s (r,c)  ←KEM.E nc(pk) Compute σ r  Output (c, σ r ) Before Obfuscation Randomization was added
Main Result: We can securely obfuscate an encrypted signature scheme in the standard model Our contribution: Apply the basic idea to the encrypted signature scheme defined as the sequential composition of Waters’s signature and linear encryption schemes. Theorem 4:  The obfuscator satisfies a virtual black-box property (VBP) under the DL assumption. What does this mean? 2 1 # Theorem 2:  Waters’s signature scheme is existentially unforgeable (EU) against chosen message attacks under the decisional bilinear Diffie-Hellman (DBDH) assumption. Waters’s signature scheme (Eurocrypt’05) Theorem 3:  Linear encryption scheme is IND-CPA under the decisional linear (DL) assumption. Linear encryption scheme (Crypto’04) Security (in the standard model) Building Block
Main Result: The security of Waters’s signature scheme is preserved even when adversaries are given obfuscated encrypted signature programs Def 3: A signature scheme is EU against adversaries having  signing oracle Def 5: A signature scheme is EU against adversaries having  signing oracle and obfuscated encrypted signature program trivial Thm 1 Thm 1: if the obfuscator satisfies the VBP, then Def 4 implies Def 5.  Thm 2: Waters’s signature scheme satisfies Def 3 under DBDH Corollary 1: Waters’s signature scheme satisfies Def 5 under DL and DBDH trivial Thms 1& 4 Abstract Concrete Stronger  Security
Outline Summary Motivation Theoretical perspective Application perspective Proposed obfuscation Basic idea Example Main result Remarks Relation to signcryption Attacks we can (not) prevent Generalization
We can use encrypted signature as a building block to construct  a secure signcryption scheme. Using our proposed obfuscation, we can obfuscate the signcryption scheme. Sign Encrypt Alice’s private signing key Bob’s public encryption key m c σ Message Ciphertext Encrypted Signature (Hybrid) Encrypt m EncryptedSignature-then-Encryption (EStE) Formal discussion would be a future work item: The security of EStE-based signcryption The security of obfuscation for EStE
There are some attacks that our proposed obfuscation cannot prevent. Even if an adversary is given an obfuscated program for Alice-to-Bob, he/she cannot forge Alice’s signature. compute encrypted signatures for Alice-to-Carol, Alice-to-Dave, … Attacks we can prevent If an adversary is given an obfuscated program for Alice-to-Bob, He/she can compute encrypted signatures for Alice-to-Bob. It’s unavoidable… If he/she has access to the decryption key (or decryption oracle) for Bob, the signing key can be recovered completely. What kind of CCA security can we achieve in the context of encrypted signatures and signcryption? Attack we cannot prevent Attacks Type
Generalization: we can apply the basic idea to other signature schemes We can generalize our construction to clarify the properties that a pair of encryption and signature schemes should satisfy so that the encrypted signature can be securely obfuscated NO YES Pairing-based CRYPTO’02 Lysyanskaya’s unique signature scheme 1 CRYPTO’89 Undeniable signature scheme by Chaum and Antwerpen 3 J. ACM 2004 DDH-based Pseudoranom functions (MAC) 4 5 2 # PKC’02 Dodis’s verifiable random function JoC 1991 Schnorr’s signature scheme Reference Scheme

More Related Content

PDF
2. public key cryptography and RSA
PDF
computer-security-and-cryptography-a-simple-presentation
PPTX
Cryptography and network security
PPT
PUBLIC KEY ENCRYPTION
PPT
Public key cryptography and RSA
PPTX
3 public key cryptography
PDF
CGI White Paper - Key Incryption Mechanism
PDF
Network security cs9 10
2. public key cryptography and RSA
computer-security-and-cryptography-a-simple-presentation
Cryptography and network security
PUBLIC KEY ENCRYPTION
Public key cryptography and RSA
3 public key cryptography
CGI White Paper - Key Incryption Mechanism
Network security cs9 10

What's hot (20)

PPTX
Public Key Cryptosystem
PPT
Public Key Cryptography
PPTX
Principles of public key cryptography and its Uses
PPT
Introduction to cryptography
PPTX
Information and data security public key cryptography and rsa
PPTX
Public key Cryptography & RSA
PDF
CNS - Unit - 4 - Public Key Cryptosystem
PPT
Network Security & Cryptography
DOCX
Cryptography
PPT
Network Security Primer
PPT
Cryptography
PPT
Final ss2-digital-signature-group5
PPTX
Elgamal & schnorr digital signature scheme copy
PPT
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
PDF
Network security cs8
PPTX
Introduction to Cryptography
PPTX
Cryptography and network security
PPTX
Information and network security 31 public key cryptography
Public Key Cryptosystem
Public Key Cryptography
Principles of public key cryptography and its Uses
Introduction to cryptography
Information and data security public key cryptography and rsa
Public key Cryptography & RSA
CNS - Unit - 4 - Public Key Cryptosystem
Network Security & Cryptography
Cryptography
Network Security Primer
Cryptography
Final ss2-digital-signature-group5
Elgamal & schnorr digital signature scheme copy
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Network security cs8
Introduction to Cryptography
Cryptography and network security
Information and network security 31 public key cryptography
Ad

Viewers also liked (6)

PDF
Secure .NET programming
PPTX
Debugging NET Applications With WinDBG
PPTX
The Little Wonders of C# 6
PPTX
Invoke-Obfuscation DerbyCon 2016
PPT
C#/.NET Little Pitfalls
PDF
Unpack your troubles*: .NET packer tricks and countermeasures
Secure .NET programming
Debugging NET Applications With WinDBG
The Little Wonders of C# 6
Invoke-Obfuscation DerbyCon 2016
C#/.NET Little Pitfalls
Unpack your troubles*: .NET packer tricks and countermeasures
Ad

Similar to Secure Obfuscation for Encrypted Signatures (20)

PPT
Chapter 15 - Security
PPT
Lecture 17 (Cryptography).pptngrfiigrhjtf
PPTX
White box crytography in an insecure enviroment
PPTX
Exploring The Secret of Source Coding and Cryptograpic Coding
PPTX
IEDA 3302 e-commerce_secure-communications.pptx
PPT
15.Security
PDF
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
PDF
E017212836
PDF
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
PDF
Nt1310 Unit 6 Powerpoint
PPTX
aacyberessential3cryptography-131067585699078884.pptx
PPT
Kleptography
PPS
Criptography
ODP
Applying Security Algorithms Using openSSL crypto library
PPT
What is digital signature or DSC
PPTX
Cryptography by gaurav singh
PPTX
chapter 7.pptx
PPT
Cryptography in GSM
PDF
Cgi whpr 35_pki_e
PDF
Public private key
Chapter 15 - Security
Lecture 17 (Cryptography).pptngrfiigrhjtf
White box crytography in an insecure enviroment
Exploring The Secret of Source Coding and Cryptograpic Coding
IEDA 3302 e-commerce_secure-communications.pptx
15.Security
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
E017212836
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Nt1310 Unit 6 Powerpoint
aacyberessential3cryptography-131067585699078884.pptx
Kleptography
Criptography
Applying Security Algorithms Using openSSL crypto library
What is digital signature or DSC
Cryptography by gaurav singh
chapter 7.pptx
Cryptography in GSM
Cgi whpr 35_pki_e
Public private key

Recently uploaded (20)

PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Approach and Philosophy of On baking technology
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Hybrid model detection and classification of lung cancer
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
Hindi spoken digit analysis for native and non-native speakers
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Approach and Philosophy of On baking technology
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Tartificialntelligence_presentation.pptx
Group 1 Presentation -Planning and Decision Making .pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Enhancing emotion recognition model for a student engagement use case through...
1 - Historical Antecedents, Social Consideration.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
A comparative study of natural language inference in Swahili using monolingua...
Hybrid model detection and classification of lung cancer
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Heart disease approach using modified random forest and particle swarm optimi...
Unlocking AI with Model Context Protocol (MCP)
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
SOPHOS-XG Firewall Administrator PPT.pptx

Secure Obfuscation for Encrypted Signatures

  • 1. Secure Obfuscation for Encrypted Signatures Eurocrypt 2010 (May 31) Satoshi Hada IBM Research - Tokyo
  • 2. Outline Summary Motivation Theoretical perspective Application perspective Proposed obfuscation Basic idea Example Main result Remarks Relation to signcryption Attacks we can (not) prevent Generalization
  • 3. The purpose of obfuscation is to hide private information contained in programs while preserving the functionality. byte[] signcrypt(byte[] m){ byte[] key } Obfuscator Before Obfuscation After Obfuscation 2 1 # The obfuscated program preserves the functionality Functionality Whatever adversaries can compute given an obfuscated program can be computed by black-box access to the functionality. E.g., we cannot extract the private information from an obfuscated program if we cannot do so by black-box access to the functionality. Virtual Black-box Property Requirement Name
  • 4. Summary: a new positive result on program obfuscation We will show that we can securely obfuscate an encrypted signature scheme. Sign Encrypt Alice’s private signing key Bob’s public encryption key m c σ Message Ciphertext Encrypted Signature We can obfuscate this program NOTE: The message is not encrypted.
  • 5. Outline Summary Motivation Theoretical perspective Application perspective Proposed obfuscation Basic idea Example Main result Remarks Relation to signcryption Attacks we can (not) prevent Generalization
  • 6. Motivation: only a few positive results are known and we should look for more positive results. Generic obfuscation is impossible (CRYPTO 2001 Barak et al. ) We need to find specific programs we can securely obfuscate. Negative Point functions (CRYPTO’97 Canetti and many others) Re-encryption (TCC’07 Hehenberger et al.) Vote mixing (TCC’07 Adida et al.) Positive Results Type
  • 7. Motivation: To use signcryption for Webmail services, service providers need to store users’ private signing keys and execute signcryption on servers. Key leakage is a serious security issue. Alice’s Web Browser Bob’s Web Browser Server Server Key leakage is a serious security issue!! Standard browsers have no capability of signcryption Signcrypt@ Server
  • 8. A solution is to obfuscate the signcryption program so that the private signing key can not be abused. Server Server We can obfuscate this program Alice’s Web Browser Bob’s Web Browser Signcrypt@ Server
  • 9. Outline Summary Motivation Theoretical perspective Application perspective Proposed obfuscation Basic idea Example Main result Remarks Relation to signcryption Attacks we can (not) prevent Generalization
  • 10. The basic idea is to design a pair of signature and encryption schemes such that the following two are functionally equivalent: Sign Encrypt m c σ Encrypt Alice’s signing key Bob’s encryption key Sign Obfuscated programs Encrypted Alice’s signing key Encrypted Signature (to be obfuscated) Message Ciphertext signing a message and then encrypting the signature, encrypting the signing key and then signing the message under the encrypted signing key. Obfuscator The virtual black-box property reduces to the security of encryption.
  • 11. Example : We realize the basic idea using the BLS signature scheme BLS signature by Boneh, Lynn, and Shacham (Asiacrypt 2001) Key Pair: (v, s) such that v=g s g is a generator of prime order q for a Bilinear group v: public verification key s: private signing key Signature generation σ=Sign(s, m)=H(m) s , where H is a hash function (a random oracle) Key Encapsulation Mechanism (KEM) Key Pair: (pk, sk) pk: public encryption key sk: private decryption key Key encapsulation (r,c)←KEM.Enc(pk) r is a random key and c is its ciphertext Two required properties A scalar homomorphic property: Given a ciphertext c, we can compute (r’,c’) such that r’ is a new random key and c’ is a ciphertext of r*r’ (mod q). c is rerandomizable Example Use Paillier encryption scheme as an KEM.Enc satisfying the two requirements
  • 12. Example: Encrypted signature program Input m Stored Info private signing key: s public encryption key: pk Code σ=Sign(m, s )=H(m) s (r,c) ←KEM.E nc(pk) Compute σ r Output (c, σ r ) Sign Encrypt
  • 13. Example: Obfuscation (initial attempt) Input m Stored Info private signing key: s public encryption key: pk Code σ=Sign(m, s )=H(m) s (r,c) ←KEM.E nc(pk) Compute σ r Output (c, σ r ) Before Obfuscation Input m Stored Info c, where (r,c) ←KEM.Enc(pk) s’=s*r mod q Code Sign(m, s’)= H(m) s’ (=σ r ) Output (c, σ r ) Obfuscation After Obfuscation Output is randomly generated Output is fixed for each message Encrypted signing key
  • 14. Example: Obfuscation Input m Stored Info c, where (r,c) ←KEM.Enc(pk) s’=s*r mod q Code Use the scalar homomorphic property to compute (r’,c’) s’’=s’*r’ mod q Sign(m, s’’)=H(m) s’’ (=σ r*r’ ) Rerandomize c’ Output (c’, σ r*r’ ) Obfuscation After Obfuscation The output distributions are identical Input m Stored Info private signing key: s public encryption key: pk Code σ=Sign(m, s )=H(m) s (r,c) ←KEM.E nc(pk) Compute σ r Output (c, σ r ) Before Obfuscation Randomization was added
  • 15. Main Result: We can securely obfuscate an encrypted signature scheme in the standard model Our contribution: Apply the basic idea to the encrypted signature scheme defined as the sequential composition of Waters’s signature and linear encryption schemes. Theorem 4: The obfuscator satisfies a virtual black-box property (VBP) under the DL assumption. What does this mean? 2 1 # Theorem 2: Waters’s signature scheme is existentially unforgeable (EU) against chosen message attacks under the decisional bilinear Diffie-Hellman (DBDH) assumption. Waters’s signature scheme (Eurocrypt’05) Theorem 3: Linear encryption scheme is IND-CPA under the decisional linear (DL) assumption. Linear encryption scheme (Crypto’04) Security (in the standard model) Building Block
  • 16. Main Result: The security of Waters’s signature scheme is preserved even when adversaries are given obfuscated encrypted signature programs Def 3: A signature scheme is EU against adversaries having signing oracle Def 5: A signature scheme is EU against adversaries having signing oracle and obfuscated encrypted signature program trivial Thm 1 Thm 1: if the obfuscator satisfies the VBP, then Def 4 implies Def 5. Thm 2: Waters’s signature scheme satisfies Def 3 under DBDH Corollary 1: Waters’s signature scheme satisfies Def 5 under DL and DBDH trivial Thms 1& 4 Abstract Concrete Stronger Security
  • 17. Outline Summary Motivation Theoretical perspective Application perspective Proposed obfuscation Basic idea Example Main result Remarks Relation to signcryption Attacks we can (not) prevent Generalization
  • 18. We can use encrypted signature as a building block to construct a secure signcryption scheme. Using our proposed obfuscation, we can obfuscate the signcryption scheme. Sign Encrypt Alice’s private signing key Bob’s public encryption key m c σ Message Ciphertext Encrypted Signature (Hybrid) Encrypt m EncryptedSignature-then-Encryption (EStE) Formal discussion would be a future work item: The security of EStE-based signcryption The security of obfuscation for EStE
  • 19. There are some attacks that our proposed obfuscation cannot prevent. Even if an adversary is given an obfuscated program for Alice-to-Bob, he/she cannot forge Alice’s signature. compute encrypted signatures for Alice-to-Carol, Alice-to-Dave, … Attacks we can prevent If an adversary is given an obfuscated program for Alice-to-Bob, He/she can compute encrypted signatures for Alice-to-Bob. It’s unavoidable… If he/she has access to the decryption key (or decryption oracle) for Bob, the signing key can be recovered completely. What kind of CCA security can we achieve in the context of encrypted signatures and signcryption? Attack we cannot prevent Attacks Type
  • 20. Generalization: we can apply the basic idea to other signature schemes We can generalize our construction to clarify the properties that a pair of encryption and signature schemes should satisfy so that the encrypted signature can be securely obfuscated NO YES Pairing-based CRYPTO’02 Lysyanskaya’s unique signature scheme 1 CRYPTO’89 Undeniable signature scheme by Chaum and Antwerpen 3 J. ACM 2004 DDH-based Pseudoranom functions (MAC) 4 5 2 # PKC’02 Dodis’s verifiable random function JoC 1991 Schnorr’s signature scheme Reference Scheme