CSSE Security Group Seminars, 2011
Friday, 1 July, 2011 11:00AM
Venue: (ICT 5.08), ICT Building
111 Barry Street, Carlton
Peter Hyun-Jeen Lee
Identity-based Encryption and its Applications using Bilinear Maps
Abstract
Identity-based Encryption (IBE) is a novel public key primitive where an identity string is used as a public key to encrypt a message. This unique feature relieves the burden of public key management which makes IBE an ideal choice for establishing a confidential channel between communicating parties. IBE has further evolved into a number of different forms to adapt for the application needs. For instance, (i) Certificateless Encryption (CLE) for applications where key escrow is undesirable; (ii) Identity-based Signcryption (IBSC) for applications where message confidentiality and authenticity are simultaneously needed; (iii) Attribute-based Encryption (ABE) which is a generalization of IBE enabling selective broadcast with rich expressibility in the encryption policy. In this seminar, we specifically address the following issues: (i) efficient public key size (CLE); (ii) provable security in the standard model with efficient ciphertext size (IBSC); (iii) efficient user revocability (ABE). Then, we present our solution to resolve each of the aforementioned issues.Friday, 4 Mar, 2011 12:00AM
Venue: (ICT 4.04), ICT Building
111 Barry Street, Carlton
Peter Hyun-Jeen Lee
Revocable Threshold Attribute-Based Encryption
CSSE Security Group Seminars, 2009
Friday, 25 Jan, 2009 12:00AM
Venue: (ICT Theatre 2), ICT Building
111 Barry Street, Carlton
Peter Hyun-Jeen Lee
Design and Analysis of Cryptographic Schemes for Wireless Networks
Abstract
In a wireless network such as Mobile Adhoc Network (MANET), protecting the privacy of users poses a greater challenge since: (i) the network is formed on-the-fly; (ii) messages are broadcasted;(iii) messages travel in multi-hop manner. Further, due to the resource limited nature of nodes participating in MANET, efficient methods must be employed to solve the aforementioned problem. As an effort towards this, we propose an efficient public key encryption scheme without key escrow. The scheme is based on bilinear pairings using identities. We also show the security of the scheme in random oracle model and establish a reduction of our scheme to solving a mathematical hard problem. Further, we propose to implement our scheme and perform simulations in a wireless environment.CSSE Security Group Seminars, 2006
Thursday, 12 October 2006, 9:00AM
Venue: (ICT Theatre 2), ICT Building
111 Barry Street, Carlton
Peter Hyun-Jeen Lee
Abstract
An Anonymous Secure Protocol for Certified Email using Identity Based Encryption
Since the beginning of the Internet era, email has become a popular medium for exchanging information on the net. However, standard email lacks fairness, security and pseudonymity which are desirable properties in certain circumstances. We present a certified email protocol which is fair, secure and pseudonymous with competitive efficiency. A snapshot of the implementation is given to aid the future development.CSSE Security Group Seminars, 2005
Wednesday 28 September 2005, 11:00AM
Venue: (ICT 4.04), ICT Building
111 Barry Street, Carlton
Amy Beth Corman
The talk details are: Crypto Rodeo This talk is a round up of some interesting current events in the field of cryptography. It covers four topics which may impact non-cryptographers:* Quantum computing, cryptography and key exchange
* SHA-1 hash function break
* Side channel attack on AES
* Blue tooth device pairing PIN crack
Wednesday 20 April 2005, 11:00AM
Venue: (ICT 4.04), ICT Building
111 Barry Street, Carlton
Prof. Harald Sondergaard
Wednesday 6 April 2005, 11:00AM
Venue: (ICT 4.04), ICT Building
111 Barry Street, Carlton
Narayan Shivaramakrishna
Towards Identity-based Crypto-Schemes:
Abstract
Secure communication is a key aspect in the electronic world and this can be achieved using Public Key Cryptography (PKC). The most commonly used PKC technology is the Public Key Infrastructure (PKI) which is based on the use of certificates. There have been models like Kerberos and other hybrid schemes developed to support PKI. The Identity Based Scheme is one of the new emerging cryptographic schemes that can be used to compliment PKI, and is of particular interest in current cryptography research, because it involves less overhead compared with currently used methodologies. In this talk I will introduce the basic concepts of Identity Based Scheme and present a few instances of how this scheme can be used to supplement the existing PKI. Reference: Secure Communication in a Distributed System Using Identity Based Encryption T. Stading. In Proceedings of 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGrid 2003, pp 414-420, 2003. A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology in a Health Care Trial M.C. Mont, P. Bramhall and K. Harrison. In Proceedings of 14th International Workshop on Database and Expert Systems Applications, DEXA 2003, pp 432-437, 2003. More links on IBE are given below:http://crypto.stanford.edu/ibe/
http://planeta.terra.com.br/informatica/paulobarreto/pblounge.html
The MIRACL big number library contains an experimental implementation of IBE, (http://indigo.ie/~mscott/)
A Non-interactive Public-Key Distribution System, U.M. Maurer and Y. Yacobi. Designs, Codes and Cryptography Vol 9 No 3, pp 305-316.
Minimal-Overhead IP Security using Identity-Based Encryption, G. Appenzeller and B. Lynn. Submitted for publication, http://rooster.stanford.edu/~ben/pubs/ipibe.pdf.
Identity Based Encryption from the Tate Pairing to Secure Email Communications, M. Baldwin. Master of Engineering Thesis, University of Bristol, 2002.
Secure Communication in a Distributed System Using Identity Based Encryption, T. Stading. In Proceedings of 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGrid 2003, pp 414-420, 2003.
Wednesday 23 March 2005, 11:00AM
Venue: (ICT 4.04), ICT Building
111 Barry Street, Carlton
Baden Hughes
Recently discovered vulnerabilities and attacks on SHA-1
Reference: "A secure and optimally efficient multi-authority election scheme" by Cramer, Gennaro and Schoenmakers. Reading material. ;
Wednesday March 9,, 2005, 11:00AM
Venue: (ICT 4.04), ICT Building
111 Barry Street, Carlton
Andrew Newlands
Cryptanalysis of Stream ciphers,
The talk is based on author's master's thesis.
Wednesday February 16, 2005, 11:00AM
Venue: (ICT 4.04), ICT Building
111 Barry Street, Carlton
Vanessa Teague
A secure and optimally efficient multi-authority election scheme
Reference: "A secure and optimally efficient multi-authority election scheme" by Cramer, Gennaro and Schoenmakers. The psfile of the paper is here. ;
Wednesday February 2, 2005, 11:00AM
Venue: (ICT 4.04), ICT Building
111 Barry Street, Carlton
Amy Beth corman
Analysis of cryptographic protocols
Reference: The talk is based the paper: Analysis of cryptographic protocols (http://www.di.ens.fr/~blanchet/crypto-eng.html)Analysis of cryptographic protocols. ;
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In 14th IEEE Computer Security Foundations Workshop (CSFW-14), pages 82-96, Cape Breton, Nova Scotia, Canada, June 2001. IEEE Computer Society.