18
RIKE Using Revocable Identities to Support Key Escrow in PKIs Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao State Key Laboratory of Information Security, Chinese Academy of Sciences [email protected]

RIKE Using Revocable Identities to Support Key Escrow in PKIs

  • Upload
    primo

  • View
    34

  • Download
    0

Embed Size (px)

DESCRIPTION

RIKE Using Revocable Identities to Support Key Escrow in PKIs. Nan Zhang, Jingqiang Lin , Jiwu Jing, Neng Gao State Key Laboratory of Information Security, Chinese Academy of Sciences [email protected]. Public Key Infrastructure - PKI. - PowerPoint PPT Presentation

Citation preview

Page 1: RIKE Using Revocable Identities to Support Key Escrow in PKIs

RIKEUsing Revocable Identities to Support Key Escrow in PKIs

Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng GaoState Key Laboratory of Information Security,Chinese Academy of [email protected]

Page 2: RIKE Using Revocable Identities to Support Key Escrow in PKIs

Public Key Infrastructure - PKI•A PKI certificate binds a public key and the identity of a user U.▫Signed by a certification authority (CA).

•The public key (or certificate) can be used to verify signatures and encrypt messages, by another user U’.▫U’ shall firstly validate/verify the

certificate.

Page 3: RIKE Using Revocable Identities to Support Key Escrow in PKIs

Conflicting Requirement – Key Escrow

•Non-repudiation: prohibit key escrow▫Key escrow is prohibited, if the certificate

(or public key) is used for non-repudiation. E.g., verify signatures

Page 4: RIKE Using Revocable Identities to Support Key Escrow in PKIs

Conflicting Requirement – Key Escrow

•Non-repudiation: prohibit key escrow•Confidentiality: require key escrow

▫Key escrow (or key recovery) is usually required, if the certificate is used for confidentiality; e.g., encrypt messages.

▫A corporation backs up all private keys of its employees. To decrypt the messages, in the case that the private key is unavailable.

Page 5: RIKE Using Revocable Identities to Support Key Escrow in PKIs

Conflicting Requirements in One User

•These conflicting requirements can exist in one user.▫U signs messages, sent to everybody.▫Other users sends encrypted messages to U.

Page 6: RIKE Using Revocable Identities to Support Key Escrow in PKIs

Current solutions•Two-certificate solutions

▫Each user has two certificates (i.e., two key pairs). One is for non-repudiation, not escrowed.

The other is for confidentiality, escrowed.

•Key escrow authority (KEA)▫The component is responsible for storing the backups of escrowed private keys.

Page 7: RIKE Using Revocable Identities to Support Key Escrow in PKIs

Drawback of the current Solution•PKI system/CA

▫The number of certificates is doubled

•Relying party, who uses the certificate to encrypt/verify messages▫Validate or maintain two certificates for each contact

•Key escrow authority▫As certificates expire and more users▫Backup more and more private keys

Page 8: RIKE Using Revocable Identities to Support Key Escrow in PKIs

Our Solution - RIKE•RIKE

▫Using Revocable Identities of IBE to support Key Escrow in PKIs

▫Integrating IBE and PKIs

Page 9: RIKE Using Revocable Identities to Support Key Escrow in PKIs

IBE: Identity-based encryption•A special type of public key algorithm•Private key generator (PKG)

▫Initializes a secret master key and the pubic parameters

•A user's public key is calculated from its identity and the pubic parameters▫by anybody

•The user asks the PKG to generate the private key corresponding to its identity.▫When receiving encrypted messages

Page 10: RIKE Using Revocable Identities to Support Key Escrow in PKIs

Inherent key escrow of IBE•Features

▫Any bit-string can be used to derive a public key

▫Inherent key escrow The PKG generates private keys for all IBE users

Page 11: RIKE Using Revocable Identities to Support Key Escrow in PKIs

RIKE•Basic idea

▫Each user has only one certificate, not escrowed The certificate is used for non-repudiation

Page 12: RIKE Using Revocable Identities to Support Key Escrow in PKIs

RIKE•Basic idea

▫Each user has only one certificate, not escrowed

▫The hash value of the certificate is inputted to IBE as the “identity” to derive the second public key This key pair is used for confidentiality

This IBE private key is inherently escrowed

Page 13: RIKE Using Revocable Identities to Support Key Escrow in PKIs

RIKE•Only one certificate

▫PublicKey1 is not escrowed, used for the services prohibiting key escrow

▫PublicKey2 is escrowed in the PKG, used for other services requiring key escrowIDU

PublicKey1

Period of validity,CA signature, ...

Hash IBE PublicKey2As the "identity"

Certificate

Page 14: RIKE Using Revocable Identities to Support Key Escrow in PKIs

Benefits – from PKI•The conflicting requirements of key escrow is satisfied

•Each user holds only one certificate▫Relying parties manage only one

certificate for each contact▫Compared with two-certificate solutions,

the number of certificates is half•The PKG only keeps the IBE master key▫On the contrary, the KEA in the current

solutions back up all private keys

Page 15: RIKE Using Revocable Identities to Support Key Escrow in PKIs

Benefit – from IBE•In IBE, revocation is difficult, because users don’t want to change their identities

•In RIKE, the certificate can be revoked by lots of existing PKI revocation mechanisms

•The certificate is used as a “revocable identity” for IBE▫If the PKI certificate is revoked, the

“identity” and the IBE key pair is also revoked

•It helps to the application of IBE algorithms

Page 16: RIKE Using Revocable Identities to Support Key Escrow in PKIs

Benefit – Compatibility•RIKE integrates PKIs and IBE, in a highly-compatible way.

•It is highly-compatible with the popular X.509 PKIs.

•A certificate extension is designed to carry the IBE algorithm parameters▫If a user doesn’t support this extension, the

certificate is used a common X.509 certificate.

▫If the user support the extension, the IBE public key is derived.

Page 17: RIKE Using Revocable Identities to Support Key Escrow in PKIs

Other issues•Integrate hierarchical IBE and hierarchical PKIs to build hierarchical RIKE

•Hierarchical RIKE with cross certificates

•Refer to the paper for details

Page 18: RIKE Using Revocable Identities to Support Key Escrow in PKIs

ThanksAny questions or comments?Jingqiang Lin <[email protected]>