Probabilistic Anonymity via Coalgebraic Simulations Ichiro Hasuo Radboud Universiteit Nijmegen, the Netherlands (From 2007.5, also at: RIMS, Kyoto Univ.,

Slides:



Advertisements
Similar presentations
Provable Unlinkability Against Traffic Analysis Ron Berman Joint work with Amos Fiat and Amnon Ta-Shma School of Computer Science, Tel-Aviv University.
Advertisements

Universally Composable Symbolic Analysis of Cryptographic Protocols
Recognising Languages We will tackle the problem of defining languages by considering how we could recognise them. Problem: Is there a method of recognising.
Conditional Probabilities over Probabilistic and Nondeterministic Systems M. E. Andrés and P. van Rossum Radboud Universiteit Nijmegen, The Netherlands.
Computational Privacy. Overview Goal: Allow n-private computation of arbitrary funcs. –Impossible in information-theoretic setting Computational setting:
CS 345: Chapter 9 Algorithmic Universality and Its Robustness
1 Nondeterministic Space is Closed Under Complement Presented by Jing Zhang and Yingbo Wang Theory of Computation II Professor: Geoffrey Smith.
Lecture 3Dr. Verma1 COSC 6397 – Information Assurance Module M2 – Protocol Specification and Verification University of Houston Rakesh Verma Lecture 3.
Vote privacy: models and cryptographic underpinnings Bogdan Warinschi University of Bristol 1.
1 1 Regression Verification for Multi-Threaded Programs Sagar Chaki, SEI-Pittsburgh Arie Gurfinkel, SEI-Pittsburgh Ofer Strichman, Technion-Haifa Originally.
Friday, April 17, 2015 Requirements Specifications Interaction Analysis Bill Mitchell Software and Systems Research Labs Motorola UK Research Labs Bill.
Process Algebra (2IF45) Probabilistic Process Algebra Suzana Andova.
Bangalore, 2 Feb 2005Probabilistic security protocols 1 CIMPA School on Security Specification and verification of randomized security protocols Lecture.
Ichiro Hasuo Tracing Anonymity with Coalgebras TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A A A.
Platzhalter für Bild, Bild auf Titelfolie hinter das Logo einsetzen Marcello Bonsangue, Stefan Milius, Alexandra Silva Coalgebras and Generalized Regular.
Message Splitting Against the Partial Adversary Andrei Serjantov The Free Haven Project (UK) Steven J Murdoch University of Cambridge Computer Laboratory.
Ana Sokolova University of Salzburg joint work with Bart Jacobs Radboud University Nijmegen Dagstuhl Seminar on Coalgebraic Logics, TexPoint fonts.
Introduction to Computability Theory
1 Introduction to Computability Theory Lecture2: Non Deterministic Finite Automata Prof. Amos Israeli.
Introduction to Computability Theory
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
A testing scenario for probabilistic automata Marielle Stoelinga UC Santa Cruz Frits Vaandrager University of Nijmegen.
1 Introduction to Computability Theory Lecture2: Non Deterministic Finite Automata (cont.) Prof. Amos Israeli.
Analysis of Security Protocols (V) John C. Mitchell Stanford University.
1 Ivan Lanese Computer Science Department University of Bologna Roberto Bruni Computer Science Department University of Pisa A mobile calculus with parametric.
Foundations of (Theoretical) Computer Science Chapter 2 Lecture Notes (Section 2.2: Pushdown Automata) Prof. Karen Daniels, Fall 2009 with acknowledgement.
1 Ivan Lanese Computer Science Department University of Bologna Italy Concurrent and located synchronizations in π-calculus.
CS 711 Fall 2002 Programming Languages Seminar Andrew Myers 2. Noninterference 4 Sept 2002.
CS5371 Theory of Computation Lecture 8: Automata Theory VI (PDA, PDA = CFG)
CS555Spring 2012/Topic 41 Cryptography CS 555 Topic 4: Computational Approach to Cryptography.
Conceptual modelling. Overview - what is the aim of the article? ”We build conceptual models in our heads to solve problems in our everyday life”… ”By.
Information Theory and Security
Foundations of Cryptography Lecture 2 Lecturer: Moni Naor.
Information-Theoretic Security and Security under Composition Eyal Kushilevitz (Technion) Yehuda Lindell (Bar-Ilan University) Tal Rabin (IBM T.J. Watson)
Information Theory and Security Prakash Panangaden McGill University First Canada-France Workshop on Foundations and Practice of Security Montréal 2008.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
How to play ANY mental game
Provable Unlinkability Against Traffic Analysis Amnon Ta-Shma Joint work with Ron Berman and Amos Fiat School of Computer Science, Tel-Aviv University.
1Computer Sciences Department. Book: INTRODUCTION TO THE THEORY OF COMPUTATION, SECOND EDITION, by: MICHAEL SIPSER Reference 3Computer Sciences Department.
REGULAR LANGUAGES.
Pushdown Automata (PDAs)
1 Security on Social Networks Or some clues about Access Control in Web Data Management with Privacy, Time and Provenance Serge Abiteboul, Alban Galland.
Honey Encryption: Security Beyond the Brute-Force Bound
1 TABLE OF CONTENTS PROBABILITY THEORY Lecture – 1Basics Lecture – 2 Independence and Bernoulli Trials Lecture – 3Random Variables Lecture – 4 Binomial.
Cryptography and Network Security (CS435) Part One (Introduction)
Ana Sokolova University of Salzburg joint work with Bart Jacobs Radboud University Nijmegen Coalgebra Day, , RUN 1 TexPoint fonts used in EMF.
Coalgebraic components in a many-sorted microcosm Ichiro Hasuo Kyoto, JP Chris Heunen Nijmegen, NL (  Oxford, UK) Bart Jacobs Nijmegen, NL Ana Sokolova.
Kazuyuki Asada Ichiro Hasuo RIMS, Kyoto University PRESTO Research Promotion Program, Japan Science and Technology Agency CSCAT 2010 March 18, 2010.
Categorical Categorical theory of state-based systems in Sets : bisimilarity in Kleisli: trace semantics [Hasuo,Jacobs,Sokolova LMCS´07] in Sets : bisimilarity.
Game-based composition for key exchange Cristina Brzuska, Marc Fischlin (University of Darmstadt) Nigel Smart, Bogdan Warinschi, Steve Williams (University.
Probabilistic Anonymity Mohit Bhargava, IIT New Delhi Catuscia Palamidessi, INRIA Futurs & LIX.
Paris, 17 December 2007MPRI Course on Concurrency MPRI – Course on Concurrency Lecture 14 Application of probabilistic process calculi to security Catuscia.
Weak Bisimilarity Coalgebraically Andrei Popescu Department of Computer Science University of Illinois.
Lecture 5 1 CSP tools for verification of Sec Prot Overview of the lecture The Casper interface Refinement checking and FDR Model checking Theorem proving.
CS 208: Computing Theory Assoc. Prof. Dr. Brahim Hnich Faculty of Computer Sciences Izmir University of Economics.
1 Joint work with Claudio Antares Mezzina and Jean-Bernard Stefani Controlled Reversibility and Compensations Ivan Lanese Focus research group Computer.
HACNet Simulation-based Validation of Security Protocols Vinay Venkataraghavan Advisors: S.Nair, P.-M. Seidel HACNet Lab Computer Science and Engineering.
Recognising Languages We will tackle the problem of defining languages by considering how we could recognise them. Problem: Is there a method of recognising.
Foundations of (Theoretical) Computer Science Chapter 2 Lecture Notes (Section 2.2: Pushdown Automata) Prof. Karen Daniels, Fall 2010 with acknowledgement.
Ana Sokolova University of Salzburg joint work with Bart Jacobs Radboud University Nijmegen FM Group Seminar, TU/e, Eindhoven TexPoint fonts used.
Pseudo-random generators Talk for Amnon ’ s seminar.
Process Algebra (2IF45) Analysing Probabilistic systems Dr. Suzana Andova.
Process Algebra (2IF45) Basic Process Algebra Dr. Suzana Andova.
Information Relativity W.J. (Chris) Zhang University of Saskatchewan, Canada East China University of Science and Technology, China.
Probabilistic Methods in Concurrency Lecture 5 Basics of Measure Theory and Probability Theory Probabilistic Automata Catuscia Palamidessi
Modern symmetric-key Encryption
Exponential Time Paradigms Through the Polynomial Time Lens
Cryptography and Network Security Chapter 7
09 Zero Knowledge Proof Hi All, One more topic to go!
Presentation transcript:

Probabilistic Anonymity via Coalgebraic Simulations Ichiro Hasuo Radboud Universiteit Nijmegen, the Netherlands (From , also at: RIMS, Kyoto Univ., Japan) Joint work with Yoshinobu Kawabe NTT Communication Science Laboratories, Japan Japanese “France Telecom”

Online privacy Online anonymity is attracting growing Threats ISPs in EU are forced to keep logs of your web access Your passport stores your fingerprint on a RFID chip Public concerns Research interest See Anonymity Bibliography The field is quite young Compared to “traditional” security notions such as secrecy, authentication

Overview: Probabilistic anonymity via coalgebraic simulations Simulation-based proof method for non-deterministic = possibilistic anonymity [KawabeMST06] Simulation-based proof method for probabilistic anonymity Generic, coalgebraic theory of traces and simulations [IH,Jacobs,Sokolova] non-det.  prob. is just a change of a parameter

For you to take home Probability in anonymity Subtlety in definition of “probabilistic anonymity” Power of categorical methods in computer science Specifically, theory of coalgebras Abstraction and genericity Category theory in action!

References Coalgebraic theory of traces and simulations Ichiro Hasuo, Bart Jacobs and Ana Sokolova Generic Trace Theory CMCS’06, ENTCS 164 Ichiro Hasuo Generic Forward and Backward Simulations CONCUR 2006, LNCS 4137 Simulation-based proof method of anonymity Y. Kawabe, K. Mano, H. Sakurada and Y. Tsukada Theorem-proving anonymity of infinite state systems Information Processing Letters, to appear Y. Kawabe, K. Mano, H. Sakurada and Y. Tsukada Backward simulations for anonymity WITS’06 Ichiro Hasuo and Yoshinobu Kawabe Probabilistic Anonymity via Coalgebraic Simulations ESOP’07, to appear Y. Kawabe B. Jacobs A. Sokolova Nina Hagen

Part I: Non-deterministic version of  simulation  anonymity

Non-deterministic “trace” anonymity [Schneider&Sidiropoulos,ESORICS’96] Anonymous donation as an example Ana : actor action (invisible for adversary) $5: observable action Are these protocols “anonymous”? Anonymous! Not anonymous! Definition (Trace anonymity) X is anonymous  Observation can be attributed to anybody

Non-deterministic (  simulation  anonymity) [Kawabe,Mano,Sakurada,Tsukada 2006] Theory of traces and simulations Forward simulation R is such that: Backward simulation R is such that: Soundness theorem:  fwd/bwd simulation  trace inclusion [Lynch&Vaandrager, Inf.&Comp. 1995] Theorem  forward/backward simulation from an( X ) to X  X is anonymous An automaton which models an anonymizing protocol

Non-deterministic (  simulation  anonymity) [Kawabe,Mano,Sakurada,Tsukada 2006] Theorem  forward/backward simulation from an( X ) to X  X is anonymous “anonymized” version of X (trivially anonymous) Proof. X is anonymous  tr( X ) = tr(an( X )) (anonymity is trace-based)  tr( X )  tr(an( X )) (  is trivial)   simulation from an( X ) to X (soundness theorem!)

Part II: Probabilistic anonymity and  simulation  anonymity)

Probabilistic anonymity Are these protocols “anonymous”? These are all anonymous in a possibilistic sense.  definition of “probabilistic anonymity”? Anonymous!“Anonymous”!Not anonymous!

Probabilistic anonymity [Bhargava&Palamidessi, CONCUR’05] Definition (Probabilistic anonymity) X is anonymous  such as  $5  conditional probability

Intuition: “Observation of does not carry any info. on who is donating” A priori distribution of suspicion need not be uniform However, after any observation, any agent must be exactly as suspicious as before More on probabilistic anonymity Definition (Probabilistic anonymity) X is anonymous 

More on probabilistic anonymity I Know Bart is more likely to donate

More on probabilistic anonymity Someone donated $10K, which is more likely by Bart (as I suspected)… (anonymous) Bart wouldn’t donate such an amount. This time it’s likely that Ana did! (not anonymous) $10K

Again the same scenario: (  simulation  anonymity) Theorem  forward/backward simulation from an( X ) to X  X is anonymous Proof. X is anonymous  tr( X ) = tr(an( X )) (anonymity is trace-based)  tr( X )  tr(an( X )) (  is trivial)   simulation from an( X ) to X (soundness theorem!) probabilistic automaton probabilistic anonymity trace distribution probabilistic simulation Can we do this probabilistically? What is an(X)? What is “probabilistic simulation”?

an( X ), in a probabilistic setting Idea: distribute probability according to a-priori suspicion A-priori suspicion: Hence

Again the same scenario: (  simulation  anonymity) Theorem  forward/backward simulation from an( X ) to X  X is anonymous Proof. X is anonymous  tr( X ) = tr(an( X )) (anonymity is trace-based)  tr( X )  tr(an( X )) (  is trivial)   simulation from an( X ) to X (soundness theorem!) probabilistic automaton probabilistic anonymity trace distribution probabilistic simulation Can we do this probabilistically? What is an(X)? What is “probabilistic simulation”?

Intermezzo: Coalgebraic theory of traces and simulations

Theory of coalgebras Categorical theory of “state-based systems” Base categories Sets  theory of bisimilarity [Rutten,TCS’00] Kl(T)  theory of traces and simulations [IH,Jacobs,Sokolova,CMCS’06][IH,CONCUR’06] Everything as objects and arrows Focus on “essence” Abstraction, genericity

Traces and simulations, coalgebraically System a coalgebra Trace semantics Simulations backward sim. in forward sim. Parameter F : for transition-type Parameter T : for branching-type General soundness theorem : 9 simulation  trace incl.

Genericity By changing parameters, the framework covers different branching-types by different T non-determinism probabilistic branching different transition-types by different F LTS: x  (a,x’) Context-free grammar: x   “  ”, x   x   x, “  ”, x  T and F We exploit this! Anything we can do in a non-det. setting, we can also do in a probabilistic setting

Systems as coalgebras T is a monad, for branching-type. Examples: P, powerset monad for non-determinism D, subdistribution monad for (generative) probabilistic branching in A system is: F: a functor for transition-type T: a monad for branching-type

Systems as coalgebras A system is: : the Kleisli category for T Main point: for T = P, in, a function A category where branching is implicit

Parameters A system is: in, a function T = P, F = 1 +   - branching-type: non-determinism transition-type: terminate or (output, next) such as LTS with explicit termination

Parameters A system is: in, a function T = P, F = 1 +   - T = D, F = 1 +   - T = P, F = (  + - ) * LTS with explicit termination Generative probabilistic system Context-free grammar

Trace semantics [IH, Jacobs, Sokolova. CMCS’06]   final coalgebra in 2. This induced f gives (finite) trace semantics For any system,  ! f such that

Forward simulation R : a relation, because in Take T= P

Forward simulation impliesHence

Backward simulation implies Hence

Main result: general soundness theorem forward/backward simulation trace inclusion Proof. Also completeness result, as easily in

Summary: we have illustrated System Trace semantics Simulations backward sim. in forward sim. General soundness theorem : 9 simulation  trace incl.

Back to probabilistic anonymity

Theorem  forward/backward simulation from an( X ) to X  X is anonymous Proof. X is anonymous  tr( X ) = tr(an( X )) (anonymity is trace-based)  tr( X )  tr(an( X )) (  is trivial)   simulation from an( X ) to X (soundness theorem!) probabilistic automaton probabilistic anonymity trace distribution probabilistic simulation Can we do this probabilistically? What is an(X)? What is “probabilistic simulation”?

Probabilistic simulation via coalgebraic simulation Coalgebra for T = D (prob. branching) F = A  } + A  _ f : fwd simulation from Y to X  in Soundness comes for free by

Probabilistic (  simulation  anonymity) [IH&Kawabe,2006] Theorem  forward/backward simulation from an( X ) to X  X is anonymous Proof. X is anonymous  tr( X ) = tr(an( X )) (anonymity is trace-based)  tr( X )  tr(an( X )) (  is by constr. of an( X ))   simulation from an( X ) to X (soundness theorem!) Probabilistic Probabilistically

Probabilistic (  simulation  anonymity) [IH&Kawabe,2006] Theorem  forward/backward simulation from an( X ) to X  X is anonymous Probabilistic Probabilistically Should be useful in theorem-proving anonymity This is the case in a non-deterministic setting Verification of the FOO voting protocol [Kawabe,Mano,Sakurada,Tsukada’06] Probabilistic verification example is yet to be found Currently our running example is dining cryptographers [Chaum’88]

Conclusion non-deterministic (  simulation  anonymity) [KawabeMST06] probabilistic (  simulation  anonymity) [Current work] Generic, coalgebraic theory of traces and simulations [IH,Jacobs,Sokolova] T = P  non-determinism T = D  probability

Conclusion and future work Future work Bigger verification example? Systems with both non-determinism and probability? As in [Segala&Lynch’95] Important also for anonymity applications [Palamidessi,MFPS’05] Suitable coalgebraic framework is missing Weaker notion of anonymity? Current “anonymity” notion is pretty strong “Simulation-based” method also for weaker notions? For you to take home: Probability in anonymity Category theory in action! Thank you for your attention! Ichiro Hasuo, U. Nijmegen, NL