Auditable Privacy: On Tamper-Evident Mix Networks Jong Youl Choi Dept. of Computer Science Indiana University at Bloomington Philippe Golle Palo Alto Research.

Slides:



Advertisements
Similar presentations
Spreading Alerts Quietly and the Subgroup Escape Problem Aleksandr Yampolskiy (Yale) Joint work with James Aspnes, Zoë Diamadi, Kristian Gjøsteen, and.
Advertisements

RPC Mixing: Making Mix-Nets Robust for Electronic Voting Ron Rivest MIT Markus Jakobsson Ari Juels RSA Laboratories.
Vote privacy: models and cryptographic underpinnings Bogdan Warinschi University of Bristol 1.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
1 Chapter 7-2 Signature Schemes. 2 Outline [1] Introduction [2] Security Requirements for Signature Schemes [3] The ElGamal Signature Scheme [4] Variants.
CSC 774 Advanced Network Security
Electronic Voting Ronald L. Rivest MIT CSAIL Norway June 14, 2004.
Efficient Zero-Knowledge Proof Systems Jens Groth University College London.
Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware Jong Youl Choi Computer Science Dept. Indiana University at Bloomington.
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle Jens Groth University College London Yuval Ishai Technion and University of California.
A. Haeberlen Having your Cake and Eating it too: Routing Security with Privacy Protections 1 HotNets-X (November 15, 2011) Alexander Gurney * Andreas Haeberlen.
Receipt-free Voting Joint work with Markus Jakobsson, C. Andy Neff Ari Juels RSA Laboratories.
Reusable Anonymous Return Channels
Yan Huang, Jonathan Katz, David Evans University of Maryland, University of Virginia Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
Problem 1 3/10/2011Practical Aspects of Modern Cryptography.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
CS426Fall 2010/Lecture 351 Computer Security CS 426 Lecture 35 Commitment & Zero Knowledge Proofs.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the orderQuestions? Review.
Privacy and Anonymity Using Mix Networks* Nitesh Saxena CS392/6813 Some slides borrowed from Philippe Golle, Markus Jacobson.
A Secure Fault-Tolerant Conference- Key Agreement Protocol Wen-Guey Tzeng Source : IEEE Transactions on computers Speaker : LIN, KENG-CHU.
Parallel Mixing Philippe Golle, PARC Ari Juels, RSA Labs.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Receipt-freeness and coercion-resistance: formal definitions and fault attacks Stéphanie Delaune / Steve Kremer / Mark D. Ryan.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
Electronic Voting Schemes and Other stuff. Requirements Only eligible voters can vote (once only) No one can tell how voter voted Publish who voted (?)
Introduction to Modern Cryptography, Lecture 7/6/07 Zero Knowledge and Applications.
UMBC Protocol Meeting 10/01/03 Universal Re-encryption: For Mix-Nets and Other Applications (to appear CT-RSA ’04) Paul Syverson NRL Markus Jakobsson Ari.
Introduction to Modern Cryptography, Lecture 9 More about Digital Signatures and Identification.
Chapter 3 Encryption Algorithms & Systems (Part C)
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
Quadratic Residuosity and Two Distinct Prime Factor ZK Protocols By Stephen Hall.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
Efficient and Robust Private Set Intersection and multiparty multivariate polynomials Dana Dachman-Soled 1, Tal Malkin 1, Mariana Raykova 1, Moti Yung.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
Chapter 4: Intermediate Protocols
Optimistic Mixing for Exit-Polls Philippe Golle, Stanford Sheng Zhong, Yale Dan Boneh, Stanford Markus Jakobsson, RSA Labs Ari Juels, RSA Labs.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
1 Lect. 13 : Public Key Encryption RSA ElGamal. 2 Shamir Rivest Adleman RSA Public Key Systems  RSA is the first public key cryptosystem  Proposed in.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Foundations of Cryptography Lecture 6 Lecturer: Moni Naor.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
An Analysis of Parallel Mixing with Attacker-Controlled Inputs Nikita Borisov formerly of UC Berkeley.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Lecture 2: Introduction to Cryptography
Privacy and Anonymity Using Mix Networks* Slides borrowed from Philippe Golle, Markus Jacobson.
Non-Interactive Verifiable Computing August 5, 2009 Bryan Parno Carnegie Mellon University Rosario Gennaro, Craig Gentry IBM Research.
Secure Conjunctive Keyword Search Over Encrypted Data Philippe Golle Jessica Staddon Palo Alto Research Center Brent Waters Princeton University.
Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware Jong Youl Choi Dept. of Computer Science Indiana University at.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
A Brief Introduction to Mix Networks Ari Juels RSA Laboratories © 2001, RSA Security Inc.
Almost Entirely Correct Mixing With Applications to Voting Philippe Golle Dan Boneh Stanford University.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
Linear Cryptanalysis of DES M. Matsui. 1.Linear Cryptanalysis Method for DES Cipher. EUROCRYPT 93, 1994.Linear Cryptanalysis Method for DES Cipher 2.The.
Cryptographic Shuffles Jens Groth University College London TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAAAAAAAAAA.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
On the (im)possibility of perennial message recognition protocols without public-key cryptography Peeter Laud Cybernetica AS & University of Tartu
Searchable Encryption in Cloud
Some slides borrowed from Philippe Golle, Markus Jacobson
Secure and Insecure Mixing
Presentation transcript:

Auditable Privacy: On Tamper-Evident Mix Networks Jong Youl Choi Dept. of Computer Science Indiana University at Bloomington Philippe Golle Palo Alto Research Center Markus Jakobsson School of Informatics Indiana University at Bloomington

Page 1 Mix Networks PublicPrivatePublic Mixing to make tracing impossible Used as a building block to protect privacy or keep something anonymous A sequence of mix servers

Page 2 What can be wrong in mix-nets Random permutation is secret Mix-server 1Mix-server 2Mix-server 3

Page 3 Possible Attacks Aims to –Leak secret permutations –Leak private keys –Leak any security-critical information Although no side channel is allowed, leaking is possible through public channel Information leak is noticeable only to designated accomplices (by using a covert-channel)

Page 4 Vulnerable Good time to launch an attack Key generation Commitment Mixing phase Verification Safe Time Safe Mix-server Observer Tamper-evident

Page 5 How to verify – Intuitive idea Cut-and-choose: 50% error rate Randomized Partial Checking [Jakobsson, Juels, and Rivest] of k batches : 1/2 k error rate

Page 6 Review: Re-encryption mix-nets Two operations in a mix server El-Gamal re-encryption is homomorphic –There exist two integers β and δ s.t. α = β + δ –Re-encryption(ReEnc) satisfies ReEnc(m, α) = ReEnc(ReEnc(m, β), δ) El-Gamal Re-encryption Permutation α1α1 α2α2 αnαn Encrypted Messages Re- encrypted and Permuted Messages π (1) π (2) π (n)

Page 7 Homomorphism El-Gamal re-encryption Encrypted Messages Re- encrypted Messages α = β + δ βδ Permutation =

Page 8 An example of a covert channel Replacing a random number generator El-Gamal Re-encryption Permutation α1α1 α2α2 αnαn Inputs Random Number Generator Outputs π (1) π (2) π (n)

Page 9 Solution overview Data flow Key Generation Mixing Phase Observer Commitment Witness Re-encrypted Message

Page 10 Permutation τ Permutation σ Key generation Conditions: α i = β i + δ i, π = τ ◦ σ Publicize a commitment α1α1 α2α2 αnαn Permutation π The same inputs The same outputs β1β1 β2β2 βnβn δ1δ1 δ2δ2 δnδn π (1) π (2) π (n) σ (1) σ (2) σ (n) τ (1) τ (2) τ (n)

Page 11 Mixing phase Output re-encrypted messages {A’ i } and witnesses {W i } Permutation τ Permutation σ β1β1 β2β2 βnβn δ1δ1 δ2δ2 δnδn W1W1 W2W2 WnWn α1α1 α2α2 αnαn Permutation π A1A1 A2A2 AnAn A’ 1 A’ 2 A’ n π (1) π (2) π (n) σ (1) σ (2) σ (n) τ (1) τ (2) τ (n)

Page 12 Interactive verification Permutation τ Permutation σ β1β1 β2β2 βnβn δ1δ1 δ2δ2 δnδn A1A1 A2A2 AnAn A’ 1 A’ 2 A’ n W1W1 W2W2 WnWn ObserverMix Server 1. Choose either 0(LEFT) or 1(RIGHT) 2. Open corresponding values and hashes of the others 3. Verify that there is no variation from the previous commitment τ (1) τ (2) τ (n) σ (1) σ (2) σ (n)

Page 13 Security improvement #1 Proof of tamper-freeness –Probability of cheating : 1/2 –Number of commitments κ  Acceptable cheating probability < 1/2 κ κ proofs

Page 14 Security improvement #2 Undercover observer –Challenges are automatically chosen from κ bits of output hash({A’ i }) –Non-interactive proof  Stealthy observation –Attackers are hard to find non-interactive observers. Thus we called undercover observers Key Generation Mixing Phase Commitment Witness

Page 15 Conclusion A covert-channel in mix networks threatens privacy New notion of security : Tamper-evidence, detecting variations from prescribed commitments Stealthy operation of non-interactive observer Or, Send me an

Page 16 Key generation Commitment : Root of a Merkle hash tree σ τ β1β1 … ρ … δ1δ1 δnδn Hash function β2β2 δ2δ2 δ n-1