TATA: Towards Anonymous Trusted Authentication May 2006 Daniele Quercia, Stephen Hailes, Licia Capra. CS department University College London

Slides:



Advertisements
Similar presentations
A PPARC funded project Single Sign-On Proposal Guy Rixon IVOA Interoperability Meeting Cambridge MA, May 2004.
Advertisements

E W H A W U New Nominative Proxy Signature Scheme for Mobile Communication April Seo, Seung-Hyun Dept. of Computer Science and.
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13
DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13 DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13 Digital Signatures Authentication.
Anonymity without Sacrificing Performance Enhanced Nymble System with Distributed Architecture CS 858 Project Presentation Omid Ardakanian * Nam Pham *
Securing Critical Unattended Systems with Identity Based Cryptography A Case Study Johannes Blömer, Peter Günther University of Paderborn Volker Krummel.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
A Pairing-Based Blind Signature
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Claudia Diaz, Hannelore Dekeyser, Markulf Kohlweiss, Girma Nigusse K.U.Leuven IDIS Workshop 29/05/2008 [Work done in the context of the ADAPID project]
Risk Aware Decision Framework for Trusted Mobile Interactions September 2005 Daniele Quercia and Stephen Hailes CS department University College London.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
AAI and universities Roles and functions. The Smart Card Architect Objectives zBuild a secure Authentication and Authorization Infrastructure between.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
Apr 9, 2002Mårten Trolin1 Previous lecture TLS details –Phases Handshake Securing messages –What the messages contain –Authentication The second assignment.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Sec final project A Preposition Secret Sharing Scheme for Message Authentication in Broadcast Networks 王怡君.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
A Server-aided Signature Scheme Based on Secret Sharing for Mobile Commerce Source: Journal of Computers, Vol.19, No.1, April 2008 Author: Chin-Ling Chen,
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
1 電子商務代理人與無線射頻系統上安全設計之研究 The Study of Secure Schemes on Agent-based Electronic Commerce Transaction and RFID system 指導教授 : 詹進科 教授 (Prof. Jinn-Ke Jan) 陳育毅.
Key Distribution CS 470 Introduction to Applied Cryptography
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Brian Padalino Sammy Lin Arnold Perez Helen Chen
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Signature Based and Anomaly Based Network Intrusion Detection
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Inter-Context Trust Bootstrapping for Mobile Content Sharing (daniele quercia) (stephen hailes & licia capra) U C LU C L.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
SecureMR: A Service Integrity Assurance Framework for MapReduce Author: Wei Wei, Juan Du, Ting Yu, Xiaohui Gu Source: Annual Computer Security Applications.
Implementing e-Auctions with Sharemind Md. Sadek Ferdous 12th November 2008.
Research at MSEC Vincent Naessens – Jorn Lapon – Jan Vossaert – Koen Decroix – Faysal Boukayoua – Laurens Lemaire.
PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN.
Rennes, 23/10/2014 Cristina Onete Graded Exercises & Authentication.
Topic 22: Digital Schemes (2)
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
6. Esoteric Protocols secure elections and multi-party computation Kim Hyoung-Shick.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Anonymous Digital Cash  Ashok Reddy  Madhu Tera  Laxminarayan Muktinutalapati (Lux)  Venkat Nagireddy.
NFD Tunnel Authentication Junxiao Shi,
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic.
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
Electronic Voting R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks..
Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,
Electronic Payment Systems Presented by Rufus Knight Veronica Ogle Chris Sullivan As eCommerce grows, so does our need to understand current methods of.
Integrating Identity based Cryptosystem (IBC) with CGA in Mobile IPv6 draft-cao-mipshop-ibc-cga-00.txt Zhen Cao Hui Deng IETF #67.
Fall 2006CS 395: Computer Security1 Key Management.
Key Management and Distribution Anand Seetharam CST 312.
STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions April 2006 Daniele Quercia, Manish Lad, Stephen Hailes, Licia Capra, and Saleem.
Threshold password authentication against guessing attacks in Ad hoc networks Authors: Zhenchuan Chai, Zhenfu Cao, Rongxing Lu Sources: Ad Hoc Networks,
MOTET: Mobile Transactions using Electronic Tickets September 2005 Daniele Quercia and Stephen Hailes CS department University College London
多媒體網路安全實驗室 A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for mobile Networks 作者 :Zhiguo Wan,Kui Ren,Bart.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Presented by Edith Ngai MPhil Term 3 Presentation
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
CS580 Internet Security Protocols
Presentation transcript:

TATA: Towards Anonymous Trusted Authentication May 2006 Daniele Quercia, Stephen Hailes, Licia Capra. CS department University College London iTrust 2006

Daniele Quercia iTrust 2006 TATA: Towards Anonymous Trusted Authentication 2 Outline How to avoid those attacks Authentication attacks Authentication supporting distributed trust management Help: Blind threshold signature Proposal: 2-protocol scheme How the scheme avoids the attacks

Daniele Quercia3 Authentication supporting distributed trust management Persistent IDs support cooperation A class of applications needs anonymous IDs Disposable and named IDs create attacks iTrust 2006 TATA: Towards Anonymous Trusted Authentication

Daniele Quercia4 Authentication attacks: General Privacy Breaching (interaction-realID associations) False Accusation Stolen pseudonyms (Mask) TATA: Towards Anonymous Trusted Authentication iTrust 2006

Daniele Quercia5 Authentication attacks: Sybil-like Against individuals Collusion for ballot-stuffing Collusion for bad mouthing Against groups Insider Outsider TATA: Towards Anonymous Trusted Authentication iTrust 2006

Daniele Quercia6 How to avoid those attacks AttackHow to avoid it Privacy BreachingAnonymous pseudonyms False accusationPublic keys as pseudonyms Stolen pseudonymsRevocation Sybil-likeUnique pseudonym TATA: Towards Anonymous Trusted Authentication iTrust 2006

Daniele Quercia7 Help: blind threshold signature A group of devices (at least t) sign Signature is blinded We need a protocol for certifying pseudonyms! TATA: Towards Anonymous Trusted Authentication iTrust 2006

Daniele Quercia8 Proposal: 2-protocol scheme Induction Protocol: A gets a new pseudonym (public key, signature) Authentication Protocol: A and B exchange and verify their pseudonyms TATA: Towards Anonymous Trusted Authentication iTrust 2006 reply Blinded Key Signature Group A

Daniele Quercia9 How the scheme avoids those attacks AttackHow … Privacy BreachingAnonymous pseudonym False accusationSigned Messages Stolen pseudonymsReveal & Run induction again Sybil-likeCertified Pseudonym TATA: Towards Anonymous Trusted Authentication iTrust 2006

Daniele Quercia10 Sum up Need: Unique and anonymous pseudonyms for distributed trust management Proposal: 2-protocol scheme Limitations: Collusion (more than t devices) Weak identification TATA: Towards Anonymous Trusted Authentication iTrust 2006