VIS-À-VIS CRYPTOGRAPHY : PRIVATE AND TRUSTWORTHY IN-PERSON CERTIFICATIONS IAN MIERS*, MATTHEW GREEN* CHRISTOPH U. LEHMANN †, AVIEL D. RUBIN* *Johns Hopkins.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

An Alternative to Short Lived Certificates By Vipul Goyal Department of Computer Science & Engineering Institute of Technology Banaras Hindu University.
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Claudia Diaz, Hannelore Dekeyser, Markulf Kohlweiss, Girma Nigusse K.U.Leuven IDIS Workshop 29/05/2008 [Work done in the context of the ADAPID project]
Digital Signatures and Hash Functions. Digital Signatures.
Netprog: Cryptgraphy1 Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.
Anonymous Credentials: How to show credentials without compromising privacy Melissa Chase Microsoft Research.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Introduction to Modern Cryptography, Lecture 13 Money Related Issues ($$$) and Odds and Ends.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Dan Boneh Introduction What is cryptography? Online Cryptography Course Dan Boneh.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
1 Lecture 18: Security issues specific to security key management services –privacy –integrity/authentication –nonrepudiation/plausible deniability.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
Chapter 10: Authentication Guide to Computer Network Security.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
Information Security for Managers (Master MIS)
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Bitcoin (what, why and how?)
Chapter 4: Intermediate Protocols
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
Slide 1 © 2004 Reactivity The Gap Between Reliability and Security Eric Gravengaard Reactivity.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks S. Creese, M. Goldsmith, J. Nurse, E.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices (Part B)
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1. ◦ Intro ◦ Online shopping vs MOTO ◦ Credit card payments vs PayPal ◦ E-cash? 2.
Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Digital Signatures and Digital Certificates Monil Adhikari.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
 5.1 Zero-Knowledge Proofs  5.2 Zero-Knowledge Proofs of Identity  5.3 Identity-Based Public-Key Cryptography  5.4 Oblivious Transfer  5.5 Oblivious.
Electronic Banking & Security Electronic Banking & Security.
Authorized But Anonymous: Taking Charge of Your Personal Data Anna Lysyanskaya Brown University.
Key management issues in PGP
Identity on the Internet
Computer Communication & Networks
Information Security message M one-way hash fingerprint f = H(M)
Digital Signatures A digital signature is a protocol that produces the same effect as a real signature: It is a mark that only the sender can make but.
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Shopping experience! Is it safe to pay online? Ian Ramsey
OTR AKE Protocol.
Information Security message M one-way hash fingerprint f = H(M)
Privacy for Public Transportation
Protocol ap1.0: Alice says “I am Alice”
Re(AC)t Reputation and Anonymous Credentials for Access Control (t=2)
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

VIS-À-VIS CRYPTOGRAPHY : PRIVATE AND TRUSTWORTHY IN-PERSON CERTIFICATIONS IAN MIERS*, MATTHEW GREEN* CHRISTOPH U. LEHMANN †, AVIEL D. RUBIN* *Johns Hopkins University Department of Computer Science † Johns Hopkins University School of Medicine

A COMPELLING CASE FOR PRIVACY AND SECURITY STIs raise serious privacy concerns Something people actual use technology for now Something people will not share on Facebook Strong incentives exist to cheat. Fake a negative test to get sex Fake a positive test to get revenge

STI NOTIFICATION Traditionally done In person, by phone, or mail By a public health investigator Impractical because of Number of chlamydia and gonorrhea cases Reporting honesty Anonymous encounters arranged online

IN SPOT The First Online STD Partner Notification System Using Electronic Postcards 30k notifications sent between 2004 and 2008

inSPOT ISSUES Privacy Sensitive information Sexual Orientation Sexual Partners STI Status Disclosure risks inSPOT’s server compromise Mail provider / account compromise Targeted Advertising Security Play a joke on a friend Harass former sexual partner

STI CERTIFICATION Trust me Ask them Check profile on some dating site Somewhat verified qpid.me Bring test results with you

TruSTI A protocol for STI status certification and exposure notification using mobile devices

SECURITY GOALS Unforgeability Alice cannot convince Bob she has a positive or negative STI unless she has such a result from the clinic Deniability No one can convince a third party of someone’s STI result or even that the interaction took place Reciprocal anonymity Running these protocols should decrease Alice or Bob’s anonymity no more than the an in person meeting

STANDARD APPROACHES FAIL Digital Certificate Not anonymous not deniable Physical ID Card Counterfeitable Revocation is logistically problematic

ANONYMOUS CREDENTIALS FAIL Present third party signed messages anonymously Impose a tax on transfer via: All or nothing “non-transferability” PKI assured non-transferability Real non-transferability implies cryptographic proof an encounter took place Does not work for notification

OUR APPROACH Sign STI Status + Photo Use clinics and testing labs as trusted authorities Already exists and is trusted with sensitive data Already regulated by HIPAA Use a deniable construction for showing status and photo

Objects in this mockup may be prettier than they appear in the actual product UI MOCKUP

One foot down the rabbit hole CRYPTOGRAPHIC BACKGROUND

NON INTERACTIVE ZERO KNOWLEDGE PROOFS A proof of knowledge of values satisfying an equation that does not reveal those values:

SIGNATURES WITH EFFICIENT PROTOCOLS Standard digital signature scheme with one additional feature: Users can prove they have a signed message without revealing the signature

COMMITMENTS Allow you to commit and later reveal a value Csetup: generates parameters Commit: commits to a value Decommit: reveal the value

THE TECHNIQUE Alice wants to prove to Bob she has a negative STI test. They both have the app and are enrolled in the system Alice gives Bob a NIZKPoK that either She knows a number Bob committed to OR She has a signature on her STI status and photo from the clinic.

CERTIFY PROTOCOL Bob Commits to a nonce n Alice commits to π Bob reveals n Alice reveals π

PROGRESS/ FUTURE WORK Complete Application Mark users as exposed Propagating notifications Compute exposure risk for users

Alt-text:Yet one more reason I'm barred from speaking at crypto conferences QUESTIONS? Randal Monroe xkcd.com/177