Lecturer: Moni Naor Foundations of Privacy Formal Lecture Zero-Knowledge and Deniable Authentication.

Slides:



Advertisements
Similar presentations
Secure Multiparty Computations on Bitcoin
Advertisements

Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Simulatability “The enemy knows the system”, Claude Shannon CompSci Instructor: Ashwin Machanavajjhala 1Lecture 6 : Fall 12.
Rennes, 24/10/2014 Cristina Onete CIDRE/ INRIA Sigma Protocols and (Non-Interactive) Zero Knowledge.
CIS 5371 Cryptography 3b. Pseudorandomness.
Tight Bounds for Unconditional Authentication Protocols in the Moni Naor Gil Segev Adam Smith Weizmann Institute of Science Israel Modeland Shared KeyManual.
Digital Signatures and Hash Functions. Digital Signatures.
Foundations of Cryptography Lecture 5 Lecturer: Moni Naor.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Foundations of Cryptography Lecture 13 Lecturer: Moni Naor.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
NON-MALLEABLE EXTRACTORS AND SYMMETRIC KEY CRYPTOGRAPHY FROM WEAK SECRETS Yevgeniy Dodis and Daniel Wichs (NYU) STOC 2009.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
CS426Fall 2010/Lecture 351 Computer Security CS 426 Lecture 35 Commitment & Zero Knowledge Proofs.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Foundations of Cryptography Lecture 14: Malleability, Chosen Ciphertext Attacks, Cramer-Shoup Cryptosystem Lecturer: Moni Naor.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
Proactive Secure Mobile Digital Signatures Work in progress. Ivan Damgård and Gert Læssøe Mikkelsen University of Aarhus.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Lecturer: Moni Naor Foundations of Cryptography Lecture 4: One-time Signatures, UOWHFs.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
Topics in Cryptography Lecture 6 Topic: Chosen Ciphertext Security Lecturer: Moni Naor.
Foundations of Cryptography Lecture 13: Zero-Knowledge Variants and Applications Lecturer: Moni Naor.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Lecturer: Moni Naor Foundations of Cryptography Lecture 12: Commitment and Zero-Knowledge.
1 Zaps and Apps Cynthia Dwork Microsoft Research Moni Naor Weizmann Institute of Science.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Optimistic Synchronous Multi-Party Contract Signing N. Asokan, Baum-Waidner, M. Schunter, M. Waidner Presented By Uday Nayak Advisor: Chris Lynch.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
1 CIS 5371 Cryptography 9. Data Integrity Techniques.
1 Deniable Ring Authentication Moni Naor Weizmann Institute of Science.
Cryptography and Complexity at the Weizmann Institute
Cramer-Shoup is Plaintext Aware in the Standard Model Alexander W. Dent Information Security Group Royal Holloway, University of London.
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
A Cryptography Tutorial Jim Xu College of Computing Georgia Tech
Adaptively Secure Broadcast, Revisited
8. Data Integrity Techniques
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Privacy and trust in social network
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Chapter 4: Intermediate Protocols
Secure Computation (Lecture 7-8) Arpita Patra. Recap >> (n,t)-Secret Sharing (Sharing/Reconstruction) > Shamir Sharing > Lagrange’s Interpolation for.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Fall 2004/Lecture 201 Cryptography CS 555 Lecture 20-b Zero-Knowledge Proof.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Foundations of Cryptography Lecture 6 Lecturer: Moni Naor.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Digital Signatures, Message Digest and Authentication Week-9.
Lecture 2: Introduction to Cryptography
Zero-knowledge proof protocols 1 CHAPTER 12: Zero-knowledge proof protocols One of the most important, and at the same time very counterintuitive, primitives.
Privacy vs. Utility Xintao Wu University of North Carolina at Charlotte Nov 10, 2008.
Prepared by Dr. Lamiaa Elshenawy
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Differential Privacy Xintao Wu Oct 31, Sanitization approaches Input perturbation –Add noise to data –Generalize data Summary statistics –Means,
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Cryptography Lecture 12.
Cryptography Lecture 10.
Security through Encryption
Cryptography Lecture 9.
Cryptography Lecture 11.
Presentation transcript:

Lecturer: Moni Naor Foundations of Privacy Formal Lecture Zero-Knowledge and Deniable Authentication

Giving talks Advice on giving Academic Talks Giving an Academic Talk by Jonathan Shewchuk Oral Presentation Advice by Mark D. Hill Pointers on giving a talk by David Messerschmitt How to give a good talk by Hany Farid Giving Talks by Tom Cormen

Authentication and Non-Repudiation Key idea of modern cryptography [Diffie-Hellman]: can make authentication (signatures) transferable to third party - Non-repudiation. –Essential to contract signing, e-commerce… Digital Signatures: last 25 years major effort in –Research Notions of security Computationally efficient constructions –Technology, Infrastructure (PKI), Commerce, Legal

Is non-repudiation always desirable ? Not necessarily so: Privacy of conversation, no ( verifiable ) record. –Do you want everything you ever said to be held against you? If Bob pays for the authentication, shouldn't be able to transfer it for free Perhaps can gain efficiency Alternative: (Plausible) Deniability If the recipient (or any recipient) could have generated the conversation himself or an indistinguishable one

Deniable Authentication Setting: Sender has a public key known to receiver Want to an authentication scheme such that the receiver keeps no receipt of conversation. This means: Any receiver could have generated the conversation itself. –There is a simulator that for any message m and verifier V* generates an indistinguishable conversation. –Exactly as in Zero-Knowledge! –An example where zero-knowledge is the ends, not the means ! Proof of security consists of Unforgeability and Deniability

Encryption Assume a public key encryption scheme E Public key P k – knowing P k can encrypt message m –Compute Y=E(P k, m) With corresponding secret key P s, given y can retrieve m m=D(P s, E(P k, m)) Process is probabilistic : to actually encrypt choose random string  and compute Y=E(P K, x,  ). Plaintext ciphertext

Deniable Authentication Completeness for any good sender and receiver possible to complete the authentication on any message Unforgeability Existential unforgeable against adaptive chosen message attack –Adversary can ask to authenticate any sequence m 1, m 2, … –Has to succeed in making V accept a message m not previously authenticated –Has complete control over the channels Deniability –For any(?) verifier, there is simulator that can generate computationally indistinguishable conversations.

Interactive Authentication P wants to convince V that he is approving message m P has a public key P k and a secret key P s of encryption scheme E. To authenticate a message m: V  P : Choose x 2 R {0,1} n. Send c=E(P K, m ° x) P  V : Receiving c Decrypt c using P s Verify that prefix of plaintext is m. If yes - send x. V is satisfied if he receives the same x he chose

Is it Safe? Want: Existential unforgeability against adaptive chosen message attack –Adversary can ask to authenticate any sequence m 1, m 2, … –Has to succeed in making V accept a message m not authenticated –Has complete control over the channels Intuition of security: if E does not leak information about plaintext –Nothing is leaked about x Unforgeability: depends on the strength of E Sensitive to malleability : –if given E(P K, m  x,  ) can generate E(P K, m’  x’,  ’) where m’ is related to m and x’ is related to x then can forge.

Security of the scheme Unforgeability: depends on the strength of E Sensitive to malleability : –if given E(P K, m  r,  ) can generate E(P K, m’  r’,  ’) w here m’ is related to m and r’ is related to x then can forge. The protocol allows a chosen ciphertext attack on E. –Even of the post-processing kind! Can prove that any strategy for existential forgery can be translated into a CCA strategy on E Works even against concurrent executions. Deniability: does V retain a receipt?? –It does not retain one for an honest V –Need to prove knowledge of r There are encryption schemes satisfying the desired requirements

No receipts Can the verifier convince third party that the prover approved a certain message?

Simulator for honest receiver Choose x  R {0,1} n. Output: h Y=E(P K, m  x,  ), x,  i Has exactly the same distribution as a real conversation when the verifier is following the protocol Statistical indistinguishability Verifier might cheat by checking whether certain ciphertext have as a prefix m No known concrete way of doing harm this way

Commitment Schemes – Hiding: A computationally bounded receiver learns nothing about X. – Binding: s can only be “opened” to the value X. Receiver Sender Commit Phase Sender Receiver X s Reveal Phase v X X Reveal Verification Algorithm s, v, X yes/no

Encryption as Commitment When the public key P K is fixed and known Y=E(P K, x,  ) can be seen as commitment to x To open x: reveal , the random bits used to create Y Perfect binding: from unique decryption For any Y there are no two different x and x’ and  and  ’ s.t. Y=E(P K, x,  ) =E(P K, x’,  ’) Secrecy: no information about x is leaked to those not knowing private key P S

Deniable Protocol P has a public key P K of an encryption scheme E. To authenticate message m : V  P : Choose x  R {0,1} n. Send Y=E(P K, m  x,  ) P  V : Decrypt Y=E(P K j, m  x,  ), Send E(P K, x,  ) V  P : Send x and  - opening Y=E(P K, m  x,  ) P  V : Verify consistency and open E(P K, x,  ) by sending . P commits to the value x. Does not reveal it yet

Security of the scheme Unforgeability: as before - depends on the strength of E can simulate previous scheme (with access to D(P K,. )) Important property: E(P K, x,  ) is a non-malleable commitment (wrt the encryption) to x. Deniability: can run simulator: Extract x by running with E(P K, garbage,  ) and rewinding –Expected polynomial time Need the semantic security of E - acts as a commitment scheme In Step 2. Instead of E(P K, x,  )

Complexity of the scheme Sender: single decryption, single encryption and singe encryption verification Receiver: same Communication Complexity: O(1) public-key encryptions

Ring Signatures and Authentication Want to keep the sender anonymous by proving that the signer is a member of an ad hoc set –Other members do not cooperate –Use their `regular’ public-keys –Should be indistinguishable which member of the set is actually doing the authentication Bob Alice? Eve

Ring Authentication Setting A ring is an arbitrary set of participants including the authenticator Each member i of the ring has a public encryption key P K i –Only i knows the corresponding secret key P S i To run a ring authentication protocol both sides need to know P K 1, P K 2, …, P K n the public keys of the ring members...

Deniable Ring Authentication Completeness for any good sender and receiver possible to complete the authentication on any message Unforgeability Existential unforgeable against adaptive chosen message attack Deniability –For any verifier, for any arbitrary set of keys, some good some bad, there is simulator that can generate computationally indistinguishable conversations. Source Hiding : –For any verifier, for any arbitrary set of keys, some good some bad, the source is computationally indistinguishable among the good keys Source Hiding and Deniability – incomparable

An almost Good Ring Authentication Protocol Ring has public keys P K 1, P K 2, …, P K n of encryption scheme E To authenticate message m with jth decryption key P S j : V  P : Choose x  {0,1} n. Send E(P K 1, m  x,  1 ), E(P K 2, m  x,  2 ), …, E(P K n, m  x,  n ) P  V : Decrypt E(P K j, m  x,  j ), using P S j and Send E(P K 1, x,  1 ), E(P K 2, x,  2 ), …, E(P K n, x,  n ) V  P : open all the E(P K i, m  x,  i )’s by Send x and  1,  2,…,  n P  V : Verify consistency and open all E(P K i, x,  i ) by Send x and  1,  2,…  n Problem: what if not all suffixes ( x ‘s) are equal And the adversary knows one the keys!

The Ring Authentication Protocol Ring has public keys P K 1, P K 2, …, P K n of encryption scheme E To authenticate message m with jth decryption key P S j : V  P : Choose x  {0,1} n. Send E(P K 1, m  x,  1 ), E(P K 2, m  x,  2 ), …, E(P K n, m  x,  n ) P  V : Decrypt E(P K j, m  x,  j ), using P S j and Send E(P K 1, x 1,  1 ), E(P K 2, x 2,  2 ), …, E(P K n, x n,  n ) Where x=x 1 +x 2 +  x n V  P : open all the E(P K j, m  x,  j )’s, by Send x and  1,  2,…,  n P  V : Verify consistency and open all E(P K i, x,  i ) by Send x 1, x 2, …, x n and  1,  2,…  n

Complexity of the scheme Sender: single decryption, n encryptions and n encryption verifications Receiver: n encryptions and n encryption verifications Communication Complexity: O(n) public-key encryptions

Security of the scheme Unforgeability: as before (assuming all keys are well chosen) since E(P K 1, x 1, t 1 ), E(P K 2, x 2, t 2 ),…,E(P K 1, x n, t n ) where x=x 1 +x 2 +  x n is a non-malleable commitment to x Source Hiding: which key was used (among well chosen keys) is –Computationally indistinguishable during protocol –Statistically indistinguishable after protocol If ends successfully Deniability: Can run simulator `as before’

Properties of the Scheme Works with any good encryption scheme - members of the ring are unwilling participants. Fairly efficient scheme: –Need n encryptions n verifications and one decryption Can extend the scheme so that convince a verifier that At least k members confirm the message.

Extended Protocol Ring has public keys P K 1, P K 2, …, P K n of encryption scheme E To authenticate message m with subset T of decryption keys: : To authenticate message m with subset T of decryption keys: V  P : Choose r  {0,1} n. and split into shares x 1, x 2, … x n Send E(P K 1, m  x 1, r 1 ), E(P K 2, m  x 2, r 2 ), …, E(P K 1, m  x n, r n ) P  V : For each j  T decrypt E(P K j, m  x j, r j ) using P S j and reconstruct r Send E(P K 1, x’ 1,  1 ), E(P K 2, x’ 2,  2 ), …, E(P K n, x’ n,  n ) Where r=x’ 1 +x’ 2 +  x’ n V  P : open all the E(P K i, m  x j, r i ) by Send x 1, x 2, … x n and r 1, r 2,… r n P  V : Verify consistency and open all E(P K i, x, t i ) by Send t 1, t 2,… t n and x’ 1, x’ 2,…, x’ n

Ring Signatures [RST] Rivest, Shamir and Tauman proposed Ring Signatures: Signature on message m by a member of an ad hoc set of participants –Using existing Infrastructure for signatures For a generated signature the source is (statistically) indistinguishable Non-repudiation - recipient can convince a third party of the authenticity of a signature Non-interactive - single round Efficient - if underlying signature is low exponent RSA/Rabin –Need Ideal Cipher for combining function

What are the social implications of the existence of ring authentication and signatures?

Related Notions Deniability and anonymity can have many meanings…, long history in Crypto Deniable Encryption Undeniable signatures –Chameleon signatures (Krawczyk and Rabin 98). Group signatures The signature is intended for ultimate adjudication by a third party (judge). –Not deniable if secret keys are revealed! Designated verifier proofs

Coming Lectures Randomized Response – Stanley L. Warner, Randomized Response: A Survey Technique for Eliminating Evasive Answer Bias,Randomized Response: A Survey Technique for Eliminating Evasive Answer Bias – Moran and Naor, Polling with Physical Envelopes: A Rigorous Analysis of a Human- Centric Protocol,Polling with Physical Envelopes: A Rigorous Analysis of a Human- Centric Protocol More Randomized Response – Evfimievski, Gehrke, and Srikant. Limiting Privacy Breaches in Privacy Preserving Data Mining. (PODS 2003).Limiting Privacy Breaches in Privacy Preserving Data Mining. – Nina Mishra and Mark Sandler, Privacy via Pseudorandom Sketches, PODS 2006Privacy via Pseudorandom Sketches K- Anonymity and Linkability – Latanya Sweeney. k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5), 2002; k-anonymity: a model for protecting privacy – A. Narayanan, V. Shmatikov. How To Break Anonymity of the Netflix Prize Dataset. How To Break Anonymity of the Netflix Prize Dataset – Machanavajjhala, Gehrke, Kifer, and M. Venkitasubramaniam, L-diversity: Privacy beyond k-anonymity. In Proc. 22nd Int Conf. Data Eng. (ICDE), page 24, 2006.L-diversity: Privacy beyond k-anonymity – Ninghui Li, Tiancheng Li, Suresh Venkatasubramanian. t-closeness: Privacy Beyond k- Anonymity and l-Diversity ICDE 2007.t-closeness: Privacy Beyond k- Anonymity and l-Diversity Auditing – J. Kleinberg, C. Papadimitriou, P. Raghavan, Auditing Boolean Attributes, PODS 2000.Auditing Boolean Attributes – Krishnaram Kenthapadi, Nina Mishra, Kobbi Nissim, Simulatable Auditing, PODS 2005.Simulatable Auditing

Coming Lectures – Irit Dinur and Kobbi Nissim, Revealing information while preserving privacy. PODS, 2003.Revealing information while preserving privacy. – Cynthia Dwork, Frank McSherry and Kunal Talwar, The price of privacy and the limits of LP decoding. STOC 2007,The price of privacy and the limits of LP decoding Differntial Privacy – Cynthia Dwork, Frank McSherry, Kobbi Nissim and Adam Smith: Calibrating Noise to Sensitivity in Private Data Analysis. TCC 2006,Calibrating Noise to Sensitivity in Private Data Analysis – A. Blum, C. Dwork, F. McSherry, and K. Nissim, Practical Privacy: The SuLQ Framework, PODS, 2005.Practical Privacy: The SuLQ Framework Contingency Tables – Boaz Barak, Kamalika Chaudhuri, Cynthia Dwork, Satyen Kale, Frank McSherry and Kunal Talwar, Privacy, accuracy, and consistency too: a holistic solution to contingency table release. PODS 2007: Privacy, accuracy, and consistency too: a holistic solution to contingency table release. – Lars Backstrom, Cynthia Dwork and Jon M. Kleinberg: Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography. WWW 2007Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography Application of Differential Privacy – Kunal Talwar and Frank McSherry, Mechanism Design via Differential Privacy. FOCS, 2007.Mechanism Design via Differential Privacy – Kobbi Nissim, Sofya Raskhodnikova and Adam Smith. Smooth Sensitivity and Sampling in Private Data Analysis, STOC 2007,Smooth Sensitivity and Sampling in Private Data Analysis

Extras Fuzzy Extractors RFIDs, –Yossi Oren and Adi Shamir, Power Analysis of RFID TagsPower Analysis of RFID Tags –Stephen A. Weis Security of HB+Security of HB+ Face\Vision Crowd –Enabling Video Privacy through Computer VisionEnabling Video Privacy through Computer Vision –E. Newton, L. Sweeney, and B. Malin. Preserving Privacy by De- identifying Facial ImagesPreserving Privacy by De- identifying Facial Images