Provable Unlinkability Against Traffic Analysis Amnon Ta-Shma Joint work with Ron Berman and Amos Fiat School of Computer Science, Tel-Aviv University.

Slides:



Advertisements
Similar presentations
Aaron Johnson with Joan Feigenbaum Paul Syverson
Advertisements

Provable Unlinkability Against Traffic Analysis Ron Berman Joint work with Amos Fiat and Amnon Ta-Shma School of Computer Science, Tel-Aviv University.
A Formal Analysis of Onion Routing 10/26/2007 Aaron Johnson (Yale) with Joan Feigenbaum (Yale) Paul Syverson (NRL)
Secret Sharing Protocols [Sha79,Bla79]
Circuit and Communication Complexity. Karchmer – Wigderson Games Given The communication game G f : Alice getss.t. f(x)=1 Bob getss.t. f(y)=0 Goal: Find.
Secure Multiparty Computations on Bitcoin
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Gillat Kol (IAS) joint work with Ran Raz (Weizmann + IAS) Interactive Channel Capacity.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Congestion Games with Player- Specific Payoff Functions Igal Milchtaich, Department of Mathematics, The Hebrew University of Jerusalem, 1993 Presentation.
CMSC 414 Computer (and Network) Security Lecture 4 Jonathan Katz.
Key Exchange Using Passwords and Long Keys Vladimir Kolesnikov Charles Rackoff Comp. Sci. University of Toronto.
Trust-based Anonymous Communication: Models and Routing Algorithms Aaron Johnson Paul Syverson Roger Dingledine Nick Mathewson U.S. Naval Research Laboratory.
Introduction to Modern Cryptography, Lecture 12 Secure Multi-Party Computation.
Eran Omri, Bar-Ilan University Joint work with Amos Beimel and Ilan Orlov, BGU Ilan Orlov…!??!!
Short course on quantum computing Andris Ambainis University of Latvia.
How Much Anonymity does Network Latency Leak? Paper by: Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin Presented by: Dan Czerniewski October 3, 2011.
Lecture 7 CS 728 Searchable Networks. Errata: Differences between Copying and Preferential Attachment In generative model: let p k be fraction of nodes.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
1 Modeling and Analysis of Anonymous-Communication Systems Joan Feigenbaum WITS’08; Princeton NJ; June 18, 2008 Acknowledgement:
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
Analysis of Onion Routing Presented in by Jayanthkumar Kannan On 10/8/03.
Modelling and Analysing of Security Protocol: Lecture 9 Anonymous Protocols: Theory.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Optimistic Synchronous Multi-Party Contract Signing N. Asokan, Baum-Waidner, M. Schunter, M. Waidner Presented By Uday Nayak Advisor: Chris Lynch.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Anonymous Communication Luis von Ahn Andrew Bortz Nick Hopper The Aladdin Center Carnegie Mellon University.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Preventing Active Timing Attacks in Low- Latency Anonymous Communication The 10 th Privacy Enhancing Technologies Symposium July 2010 Joan Feigenbaum Yale.
Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
Adaptively Secure Broadcast, Revisited
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
How to play ANY mental game
Provable Protocols for Unlinkability Ron Berman, Amos Fiat, Amnon Ta-Shma Tel Aviv University.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
R. Newman Anonymity - Background. Defining anonymity Defining anonymity Need for anonymity Need for anonymity Defining privacy Defining privacy Threats.
Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
Password Mistyping in Two-Factor Authenticated Key Exchange Vladimir KolesnikovCharles Rackoff Bell LabsU. Toronto ICALP 2008.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
Game-based composition for key exchange Cristina Brzuska, Marc Fischlin (University of Darmstadt) Nigel Smart, Bogdan Warinschi, Steve Williams (University.
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
Umans Complexity Theory Lectures Lecture 7b: Randomization in Communication Complexity.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Cryptography Lecture 10 Arpita Patra © Arpita Patra.
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
Lower bounds for Unconditionally Secure MPC Ivan Damgård Jesper Buus Nielsen Antigoni Polychroniadou Aarhus University.
Topic 36: Zero-Knowledge Proofs
Information Complexity Lower Bounds
Anonymous Communication
---On the ‘Vuvuzela’ Scheme
Topic 14: Random Oracle Model, Hashing Applications
Course Business I am traveling April 25-May 3rd
CMSC 414 Computer and Network Security Lecture 3
Anonymous Communication
Anonymous Communication
Anonymity – Generalizing Mixes
Presentation transcript:

Provable Unlinkability Against Traffic Analysis Amnon Ta-Shma Joint work with Ron Berman and Amos Fiat School of Computer Science, Tel-Aviv University

Problem definition M senders S={s 1 …s M } and M receivers R={r 1 …r M }. N nodes in a complete synchronous communication network. A public key infrastructure (PKI). We assume some of the links are honest, and some are dishonest. We look for a protocol such that the messages arrive at their destination, yet the adversary knows very little about the matching Π:S  R.

A very basic problem A tremendous amount of work. Many practical systems and protocols. Relevant in peer to peer data exchange. Forms a basis to many other protocols, such as electronic cash systems and voting schemes.

Chaum’s work (1979) Chaum (1979) showed that using onion- routing, one can assume the adversary is restricted to traffic analysis. Unlinkability was never proven. In fact, Chaum’s protocol is insecure. Chaum’s work is the basis for most later work.

Chaumian-MIX (1979)  Unproven security (in fact: insecure).  Requires dummy traffic. RS (1993)  Proven security.  Not efficient (all players play all time).  Requires secure computation. Many FUZZY attempts. First Attempt (1993)

Dining Cryptographers  Proven security.  Not efficient (all players must play all time).  Requires shared randomness.  Requires broadcast. Crowds  Proven (very) weak security. Busses  Proven security.  Not efficient (all players play all time). Entirely Different Attempts

Our Contribution A set of simple equivalent measures of unlinkability. A connection with Information Theory. Rigorous proof. We can extend the proof to realistic adversaries that have prior knowledge. We rely on Chaum’s ideas, but We replace FUZZY security with proven security. with proven security.

What is Unlinkability?

What is unlinkability? Π - actual permutation that took place during communication. C - information the adversary has. 0/1 matrix, with 1 indicating a communication line being used. We would like to formalize: Almost always: Π does not carry information about C.

Mutual information - I(X:Y) =H(X) + H(Y) - H(X,Y) How much info does one RV convey on another. All definitions are equivalent. What is unlinkability?

The Protocol

The Protocol (almost Chaum) Forward: Alice chooses v 1 …v t-1, v 0 =Alice, v T =Bob. Alice randomly chooses r 1 …r T return keys. Each onion layer i contains:  Address of next node en route (v i+1 ).  Return key r i saved by node i.  Unique identifier z i.  Encrypted onion part sent to v i+1.

Example Our Protocol

Chaum vs. Us 1.Chaum assumes the adversary controls all links, we assume the adversary controls only most links. 2.In Chaum, honest messages mix within a honest node (and so every vertex waits until it receives at least two messages). In our scheme, honest messages mix in honest links. 3.Chaum’s protocol is insecure, unless all honest players play all the time. Ours is secure even if honest players play only when required.

The Proof

We show the communication pattern contains many honest crossovers: And these crossovers hide enough information. 1 22’ 1’ 33’ Proof Idea

Honest Crossovers are Abundant No matter how the adversary chooses its links: Lemma [Alo01]: Let G=(V,E) be a graph and assume: then:

So what do we do with a honest crossover? We would like to: First, prove that every single player is protected. Second, prove that no information is leaked about the group behavior. The chain rule becomes handy: I(П:C)= I(П(1):C)+ I(П(2):C|П(1))+ …

Obscurant Networks Crossover Network – Each vertex has in-degree and out-degree one or two. O i – The probability distribution of output when a pebble is put on starting vertex i A network is ε-obscurant if |O i -U M |≤ε.

For a power of two: the butterfly is 0-obscurant. For other input lengths, We give a construction. B4B4 P4P4 Simple Obscurant Networks Exist.

We look for an embedding of an obscurant network

Theorem Assume our protocol runs in a network with N nodes, N(N-1)/2 communication links, some constant fraction of which are honest. Then the protocol is α(n)-unlinkable when run T≥Ω(log(N)log 2 (N/α(n)) steps.

Prior Information

The Question Does the security proof hold when the adversary has extensive, a-priori information? E.g., People like to correspond with people speaking their language… Much mail goes within organizations.. A very realistic concern.

Link each vertex v i (t) with its corresponding vertex at level T-t, and reveal all data to the adversary if either link is curious. We prove the adversary still does not get much information about the middle layer. We conclude from that the adversary does not learn much information about the permutation. We can handle even Prior Information!

We have a folding of the network: Folding And we return to the original problem with f 2 !!

Extensions and Open Questions

Extensions More realistic approach – a link is honest some of the time. Donor privacy – the ability to donate items and answer requests, without being identified.

Open Questions Incomplete network graph. Malicious behavior. Multi-shot games. Dynamic network topology changes.

The END

Example Network Proof Sketch InitRepeat t=log(M)+log(ε -1 ) times Z=4 M=5 k=M-Z=1