1 Redactable Signatures with Dependencies and Personal Health Records Presented by David Bauer.

Slides:



Advertisements
Similar presentations
Hash Function. What are hash functions? Just a method of compressing strings – E.g., H : {0,1}*  {0,1} 160 – Input is called “message”, output is “digest”
Advertisements

1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
CSE3201/CSE4500 Information Retrieval Systems
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Chap 3: Key exchange protocols In most systems, we distinguish the short term keys from the long term ones: –A short term key (session key) is used to.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Quick Review of material covered Apr 8 B+-Tree Overview and some definitions –balanced tree –multi-level –reorganizes itself on insertion and deletion.
DSAC (Digital Signature Aggregation and Chaining) Digital Signature Aggregation & Chaining An approach to ensure integrity of outsourced databases.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
DSAC (Digital Signature Aggregation and Chaining) Digital Signature Aggregation & Chaining An approach to ensure integrity of outsourced databases.
Archive Time-Stamps-Syntax Dr. Ulrich Pordesch
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Organization  Introduction to Network Coding  Practical Network Coding  Secure Network Coding  Structured File Sharing  Conclusion.
1 B Trees - Motivation Recall our discussion on AVL-trees –The maximum height of an AVL-tree with n-nodes is log 2 (n) since the branching factor (degree,
CSE3201/CSE4500 Information Retrieval Systems Signature Based Text Retrieval Systems.
[0][1][2][3][4][5][6][7][8][9] Bing David Ina Abhinav Erik Hyun Jim Fiona Gheeta Chelsea I can easily loop through all the student records by using a.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
NoSQL Databases NoSQL Concepts SoftUni Team Technical Trainers Software University
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Foundations of Cryptography Lecture 6 Lecturer: Moni Naor.
sec1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: TGa_Proposal_Antonio_Izquierdo (Protecting the Information Service.
Cryptography and Network Security (CS435) Part One (Introduction)
Reputation Based Trust The using of reputation to accomplish trust between users on the Internet M.Vološin, R.Gore, Ibe2roč. PF UPJŠ, Košice, Slovakia.
Hashing Sections 10.2 – 10.3 CS 302 Dr. George Bebis.
1 5. Abstract Data Structures & Algorithms 5.2 Static Data Structures.
Lecture 2: Introduction to Cryptography
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
1 Security for distributed wireless sensor nodes Ingrid Verbauwhede Department of Electrical Engineering University of California Los Angeles
Marwan Al-Namari Hassan Al-Mathami. Indexing What is Indexing? Indexing is a mechanisms. Why we need to use Indexing? We used indexing to speed up access.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
Hashing 1 Hashing. Hashing 2 Hashing … * Again, a (dynamic) set of elements in which we do ‘search’, ‘insert’, and ‘delete’ n Linear ones: lists, stacks,
Hash Functions Ramki Thurimella. 2 What is a hash function? Also known as message digest or fingerprint Compression: A function that maps arbitrarily.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
Making a great Project 2 OCR 1994/2360. Implementation This is about how you make your system. It should have enough detail for a competent user to be.
Jonathan Katz University of Maryland Andrew Lindell Aladdin Knowledge Systems and Bar-Ilan University 04/08/08 CRYP-108 Aggregate Message- Authentication.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
Jordan Brown & Douglas M.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
Chapter 29: Program Security Dr. Wayne Summers Department of Computer Science Columbus State University
Big Data Security Issues in Cloud Management. BDWG Big Data Working Group Researchers 1: Data analytics for security 2: Privacy preserving 3: Big data-scale.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Compilers and Security
On the (im)possibility of perennial message recognition protocols without public-key cryptography Peeter Laud Cybernetica AS & University of Tartu
Indexing and hashing.
Cryptographic hash functions
Chapter 5: The Art of Ensuring Integrity
Hash-Based Signatures
Instructor Materials Chapter 5: The Art of Ensuring Integrity
The TESLA Broadcast Authentication Protocol CS 218 Fall 2017
Sorting.
Session #, Speaker Name Indexing Chapter 8 11/19/2018.
Data Integrity: Applications of Cryptographic Hash Functions
Instructor Materials Chapter 5: The Art of Ensuring Integrity
Blockchain Principles
Chapter 29: Program Security
Appropriate Access InCommon Identity Assurance Profiles
Can prove each piece of data individually, or to prove the existence of the complete database [data 1, data 2, data 3]
Hashing.
Computer Security Protection in general purpose Operating Systems
Instructor Materials Chapter 5: Ensuring Integrity
Property Control Asset Forms
Presentation transcript:

1 Redactable Signatures with Dependencies and Personal Health Records Presented by David Bauer

2 Background Personal health records –Under patient’s control Redactable signature –Signature such that parts of the signed document can be hidden and the signature still verified Sign medical records with a redactable signature –Patient can show relevant parts of records –Parts of records can be efficiently verified

3 Verified Database IdentifierMeta Data Data ……… … ………… ………… ………… ………… Table View

4 Verified Database Data Metadata Data Metadata Cloud View

5 Verified Database Data Metadata Data Metadata Cloud View Hash Tree

6 Dependencies Between Claims Claims can be related in many ways We may not want some claims released without supporting data or metadata –Medical x-ray needs meta-data –Medical diagnosis needs test results Policies for release may be complicated –Release A if also releasing B or C or a combination of D and E

7 We can enforce disclosure dependencies cryptographically (And we must, because we can’t trust whoever is distributing the information to voluntarily follow the record producer’s policies.)

8 Dependency Graph “1” cannot be released without also release one of “2” or “3” along with one of “4” or “5” Release policy is a graph –Each claim is a node –Each AND/OR is a node –No limit on fan-out or fan-in May have many top-level and bottom-level nodes Bottom (leaf) nodes are stored directly in the hash tree –Other nodes are not

9 How to enforce policy Create chains of hash values –Think hash-tree or Merkle-Damgård –Chains overlap, creating a directed graph –Any directed-acyclic graph is acceptable A node contains –An operation (e.g., AND) or a claim –The hashes of nodes dependent on this node

10 What does a node look like? Consider z → x or y S(x) is called the string for node x S(x) = H(S(z) + x) –H is a hash function –“+” is concatenation –x is the actual data –S(z) is the string for node z S(y) = H(S(z) + y) S(z) = z

11 Notice: no actual OR node! (They do exist in the program code, though)

12 AND Nodes OR Nodes disappear; AND nodes don’t AND nodes require secret sharing Consider z → x and y Generate random string A1 S(AND) = H(S(z) + A1) A2 = S(AND) xor A1 S(x) = H(A1 + x) S(y) = H(A2 + y)

13 Example Graph S(1) = 1 A1 = random string S(AND) = H(S(1) + A1) A2 = S(AND) xor A1 S(2) = H(A1 + 2) S(3) = H(A1 + 3) S(4) = H(A2 + 4) S(5) = H(A2 + 5)

14 Example – Show 1, 2, and 4 Start with S(2) and S(4) –On list of leaf nodes S(2) = H(A1 + 2) S(4) = H(A2 + 4) Show A1, A2, 2, and 4 –Can verify S(2), S(4) S(AND) = A1 xor A2 S(AND) = H(S(1) + A1) Show S(1) = 1 –Can verify S(AND)

15 Extra Technical Notes For the security proof: –Nodes must be unambiguous in type –Nodes must have random padding –Nodes must be unambiguously parseable –The “random” values used in AND nodes have some restrictions –The hash function used must have additional properties (the most popular ones work) –Threat model is unusual

16 Performance Intro Two implementations were made Monolithic graph –Minimizes memory, initial computation –Good overall performance Multi-graph approach –Pre-computes each chain –Much faster for some parameters –Much worse in worst-case

17 Performance: Graph Description The graph of dependencies is based on a table, with each element in the first column depending on also showing at least one element from each of the other columns. (A second, denser form where each column depended upon the following column was also tested, but not shown here.)

18 Performance Input Table SizeMonolithic GraphMulti-Graph RowsColumnsData sizeVerify chainVerify allVerify chainVerify all Small inputs Medium inputs , , , ,00019,0001,200, ,00074,00077,0005,000,000 All times in microseconds

19 Advantages in a PHR Patients retain control of their records –Gives patients more reason to store their own records –Allows patients to better use their records –Patients determine what is released Medical personnel can trust patient- provided records –Cryptographically signed by producer –Contains context as set by producer

20 Questions?