Hidden Access Control Policies with Hidden Credentials Keith Frikken, Mikhail Atallah, Jiangtao Li CERIAS and Department of Computer Sciences Purdue University.

Slides:



Advertisements
Similar presentations
Polylogarithmic Private Approximations and Efficient Matching
Advertisements

Mix and Match: A Simple Approach to General Secure Multiparty Computation + Markus Jakobsson Bell Laboratories Ari Juels RSA Laboratories.
Revisiting the efficiency of malicious two party computation David Woodruff MIT.
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
CS5204 – Operating Systems 1 A Private Key System KERBEROS.
Controlled Functional Encryption Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, Xiaofeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl A. Gunter.
Secure Multiparty Computations on Bitcoin
Oblivious Branching Program Evaluation
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
ITIS 6200/ Secure multiparty computation – Alice has x, Bob has y, we want to calculate f(x, y) without disclosing the values – We can only do.
Twin Clouds: An Architecture for Secure Cloud Computing Term Paper Presented by: Komala Priya Chitturi.
Rational Oblivious Transfer KARTIK NAYAK, XIONG FAN.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
Introduction to Modern Cryptography, Lecture 12 Secure Multi-Party Computation.
A. Haeberlen Having your Cake and Eating it too: Routing Security with Privacy Protections 1 HotNets-X (November 15, 2011) Alexander Gurney * Andreas Haeberlen.
Responding to Policies at Runtime in TrustBuilder Bryan Smith, Kent E. Seamons, and Michael D. Jones Computer Science Department Brigham Young University.
7. Asymmetric encryption-
What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.
Yan Huang, Jonathan Katz, David Evans University of Maryland, University of Virginia Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
Protection of Identity Information in Cloud Computing without Trusted Third Party 作者 :Rohit Ranchal, Bharat Bhargave, Lotfi Ben Othmane, Leszek Lilien,
Privacy Management for J. Alex Halderman Brent Waters Edward W. Felten Princeton University Department of Computer Science Portable Recording Devices J.
1 Trust and Privacy in Authorization Bharat Bhargava Yuhui Zhong Leszek Lilien CERIAS Security Center CWSA Wireless Center Department of CS and ECE Purdue.
Secure Outsourcing of Sequence Comparisons Mikhail Atallah and Jiangtao Li CERIAS and Department of Computer Sciences Purdue University PET2004: Workshop.
Privacy-Preserving Trust Negotiations Mikhail Atallah Department of Computer Science Purdue University.
Oblivious Transfer based on the McEliece Assumptions
Practical Techniques for Searches on Encrypted Data Author: Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀銘偉.
The Traust Authorization Service A. Lee, M. Winslett, J. Basney, and V. Welch University of Illinois at Urbana-Champaign Goal: A scalable.
Private Analysis of Data Sets Benny Pinkas HP Labs, Princeton.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
1 Introduction to Secure Computation Benny Pinkas HP Labs, Princeton.
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes Author: Stanislaw Jarecki and Xiaomin Liu University of California, Irvine From:
Privacy Preserving Data Mining Yehuda Lindell & Benny Pinkas.
Data Confidentiality in Collaborative Computing Mikhail Atallah Department of Computer Science Purdue University.
Using Entropy to Trade Privacy for Trust Yuhui Zhong Bharat Bhargava {zhong, Department of Computer Sciences Purdue University This work.
Blind Vision Shai Avidan, Moshe Butman Yuval Schwartz.
TOWARDS IDENTITY ANONYMIZATION ON GRAPHS. INTRODUCTION.
Security Protocols in Automation Dwaine Clarke MIT Laboratory for Computer Science January 8, 2002 With help from: Matt Burnside, Todd.
Multi-Client Non-Interactive Verifiable Computation Seung Geol Choi (Columbia U.) Jonathan Katz (U. Maryland) Ranjit Kumaresan (Technion) Carlos Cid (Royal.
1 Point-Based Trust: Define How Much Privacy is Worth Danfeng YaoKeith B. Frikken Brown UniversityMiami University Mikhail J. Atallah Roberto Tamassia.
TRUST NEGOTIATION IN ONLINE BUSINESS TRANSACTIONS BY CHANDRAKANTH REDDY.
Chapter 4: Intermediate Protocols
Public-Key Cryptography CS110 Fall Conventional Encryption.
Slide 1 Vitaly Shmatikov CS 380S Yao’s Protocol. slide Yao’s Protocol uCompute any function securely … in the semi-honest model uFirst, convert.
Secure two-party computation: a visual way by Paolo D’Arco and Roberto De Prisco.
Slide 1 Yao’s Protocol. slide Yao’s Protocol uCompute any function securely … in the semi-honest model uFirst, convert the function into a boolean.
Privacy-Preserving Trust Negotiations* Mikhail Atallah CERIAS and Department of Computer Sciences Purdue University * Joint work with Keith Frikken and.
Software Security Seminar - 1 Chapter 5. Advanced Protocols 조미성 Applied Cryptography.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Privacy-Preserving Credit Checking Keith Frikken, Mikhail Atallah, and Chen Zhang Purdue University June 7, 2005.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
1 Secure Multi-party Computation Minimizing Online Rounds Seung Geol Choi Columbia University Joint work with Ariel Elbaz(Columbia University) Tal Malkin(Columbia.
1 Information Security – Theory vs. Reality , Winter Lecture 10: Garbled circuits and obfuscation Eran Tromer Slides credit: Boaz.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
Secure Conjunctive Keyword Search Over Encrypted Data Philippe Golle Jessica Staddon Palo Alto Research Center Brent Waters Princeton University.
Software Security Seminar - 1 Chapter 4. Intermediate Protocols 발표자 : 이장원 Applied Cryptography.
Policy-Based Dynamic Negotiation for Grid Services Authorization Ionut Constandache, Daniel Olmedilla, Wolfgang Nejdl Semantic Web Policy Workshop, ISWC’05.
Efficient Oblivious Transfer with Stateless Secure Tokens Alcatel-Lucent Bell Labs Vlad Kolesnikov.
1 Token–based Dynamic Trust Establishment for Web Services Zhengping Wu and Alfred C. Weaver Department of Computer Science University of Virginia March.
 5.1 Zero-Knowledge Proofs  5.2 Zero-Knowledge Proofs of Identity  5.3 Identity-Based Public-Key Cryptography  5.4 Oblivious Transfer  5.5 Oblivious.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
1© Nokia 2016 Overlaying Circuit Clauses for Secure Computation Sean Kennedy Vladimir Kolesnikov Gordon Wilfong Bell Labs.
Network Security and It’s Issues
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
1 Secret Handshakes or Privacy-Preserving Interactive Authentication Gene Tsudik University of California, Irvine joint work with: Claude Castelluccia,
The first Few Slides stolen from Boaz Barak
Course Business I am traveling April 25-May 3rd
Cryptography CS 555 Lecture 22
Cryptography for Quantum Computers
Achieving Fairness in Private Contract Negotiation
Hidden Credentials Jason E. Holt, Robert Bradshaw, Kent E. Seamons
Presentation transcript:

Hidden Access Control Policies with Hidden Credentials Keith Frikken, Mikhail Atallah, Jiangtao Li CERIAS and Department of Computer Sciences Purdue University Workshop on Privacy in the Electronic Society (WPES) October 2004

Motivation In an open environment, access control decisions are often based on the attributes of the requester. Often, both credentials and access policies are sensitive. Previous trust negotiation approaches disclose sensitive credentials and policies (they try to minimize, e.g., piecewise disclosure). Our protocols reveal nothing – not the structure of the policies, nor why access was granted, …etc.

Our Model and Result Alice gets M if and only if her credentials satisfy Bob’s policy P. Bob does not learn whether Alice got access or not. Bob does not learn anything about Alice’s credentials. Alice learns neither Bob’s policy structure nor which credentials causes her to gain access. Bob (Server) Alice (Client) Alice: request for M M, P C=C 1,C 2,…,C m Secure Protocol M if C satisfies P

Hidden Credentials [HBSO’03] Generation of hidden credentials –CA issues Alice a Secret-Agent credential –CA  Alice: IBE_KeyGen(Alice||Secret-Agent) Usage of hidden credentials –Bob  Alice: IBE_Encrypt(M, Alice||Secret-Agent) –Alice can decrypt only if she has a Secret-Agent credential –Bob does not learn whether Alice is a secret agent or not

Policy Definition Policy over a set of credentials C –A policy P contains n attributes attr 1, …, attr n –P(C) = p(x 1, …, x n ) p(x 1, …, x n ) is a Boolean function x i =1 iff  cred  C such that cred.attr = attr i –The credentials set C satisfies P ⇔ p(x 1, …, x n ) = 1 Example –Alice is a senior citizen and has low income –Policy = (disability  senior-citizen)  low-income = (x 1  x 2 )  x 3 = (0  1)  1 = 1

Two-Phase Protocol Phase 1: Credential and Attribute Hiding –For each attr i in his policy, Bob generates two random keys {r i [0], r i [1]}. –Alice learns n values k 1, k 2, …, k n. If Alice’s credentials possess attr i, then k i = r i [1], otherwise k i = r i [0]. Phase 2: Blinded Policy Evaluation –Suppose Alice inputs r 1 [x 1 ], r 2 [x 2 ], …, r n [x n ], Bob inputs a private Boolean function p. In the end, Alice receives M if and only if p(x 1, …, x n ) = 1.

Protocol for Phase 1 Input: Alice inputs m hidden credentials C 1,C 2,…,C m; Bob inputs attr, r[0], r[1]. Output: Alice gets r[1] if there exist C j such that C j.attr = attr, she gets r[0] otherwise. Steps: 1.Bob  Alice: IBE_Encrypt(k[0], Alice||attr) 2.Alice decrypts using her hidden credentials and gets m random values 3.Alice and Bob run a set intersection protocol, if one of Alice’s m values matches k[0], she obtains k[1] 4.Alice and Bob engage a 1-out-of-2 OT with Bob’s input {r[0], E(r[1], k[1])} 5.If Alice gets k[1] in step 3, she can obtain r[1], otherwise, she gets r[0]

Protocol for Phase 2 Scrambled circuit evaluation [Yao86] –Bob  Alice: E K (M) –Bob builds a scrambled circuit that computes p(x 1, …, x n ). Bob sets the 1 encoding of the output wire as the decryption key K. –Bob  Alice: the scrambled circuit –Alice evaluates the circuit and decrypts E K (M) using the value from the output wire. –If Alice gets 1 encoding, she obtains M.

Questions?