Some slides borrowed from Philippe Golle, Markus Jacobson

Slides:



Advertisements
Similar presentations
Data Security 1 El_Gamal Cryptography. Data Security2 Introduction El_Gamal is a public-key cryptosystem technique El_Gamal is a public-key cryptosystem.
Advertisements

RPC Mixing: Making Mix-Nets Robust for Electronic Voting Ron Rivest MIT Markus Jakobsson Ari Juels RSA Laboratories.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks - I CS 436/636/736 Spring 2012 Nitesh Saxena Some slides borrowed from Philippe Golle, Markus.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
Lecture 3.3: Public Key Cryptography III CS 436/636/736 Spring 2012 Nitesh Saxena.
7. Asymmetric encryption-
Reusable Anonymous Return Channels
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Privacy and Anonymity Using Mix Networks* Nitesh Saxena CS392/6813 Some slides borrowed from Philippe Golle, Markus Jacobson.
10/25/20061 Threshold Paillier Encryption Web Service A Master’s Project Proposal by Brett Wilson.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
Parallel Mixing Philippe Golle, PARC Ari Juels, RSA Labs.
Electronic Voting Schemes and Other stuff. Requirements Only eligible voters can vote (once only) No one can tell how voter voted Publish who voted (?)
UMBC Protocol Meeting 10/01/03 Universal Re-encryption: For Mix-Nets and Other Applications (to appear CT-RSA ’04) Paul Syverson NRL Markus Jakobsson Ari.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2014 Nitesh Saxena.
Lecture 11: Privacy and Anonymity Using Anonymizing Networks CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena Some slides borrowed from Philippe.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Optimistic Mixing for Exit-Polls Philippe Golle, Stanford Sheng Zhong, Yale Dan Boneh, Stanford Markus Jakobsson, RSA Labs Ari Juels, RSA Labs.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
DISTRIBUTED CRYPTOSYSTEMS Moti Yung. Distributed Trust-- traditionally  Secret sharing: –Linear sharing over a group (Sum sharing) gives n out of n sharing.
Lecture 6.2: Protocols - Authentication and Key Exchange II CS 436/636/736 Spring 2012 Nitesh Saxena.
The Paillier Cryptosystem
Privacy and Anonymity Using Mix Networks* Slides borrowed from Philippe Golle, Markus Jacobson.
10/25/04 Security of Ad Hoc and Sensor Networks (SASN) 1/22 An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol.
Almost Entirely Correct Mixing With Applications to Voting Philippe Golle Dan Boneh Stanford University.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
Lecture 3.4: Recursive Algorithms CS 250, Discrete Structures, Fall 2015 Nitesh Saxena Adopted from previous lectures by Zeph Grunschlag.
Systems Architecture Receiver Anonymity Matthias Füssel, Dennis Schneider June 5, 2007.
Public Key Encryption.
Attacks on Public Key Encryption Algorithms
Security Outline Encryption Algorithms Authentication Protocols
Asymmetric-Key Cryptography
Advanced Computer Networks
RSA and El Gamal Cryptosystems
Some slides borrowed from Philippe Golle, Markus Jacobson
Basic Network Encryption
Topic 24: Finding Prime Numbers, RSA
Lecture 2.2: Private Key Cryptography II
Lecture 3: Public Key Cryptography
Course Business I am traveling April 25-May 3rd
Cryptography CS 555 Lecture 22
0x1A Great Papers in Computer Security
Input: A={a1, a2, … an} – public key, S - ciphertext
CMSC 414 Computer and Network Security Lecture 3
Fuzzy Identity Based Encryption
ElGamal Public-Key Systems over GF(p) & GF(2m)
Rivest, Shamir and Adleman
Cryptography Lecture 25.
Some slides borrowed from Philippe Golle, Markus Jacobson
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
CS 336/536: Computer Network Security Fall 2015 Nitesh Saxena
Threshold RSA Cryptography
Privacy and Anonymity Using Mix Networks* Nitesh Saxena CS392/6813
CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena
Basic Network Encryption
Privacy and Anonymity Using Mix Networks* Nitesh Saxena CS392/6813
Cryptography Lecture 21.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Lecture 6.2: Protocols - Authentication and Key Exchange II
Presentation transcript:

Some slides borrowed from Philippe Golle, Markus Jacobson Privacy and Anonymity Using Anonymizing Networks –II CS 436/636/736 Spring 2012 Nitesh Saxena Some slides borrowed from Philippe Golle, Markus Jacobson

Lecture 7.2: Privacy and Anonymity Using Anonymizing Networks Course Admin Mid-term exams returned HW3 to be posted very soon Lecture 7.2: Privacy and Anonymity Using Anonymizing Networks

Lecture 7.2: Privacy and Anonymity Using Anonymizing Networks Today’s Outline Re-encryption based mix networks Secret sharing Research flavor Lecture 7.2: Privacy and Anonymity Using Anonymizing Networks

Principle Requirements : Chaum ’81 Message 1 Message 2 Privacy server 1 server 2 server 3 Requirements : Privacy Efficiency Trust Robustness

But what about robustness? I ignore his output But what about robustness? and produce my own STOP encr(Berry) encr(Kush) Kush There is no robustness!

Zoology of Mix Networks Inputs Outputs ? Decryption Mix Nets [Cha81,…]: Inputs: ciphertexts Outputs: decryption of the inputs. Re-encryption Mix Nets[PIK93,…]: Outputs: re-encryption of the inputs Lecture 7.2: Privacy and Anonymity Using Anonymizing Networks

First Solution Chaum ’81, implemented by Syverson, Goldschlag Not robust (or: tolerates 0 cheaters for correctness) Requires every server to participate (and in the “right” order!)

Re-encryption Mixnet 0. Setup: mix servers generate a shared key 1. Users encrypt their inputs: Input Pub-key Server 1 Server 2 Server 3 re-encrypt & mix 2. Encrypted inputs are mixed: Proof 3. A quorum of mix servers decrypts the outputs Output Priv-key

Recall: Discrete Logarithm Assumption p, q primes such that q|p-1 g is an element of order q and generates a group Gq of order q x in Zq, y = gx mod p Given (p, q, g, y), it is computationally hard to compute x No polynomial time algorithm known p should be 1024-bits and q be 160-bits x becomes the private key and y becomes the public key Lecture 7.2: Privacy and Anonymity Using Anonymizing Networks

Lecture 7.2: Privacy and Anonymity Using Anonymizing Networks ElGamal Encryption Encryption (of m in Gq): Choose random r in Zq k = gr mod p c = myr mod p Output (k,c) Decryption of (k,c) M = ck-x mod p Secure under discrete logarithm assumption Lecture 7.2: Privacy and Anonymity Using Anonymizing Networks

ElGamal Example: dummy Let’s construct an example KeyGen: p = 11, q = 2 or 5; let’s say q = 5 2 is a generator of Z11* g = 22 = 4 x = 2; y = 42 mod 11 = 5 Enc(3): r = 4  k = 44 mod 11 = 3 c = 3*54 mod 11 = 5 Dec(3,5): m = 5*3-2 mod 11 = 3 Lecture 7.2: Privacy and Anonymity Using Anonymizing Networks

Lecture 7.2: Privacy and Anonymity Using Anonymizing Networks (t+1,n)- Secret Sharing Motivation: to secure the cryptosystem against t (< n/2) corruptions Split the secret among n entities so that any set of t+1 or more entities can recover the secret an adversary who corrupts at most t entities, learns nothing about the secret Tool: Shamir’s Polynomial Secret Sharing f(z)  degree t polynomial (mod q) f(0)  x f(i)  ssi SECURE Polynomial interpolation: for any G, s.t. |G|=t+1 INSECURE (n=7, t=3) Lecture 7.2: Privacy and Anonymity Using Anonymizing Networks

Re-encryption technique Input: a ciphertext (k,c) wrt public key y Pick a number r’ randomly from [0…q-1] Compute k’ = kgr’ mod p c’ = cyr’ mod p Output (k’, c’) Same decryption technique! Compute m k’c’-x Lecture 7.2: Privacy and Anonymity Using Anonymizing Networks

A simple Mix (k1, c1) (k2, c2) . (kn, cn) (k’1,c’1) (k’2,c’2) . R E - N C Y P T R E - N C Y P T (k1, c1) (k2, c2) . (kn, cn) (k’1,c’1) (k’2,c’2) . (k’n,c’n) (k’’1,c’’1) (k’’2,c’’2) . (k’’n,c’’n) Note: different cipher text, different re-encryption exponents!

And to get privacy… permute, too! (k1, c1) (k2, c2) . (kn, cn) (k’’1,c’’1) (k’’2,c’’2) . (k’’n,c’’n) Lecture 7.2: Privacy and Anonymity Using Anonymizing Networks

Lecture 7.2: Privacy and Anonymity Using Anonymizing Networks And, finally…the Proof Mix servers must prove correct re-encryption Given n El Gamal ciphertexts E(mi) as input and n El Gamal ciphertexts E(m’i) as output Compute: E( mi) and E(=m’i) Ask Mix for Zero-Knowledge proof that these ciphertexts decrypt to same plaintexts Lecture 7.2: Privacy and Anonymity Using Anonymizing Networks

Anonymizing Network in practice: Tor A low-latency anonymizing network http://www.torproject.org/ Currently 1000 or so routers distributed all over in the internet Can run any SOCKS application on top of Tor Peer-based: a client can choose to be a router A request is routed to/fro a series of a circuit of three routers A new circuit is chosen every 10 minutes No real-world implementation of re-encryption mix as yet Lecture 7.2: Privacy and Anonymity Using Anonymizing Networks