Anonymous Fingerprinting Paper by: Birgit Pfitzmann, and Michael Waidner Presentation by: James Campbell.

Slides:



Advertisements
Similar presentations
Security attacks. - confidentiality: only authorized parties have read access to information - integrity: only authorized parties have write access to.
Advertisements

Secure Multiparty Computations on Bitcoin
Cryptography and Network Security
Bounds on Code Length Theorem: Let l ∗ 1, l ∗ 2,..., l ∗ m be optimal codeword lengths for a source distribution p and a D-ary alphabet, and let L ∗ be.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Introduction to Modern Cryptography, Lecture 13 Money Related Issues ($$$) and Odds and Ends.
Session 4 Asymmetric ciphers.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Buyer-Seller Watermarking (BSW) Protocols Geong Sen Poh 31 Oct 2006.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Introduction to Modern Cryptography, Lecture ?, 2005 Broadcast Encryption, Traitor Tracing, Watermarking.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Cryptographic Technologies
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
Electronic Voting Schemes and Other stuff. Requirements Only eligible voters can vote (once only) No one can tell how voter voted Publish who voted (?)
Birthday Attack on Efficient and Anonymous Buyer-Seller Watermarking Protocol BY Qurat-ul-Ain M. Mahboob Yasin COMSATS Institute of Information Technology,
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Optimistic Synchronous Multi-Party Contract Signing N. Asokan, Baum-Waidner, M. Schunter, M. Waidner Presented By Uday Nayak Advisor: Chris Lynch.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Chapter 8 Web Security.
Feb 19, 2002Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
Quantum Public Key Cryptography with Information- Theoretic Security Daniel Gottesman Perimeter Institute.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Bob can sign a message using a digital signature generation algorithm
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
Secure Electronic Transaction (SET)
Chapter 4: Intermediate Protocols
Cryptography, Authentication and Digital Signatures
Information Coding in noisy channel error protection:-- improve tolerance of errors error detection: --- indicate occurrence of errors. Source.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Chapter 3: Basic Protocols Dulal C. Kar. Key Exchange with Symmetric Cryptography Session key –A separate key for one particular communication session.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Based on Schneier Chapter 5: Advanced Protocols Dulal C. Kar.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Fall 2006CS 395: Computer Security1 Key Management.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
 5.1 Zero-Knowledge Proofs  5.2 Zero-Knowledge Proofs of Identity  5.3 Identity-Based Public-Key Cryptography  5.4 Oblivious Transfer  5.5 Oblivious.
Dr. Saatchi, Seyed Mohsen 1 Arab Open University - AOU T209 Information and Communication Technologies: People and Interactions Sixth Session.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Cryptography and Security Technologies
Cryptography.
NET 311 Information Security
Presentation transcript:

Anonymous Fingerprinting Paper by: Birgit Pfitzmann, and Michael Waidner Presentation by: James Campbell

Fingerprinting? Fingerprinting Schemes: Cryptologic means by which sellers of digital data can find traitors Traitors? –Buyers who illegally redistribute copyrighted digital data … similar to pirates …

Fingerprinting Schemes Fingerprinting –Symmetric –Asymmetric Traitor Tracing –Symmetric –Asymmetric

Symmetric Fingerprinting Each buyer gets a slightly different version When an illegal redistribution is found, vender checks who bought that particular variant Problems: –Collusion –Proving Guilt

Collusion What if multiple traitors get together and compare their copies to find the variation? Collusion Tolerance: The ability of a scheme to avoid being compromised by conspiring traitors

Proving Guilt With Symmetric Fingerprinting The merchant cannot find anything in the redistributed copy that he could not have created by himself Other schemes we will see handle this problem

Asymmetric Fingerprinting Buyer inputs his own secret Merchant does not see the fingerprinted copy that the buyer receives If the copy is found, the merchant can extract the information Can prove guilt, since the merchant could not have produced the buyer’s secret

Traitor Tracing Analog to fingerprinting for cryptologic keys Introduced for broadcast encryption Used in cases where only the key to decrypt the information is sold –Each key is different, but all can decrypt the data Asymmetric forms exist which prove guilt

Trials 3-Party Trials: The accused buyer is needed for the merchant to prove guilt to an arbiter 2-Party Trials: The merchant can prove a traitor’s guilt to an arbiter without the traitor

Benefits of 2-Party Trials The traitor does not need to be found for their guilt to be proven –Unimportant … would need to be found anyway Traitor’s Memory – No worry of potential traitor forgetting password or dieing Traitor’s Secret – No worry of potential traitor divulging secrets possibly used elsewhere

Marketplace Anonymity Electronic marketplaces try to offer the same privacy (if not more) than real marketplaces –Anonymous networks, money, and exchanges exist All previous fingerprinting schemes destroys this privacy, since the buyer must somehow identify themselves

Anonymous Fingerprinting Each buyer must have a key pair for a digital signature scheme Each buyer must register for the fingerprinting scheme with their digital identity Registration is done at “Registration Centers” –Most likely the buyer’s bank Note: The registration center does not need to be trusted, worst they can do is deny registration

Anonymous Fingerprinting Four types of parties involved: –Merchants –Buyers –Registration Centers –Arbiters Arbiters should be able to be anyone Registration Centers should not have to be trusted

Anonymous Fingerprinting 7 Protocols makeup the anonymous fingerprinting scheme: –Registration Center Key Distribution –Registration –Data Initialization –Fingerprinting –Identification –Enforced Identification –Trial Can output failed at any point

Registration Center Key Distribution Registration center creates key pair (part of a signature scheme) Public key distributed to all –Merchants –Arbiters –Buyers that are or may register at that center

Registration Registers the buyer with the registration center Inputs: –Buyer  Buyer’s digital identity –Center  Registration Center’s public key  Maximum number of purchases  Registration Center’s secret key Outputs: –Buyer  Registration record –Center  Registration record

Data Initialization Merchant prepares each data item for sale Inputs: –Merchant  The data item to be sold  Maximum number of copies to sell Output: –Merchant  Merchant’s initial data record

Fingerprinting Merchant and buyer fingerprint the data Inputs: –Merchant  Data item Initial data record from buyer’s Registration Center –Buyer  Registration record –Both  Text describing the purchase Outputs: –Merchant  Purchase record –Buyer  Fingerprinted data Purchase record Secretly

Identification Merchant obtains who the original buyer is (may involve registration center) Inputs: –Merchant  A redistributed copy of some data item  An original copy of the same data item  All purchase records for that data item –Center  registration records Outputs: –Merchant  Identity of original buyer The description of the sale The string: Proof

Enforced Identification If the registration center is needed, but does not cooperate, then an arbiter is brought in Outputs: –Merchant  (same as in identification) –Arbiter  either center_guilt or ok Center_guilt indicates that the arbiter noticed the center has been misbehaving

Trial Tests if the accused buyer is at guilt involves: Merchant and Arbiter, or All Inputs: –Merchant  Identity of accused buyer Description of sale The string Proof –Center  Buyer’s registration record –Buyer  Current registration record Outputs: –Arbiter  guilty or not_guilty possibly center_guilty

Effectiveness Properties Correct Case: –If involved parties are honest: Registration and Data Initialization should not fail –If buyer, merchant and center are honest: Fingerprinting should succeed –Fingerprinted data should look sufficiently like original No Jamming by Registration Center: –The center cannot register a buyer such that later a transaction with a merchant will fail

Integrity Security for the Merchant: –If a traitor buys up to coll_size different copies of the same data item, and produces a similar copy: The merchant will still be able to identify the traitor –May get center_guilt if the center is cheating –Weaker version: only holds if the buyer’s registration center is honest

Integrity Protecting the merchant from making wrong accusations: –It should be infeasible for any number of traitors to create a copy of the data such that identification succeeds but trial fails Security for the Buyer: –No honest buyer should be able to be found guilty –Note: no weaker version should exist of this Security for Registration Centers: –Honest registration centers should never be deemed guilty by an honest arbiter

Anonymity Nobody should be able to know anything about the buyer’s behavior (without the center’s help) Implies that a merchant cannot unjustly accuse a person to determine if they were a buyer Assumes that the underlying communication channels are anonymous (ex. Using a mixnet)

Fingerprinting Issues Buyer must embed some information into the data: call it: emb The merchant must be able to validate emb The merchant must be able to extract emb (assumed to exist for the following) –In non-anonymous schemes, emb must be derived using information or interaction from the buyer

More Detail - Registration Buyer selects a “pseudonym” Buyer signs responsibility using normal identity Registration center gives buyer a certificate: Thus the registration center can link the buyer to the pseudonym

More Detail - Fingerprinting Buyer computes where text is the description of the sale Thus The buyer then hides emb in a commitment which is sent to the merchant Buyer uses zero-knowledge to prove the validity of the hidden signature

More Detail - Fingerprinting Alternate method: Rather than embedding emb as is … Buyer encrypts emb and commits the key, which is embedded, and the merchant holds onto emb

More Detail - Identification Merchant extracts emb and sends to the buyer’s registration center to get the buyer’s identity If the center refuses, the merchant shows proof 1 and cert B to the arbiter to show that the center knows the identity of the traitor In enforced Identification, either the center discloses the identity or is found guilty

More Detail - Identification In the alternate version: The merchant tries to decrypt all of the ciphertexts from the purchase records Rest follows as before

More Detail - Trial The arbiter checks the signature to ensure that the accused buyer claims responsibility for the pseudonym Then checks that sig is a valid signature of text

Provability of Security Theorem 1: If all the underlying primitives are secure, the construction framework yields a provably secure anonymous fingerprinting protocol. Paper claims the proof is straightforward …

Marking Schemes Way of hiding data within data, assumed to be used in fingerprinting schemes Individual bits are hidden in data items at random Each data item has two versions In initialization, the merchant selects l marks probabilistically and can then encode l bits Traitors can only find marks by comparing their copies

Marking Schemes If coll_size traitors produce a new redistribution, then at least l /coll_size marks will correspond to one of the traitor’s copies Error correction schemes can be used to fill in for any deleted marks

Symmetric Schemes Almost no collusion tolerance If there is no collusion, then can assume the traitor’s codeword still exists intact Thus the codeword can simply be extracted

Symmetric Collusion-Tolerant Schemes Merchant compares all possible codewords to the redistribution and looks for at least l /coll_size symbols in common Impractical to use for large quantities of data since the list of possible codewords would be rather large

Asymmetric Schemes with 3-Party Trials Merchant cannot know entire codewords, so only knows half of each Merchant searches a list of partial codewords to find whom to accuse, who shows his part to the arbiter Arbiter looks for sufficient common symbols Cannot be used for anonymous scheme since merchant does not know whom to accuse

Asymmetric Collusion-Tolerant Fingerprinting with 2-Party Trials Encoding Idea: –Use a concatenated code with Outer code words of length l over {1, …, q} Inner code is a fixed binary code  of length d(q-1) –L,d,q parameters – must have a decoding procedure where each symbol in an altered redistribution must be a symbol from one colluding traitor (with high probability) –Probability of this not being the case is if

Embedding / Extracting Data Data Initialization: –Merchant chooses marks for the data items in the marking scheme –For each of the l positions of the outer code, the merchant randomly chooses a substitution which is a permutation of the alphabet {1, …, q}

Embedding / Extracting Data Embedding: –Merchant picks k 1 random bits for each symbol in the outer code –ebm is encoded with EECC into l halfsymbols of k 2 bits each –Halfsymbols are combined and encoded –Thus giving an outer word of –Each symbol is then encoded with the inner code

Embedding / Extracting Data Extracting: –Each symbol of the outer code is identified by undoing the inner code, giving –Each symbol is decrypted using and is separated into halves of length k 1 and k 2 –Merchant then looks through purchase records for which has at least symbols in common with –Then tries to extract

The End Questions?