Provable Protocols for Unlinkability Ron Berman, Amos Fiat, Amnon Ta-Shma Tel Aviv University.

Slides:



Advertisements
Similar presentations
Aaron Johnson with Joan Feigenbaum Paul Syverson
Advertisements

Provable Unlinkability Against Traffic Analysis Ron Berman Joint work with Amos Fiat and Amnon Ta-Shma School of Computer Science, Tel-Aviv University.
A Formal Analysis of Onion Routing 10/26/2007 Aaron Johnson (Yale) with Joan Feigenbaum (Yale) Paul Syverson (NRL)
Lower Bounds for Additive Spanners, Emulators, and More David P. Woodruff MIT and Tsinghua University To appear in FOCS, 2006.
Revisiting the efficiency of malicious two party computation David Woodruff MIT.
Merkle Damgard Revisited: how to Construct a hash Function
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Routing in a Parallel Computer. A network of processors is represented by graph G=(V,E), where |V| = N. Each processor has unique ID between 1 and N.
CIS 5371 Cryptography 3b. Pseudorandomness.
Bounds on Code Length Theorem: Let l ∗ 1, l ∗ 2,..., l ∗ m be optimal codeword lengths for a source distribution p and a D-ary alphabet, and let L ∗ be.
Sampling Distributions
Introduction to Modern Cryptography, Lecture 12 Secure Multi-Party Computation.
Eran Omri, Bar-Ilan University Joint work with Amos Beimel and Ilan Orlov, BGU Ilan Orlov…!??!!
NON-MALLEABLE EXTRACTORS AND SYMMETRIC KEY CRYPTOGRAPHY FROM WEAK SECRETS Yevgeniy Dodis and Daniel Wichs (NYU) STOC 2009.
Derandomized parallel repetition theorems for free games Ronen Shaltiel, University of Haifa.
PCPs and Inapproximability Introduction. My T. Thai 2 Why Approximation Algorithms  Problems that we cannot find an optimal solution.
Slicing the Onion: Anonymous Routing without PKI Saurabh Shrivastava CS 259
Introduction to Computability Theory
Hardness Results for Problems P: Class of “easy to solve” problems Absolute hardness results Relative hardness results –Reduction technique.
1 Modeling and Analysis of Anonymous-Communication Systems Joan Feigenbaum WITS’08; Princeton NJ; June 18, 2008 Acknowledgement:
Tirgul 10 Rehearsal about Universal Hashing Solving two problems from theoretical exercises: –T2 q. 1 –T3 q. 2.
Explorations in Anonymous Communication Andrew Bortz with Luis von Ahn Nick Hopper Aladdin Center, Carnegie Mellon University, 8/19/2003.
11.Hash Tables Hsu, Lih-Hsing. Computer Theory Lab. Chapter 11P Directed-address tables Direct addressing is a simple technique that works well.
Analysis of Onion Routing Presented in by Jayanthkumar Kannan On 10/8/03.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Foundations of Network and Computer Security J J ohn Black Lecture #3 Aug 28 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
CS151 Complexity Theory Lecture 6 April 15, 2004.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Anonymous Communication Luis von Ahn Andrew Bortz Nick Hopper The Aladdin Center Carnegie Mellon University.
Secure Message Transmission In Asynchronous Directed Networks Kannan Srinathan, Center for Security, Theory and Algorithmic Research, IIIT-Hyderabad. In.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
1 9/8/2015 MATH 224 – Discrete Mathematics Basic finite probability is given by the formula, where |E| is the number of events and |S| is the total number.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Fluid Limits for Gossip Processes Vahideh Manshadi and Ramesh Johari DARPA ITMANET Meeting March 5-6, 2009 TexPoint fonts used in EMF. Read the TexPoint.
Provable Unlinkability Against Traffic Analysis Amnon Ta-Shma Joint work with Ron Berman and Amos Fiat School of Computer Science, Tel-Aviv University.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
CS4231 Parallel and Distributed Algorithms AY 2006/2007 Semester 2 Lecture 10 Instructor: Haifeng YU.
Channel Capacity.
Private Approximation of Search Problems Amos Beimel Paz Carmi Kobbi Nissim Enav Weinreb (Technion)
R. Newman Anonymity - Background. Defining anonymity Defining anonymity Need for anonymity Need for anonymity Defining privacy Defining privacy Threats.
Password Mistyping in Two-Factor Authenticated Key Exchange Vladimir KolesnikovCharles Rackoff Bell LabsU. Toronto ICALP 2008.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
Alternative Wide Block Encryption For Discussion Only.
Rational Cryptography Some Recent Results Jonathan Katz University of Maryland.
Graph Colouring L09: Oct 10. This Lecture Graph coloring is another important problem in graph theory. It also has many applications, including the famous.
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
Game-based composition for key exchange Cristina Brzuska, Marc Fischlin (University of Darmstadt) Nigel Smart, Bogdan Warinschi, Steve Williams (University.
Conditional Probability Mass Function. Introduction P[A|B] is the probability of an event A, giving that we know that some other event B has occurred.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Chapter 21 Asynchronous Network Computing with Process Failures By Sindhu Karthikeyan.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Honest-Verifier Statistical Zero-Knowledge Equals General Statistical Zero-Knowledge Oded Goldreich (Weizmann) Amit Sahai (MIT) Salil Vadhan (MIT)
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
CIS 540 Principles of Embedded Computation Spring Instructor: Rajeev Alur
1 Distributed Vertex Coloring. 2 Vertex Coloring: each vertex is assigned a color.
Analysis of Boolean Functions and Complexity Theory Economics Combinatorics …
Theory of Computational Complexity Probability and Computing Ryosuke Sasanuma Iwama and Ito lab M1.
GRAPH AND LINK MINING 1. Graphs - Basics 2 Undirected Graphs Undirected Graph: The edges are undirected pairs – they can be traversed in any direction.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Theory of Computational Complexity M1 Takao Inoshita Iwama & Ito Lab Graduate School of Informatics, Kyoto University.
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
Topic 36: Zero-Knowledge Proofs
Computability and Complexity
Complexity 6-1 The Class P Complexity Andrei Bulatov.
Compact routing schemes with improved stretch
CHAPTER 1 Regular Languages
Anonymity – Generalizing Mixes
Presentation transcript:

Provable Protocols for Unlinkability Ron Berman, Amos Fiat, Amnon Ta-Shma Tel Aviv University

Unlinkability –S: Set of message initiators –T: Set of message recipients –Every s  S sends a message to some t  T and [may] request a response –Goal: Prevent adversary from knowing who is talking to whom Adversary may control all nodes in T and many other nodes and links in the network

The model A complete graph of N nodes The adversary is capable of eavesdropping to almost all links: an ε fraction of the links are “honest” The adversary may also control almost all nodes, subject to the above A public key infrastructure is in place A set S of M nodes wish to send unlinkable [two way] communications to a set T of M nodes The Adversary is adaptive but not malicious. I.e., Adversary cannot corrupt or discard messages.

Prior Work Seminal Papers of David Chaum, 1979, 1981 –Reduction to Traffic Analysis (Onion Routing) –“ Chaumian Mixes ” Literally dozens (hundreds?) of papers since, dedicated conferences, etc., etc. Many implementations Typical paper: –Attack on prior protocol(s) –Suggest new protocol –Repeat Very few attempts to give rigorous definitions, let alone proofs Notable exception: Rackoff and Simon, 1993

General Structure: Chaumian Mixes Choose a random path and send message along path Hope for sufficiently many collisions along path If N nodes, and polylog(N) length path, then essentially need all nodes to send messages Does not matter how many nodes actually want to send messages, many dummy messages required. Many attacks, counter measures, counter attacks, counter counter measures, etc.

Chaum’s reduction to traffic analysis: Onion Routing Note: messages are same length

Prior work: Chaumian Mixes Honest nodes are used to prevent adversary from knowing how messages were routed: A to C, A ’ to C ’, or A to C ’, A ’ to C.

Our Results New definitions of unlinkability based on information theory Prove equivalence to Rackoff-Simon definitions Prove that a suitable modification of Chaum ’ s original protocol is secure Argue that many previous “ informal arguments ” must be wrong Improve (?) on Rackoff-Simon in many ways: –Adaptive adversary, allow arbitrary prior knowledge –No secure computation –Much, much, simpler –Much more efficient. No need to flood network with dummy messages –Weaker attack model (not all links are under adversary control) (New definition of improve)

Only Traffic Analysis We will simply assume during this talk that the adversary cannot do anything except eavesdrop onto traffic –An Adversary controlled link reports on all traffic through the link –An Adversary controlled node reports on all trafic through the node and how routing was done

How to define Unlinkability ∏ - Random variable, permutation from S to T, [may be drawn from arbitrary prior distribution] C – Random variable, gives all the adversary learns during communications

How to define Unlinkability Rackoff and Simon: Let n be a security parameter, C and ∏ as before (We ’ re ignoring the issue of computational indistinguishability in this talk) (R&S only allow the uniform prior distribution)

Other Definitions (Equivalent) We need the following observation to prove these equivalences, 0 ≤ α ≤ 1 : Is this new? Seems unlikely.

Why use I(A:B) rather than | | 1 ? I(A:B) is monotonic: Let A be a random variable giving the number of heads in 10 coin tosses Let B be the binomial distribution for the number of heads in 10 coin tosses Let C be a random variable giving the number of heads in the first coin toss Let D be a random variable giving the number of heads in the 2 nd coin toss | | 1 is not monotonic (the little birdy principle does not work): The intuition: the “ closer ” to the prior, B, the less information the adversary has

The little Birdy Principle Richard M. Karp (1988): –Revealing more information to the adversary only makes his/her life easier –Certainly true in the context of computational complexity Is this true in the context of unlinkability? –Depends on the definition of unlinkability –Many previous papers implicitly make use of the little birdy principle in informal arguments –Does not hold for the Rackoff-Simon definitions

How could this possibly be? The little birdy principle must hold, it ’ s obvious, isn ’ t it? Actually, in some form it does hold, it holds on average The reason that it does not always hold is that in some circumstances, revealing more information (selected information), only “ confuses ” the adversary There must be a good political joke here somewhere, but I could not figure it out

How to prove unlinkability Define Protocol Define Obscurant Network Construct Obscurant Networks Search for Obscurant Network “ embedding ” within execution of protocol (Uses Little Birdy Principle) Extend result to allow prior information: Use “ protocol folding ” (Uses Little Birdy Principle)

The protocol Nodes wishing to send messages (and only nodes wishing to send messages): –Choose a random path of length polylog(N) –Use Chaum ’ s onion routing to send and receive messages along this path

Silly, isn’t it?” If only 100 messages are initiated, and there are 10 6 nodes in the network, there will be no collusions If the adversary controls all links then the adversary knows exactly who is talking to whom Change attack model: adversary controls all by an arbitrarily small constant fraction of the links

The protocol

Introducing ambiguity via links A crossover structure of honest links introduces ambiguity

Obscurant Networks A network with crossover switches such that a pebble placed on the inputs, and setting all crossovers uniformly at random, will result in a uniform distribution over the outputs Example: Butterfly network Important: an obscurant network does not obscure permutations What about non-powers of 2?

Obscurant Networks of all sizes Uniformly at random for these nodes Uniformly at random for these nodes Average the probability mass

Do permutation obscurant networks exist?? –Don ’ t know, open problem. Don ’ t you need a permutation obscurant network?? –Yes, and no, what we actually find are repeated embeddings of [single pebble] obscurant networks

A combinatorial lemma (N. Alon, FOCS 2001) Given a graph with a constant fraction, f, of the total edges –Choose 4 nodes at random –A crossover network will connect them with probability f 4 f is the fraction of honest edges

Strategy Reveal all links used in every 2 nd layer, this is to make pairs of layers independent choices of four nodes For a sufficiently long set of paths, find an obscurant network in the execution of the protocol Reveal all other edges This revelation should not harm the protocol (requires some effort)

Strategy (continued) How do we move from [single pebble] obscurant to unlinkable? Reveal the j th path (as a proof technique!!) to argue about the others

Dealing with Prior Information Reveal to the adversary the relationship between layer i and layer 6-i

Dealing with Prior Information: Folding the Network upon itself

Completing the Argument: Prior Information Because the distributions (Choose the last T-1 levels at random, and fill in the 1 st level to get the permutation) Given the middle permutation, and c 2  C 2, we can compute π, thus the data processing inequality holds