Paris, 17 December 2007MPRI Course on Concurrency MPRI – Course on Concurrency Lecture 14 Application of probabilistic process calculi to security Catuscia.

Slides:



Advertisements
Similar presentations
Provable Unlinkability Against Traffic Analysis Ron Berman Joint work with Amos Fiat and Amnon Ta-Shma School of Computer Science, Tel-Aviv University.
Advertisements

Security attacks. - confidentiality: only authorized parties have read access to information - integrity: only authorized parties have write access to.
Paris, 3 Dec 2007MPRI Course on Concurrency MPRI – Course on Concurrency Lecture 12 Probabilistic process calculi Catuscia Palamidessi LIX, Ecole Polytechnique.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
RPC Mixing: Making Mix-Nets Robust for Electronic Voting Ron Rivest MIT Markus Jakobsson Ari Juels RSA Laboratories.
CSE331: Introduction to Networks and Security Lecture 22 Fall 2002.
ITIS 6200/ Secure multiparty computation – Alice has x, Bob has y, we want to calculate f(x, y) without disclosing the values – We can only do.
1 Vipul Goyal Abhishek Jain UCLA On the Round Complexity of Covert Computation.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
A Survey Anonymity and Anonymous File-Sharing Tom Chothia (Joint work with Konstantinos Chatzikokolakis)
The Dining Cryptographer Problem Security Presentation Nitesh Patel 2005h425.
From: Cryptographers’ Track of the RSA Conference 2008 Date: Reporter: Yi-Chun Shih 1.
Eran Omri, Bar-Ilan University Joint work with Amos Beimel and Ilan Orlov, BGU Ilan Orlov…!??!!
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Lecture 4 1 Expressing Security Properties in CSP Security properties: the goals that a protocol is meant to satisfy, relatively to specific kinds and.
Probabilistic Methods in Concurrency Lecture 9 Other uses of randomization: a randomized protocol for anonymity Catuscia Palamidessi
Bangalore, 2 Feb 2005Probabilistic security protocols 1 CIMPA School on Security Specification and verification of randomized security protocols Lecture.
Probabilistic Methods in Concurrency Lecture 3 The pi-calculus hierarchy: separation results Catuscia Palamidessi
Modeling Insider Attacks on Group Key Exchange Protocols Jonathan Katz Ji Sun Shin University of Maryland.
Course on Probabilistic Methods in Concurrency (Concurrent Languages for Probabilistic Asynchronous Communication) Lecture 1 The pi-calculus and the asynchronous.
1 Complexity of Network Synchronization Raeda Naamnieh.
Explorations in Anonymous Communication Andrew Bortz with Luis von Ahn Nick Hopper Aladdin Center, Carnegie Mellon University, 8/19/2003.
Crowds: Anonymity for Web Transactions Paper by: Michael K. Reiter and Aviel D. Rubin, Presented by Eric M. Busse Portions excerpt from Crowds: Anonymity.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
Modelling and Analysing of Security Protocol: Lecture 9 Anonymous Protocols: Theory.
Modelling and Analysing of Security Protocol: Lecture 12 Probabilistic Modelling Checking of Anonymous Systems Tom Chothia CWI.
CS 711 Fall 2002 Programming Languages Seminar Andrew Myers 2. Noninterference 4 Sept 2002.
K-Anonymous Message Transmission Luis von Ahn Andrew Bortz Nick Hopper The Aladdin Center Carnegie Mellon University.
Information Theory and Security
Information-Theoretic Security and Security under Composition Eyal Kushilevitz (Technion) Yehuda Lindell (Bar-Ilan University) Tal Rabin (IBM T.J. Watson)
Information Theory and Security Prakash Panangaden McGill University First Canada-France Workshop on Foundations and Practice of Security Montréal 2008.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Paxos Made Simple Jinghe Zhang. Introduction Lock is the easiest way to manage concurrency Mutex and semaphore. Read and write locks. In distributed system:
Provable Protocols for Unlinkability Ron Berman, Amos Fiat, Amnon Ta-Shma Tel Aviv University.
Privacy and Anonymity CS432 - Security in Computing Copyright © 2005, 2006 by Scott Orr and the Trustees of Indiana University.
Provable Unlinkability Against Traffic Analysis Amnon Ta-Shma Joint work with Ron Berman and Amos Fiat School of Computer Science, Tel-Aviv University.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
Chapter 4: Intermediate Protocols
Privacy Enhancing Technologies Spring What is Privacy? “The right to be let alone” Confidentiality Anonymity Access Control Most privacy technologies.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Anonymity – Crowds R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Epistemic Strategies and Games on Concurrent Processes Prakash Panangaden: Oxford University (on leave from McGill University). Joint work with Sophia.
Summer 2004CS 4953 The Hidden Art of Steganography A Brief Introduction to Information Theory  Information theory is a branch of science that deals with.
MPRI – Course on Concurrency Probabilistic methods in Concurrency Catuscia Palamidessi INRIA Futurs and LIX
Introduction to Quantum Key Distribution
6 June Lecture 2 1 TU Dresden - Ws on Proof Theory and Computation Formal Methods for Security Protocols Catuscia Palamidessi Penn State University,
Probabilistic Anonymity Mohit Bhargava, IIT New Delhi Catuscia Palamidessi, INRIA Futurs & LIX.
Probabilistic and Nondeterministic Aspects of Anonymity Catuscia Palamidessi, INRIA & LIX Based on joint work with Mohit Bhargava, IIT New Delhi Kostas.
MPRI 3 Dec 2007Catuscia Palamidessi 1 Why Probability and Nondeterminism? Concurrency Theory Nondeterminism –Scheduling within parallel composition –Unknown.
Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
MPRI – Course on Concurrency Lectures 11 and 12 The pi-calculus expressiveness hierarchy Catuscia Palamidessi INRIA Futurs and LIX
MaskIt: Privately Releasing User Context Streams for Personalized Mobile Applications SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference.
CS 6204, Spring 2005 Dining Cryptographers, Glenn Fink1 Dining Cryptographers Paper by David Chaum (1988) Presentation by Glenn Fink.
Entropy (YAC- Ch. 6)  Introduce the thermodynamic property called Entropy (S)  Entropy is defined using the Clausius inequality  Introduce the Increase.
6 June Lecture 3 1 TU Dresden - Ws on Proof Theory and Computation Formal Methods for Security Protocols Catuscia Palamidessi Penn State university,
Software Security Seminar - 1 Chapter 4. Intermediate Protocols 발표자 : 이장원 Applied Cryptography.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
ECE 101 An Introduction to Information Technology Information Coding.
Lecture 4 1 Honnor Projects Supervised by Catuscia Palamidessi The  -calculus, a small language for specification and verification of concurrency and.
The Law of Averages. What does the law of average say? We know that, from the definition of probability, in the long run the frequency of some event will.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
16 January 2004LIX1 Equipe Comète Concurrency, Mobility, and Transactions Catuscia Palamidessi INRIA-Futurs and LIX.
PROBABILITY AND COMPUTING RANDOMIZED ALGORITHMS AND PROBABILISTIC ANALYSIS CHAPTER 1 IWAMA and ITO Lab. M1 Sakaidani Hikaru 1.
PROBABILITY AND PROBABILITY RULES
Probabilistic Methods in Concurrency Lecture 5 Basics of Measure Theory and Probability Theory Probabilistic Automata Catuscia Palamidessi
A Brief Introduction to Information Theory
Information Theoretical Analysis of Digital Watermarking
Anonymity – Generalizing Mixes
Presentation transcript:

Paris, 17 December 2007MPRI Course on Concurrency MPRI – Course on Concurrency Lecture 14 Application of probabilistic process calculi to security Catuscia Palamidessi LIX, Ecole Polytechnique Page of the course:

Paris, 17 December 2007MPRI Course on Concurrency 2 Plan of the lecture Randomized protocols for security Focus on protection of identity (anonymity) –The dining cryptographers Correctness of the protocol Anonymity analysis –Crowds (a protocol for anonymous web surfing)

Paris, 17 December 2007MPRI Course on Concurrency 3 Anonymity: particular case of Privacy To prevent information from becoming known to unintended agents or entities Protection of private data (credit card number, personal info etc.) Anonymity: protection of identity of an user performing a certain action Unlinkability: protection of link between information and user Unobservability: impossibility to determine what the user is doing More properties and details at

Paris, 17 December 2007MPRI Course on Concurrency 4 Anonymity Hide the identity of a user performing a given action The action itself might be revealed Many applications Anonymous web-surfing Anonymous posting on forums Elections Anonymous donation Protocols for anonymity often use randomization

Paris, 17 December 2007MPRI Course on Concurrency 5 The dining cryptographers A simple anonymity problem Introduced by Chaum in 1988 Chaum proposed a solution satisfying the so- called “strong anonymity”

Paris, 17 December 2007MPRI Course on Concurrency 6 The problem Three cryptographers share a meal with a master In the end the master decides who pays It can be himself, or a cryptographer The master informs each cryptographer individually The cryptographers want to find out if - one of them pays, or - it is the master who pays Anonymity requirement: the identity of the paying cryptographer (if any) should not be revealed C0C0 C1C1 Master Pay Don’t pay C1C1

Paris, 17 December 2007MPRI Course on Concurrency 7 The protocol C0C0 C1C1 C2C2 Coin agree / disagree Each pair of adjacent cryptographers flips a coin Each cryptographer has access only to its adjacent coins Each cryptographer looks at the coins and declares agree if the coins have the same value and disagree otherwise If a cryptographer is the payer he will say the opposite Consider the number of disagrees: odd: a cryptographer is paying even: the master is paying

Paris, 17 December 2007MPRI Course on Concurrency 8 Examples C0C0 C1C1 Heads Tails Heads disagree agree disagree C2C2 the master pays C0C0 C1C1 Tails Heads agree disagree agree C2C2 payer

Paris, 17 December 2007MPRI Course on Concurrency 9 Correctness of the protocol Let v i ∈ {0,1} be the value of coin i Each cryptographer announces v i-1 +v i where + is the sum modulo 2: - 0 means agree - 1 means disagree The payer announces v i-1 +v i +1 The total sum is - (v 0 +v 1 ) + (v 1 +v 2 ) + (v 2 +v 0 ) = 0 if the master pays - (v 0 +v 1 +1) + (v 1 +v 2 ) + (v 2 +v 0 ) = 1 if a cryptographer (C 1 ) pays C0C0 C1C1 C2C2 v1v1 v0v0 v2v2 v 0 +v 1 +1 v 1 +v 2 v 2 +v 0 payer

Paris, 17 December 2007MPRI Course on Concurrency 10 Correctness of the protocol The protocol is correct for any (connected) network graph The key idea is that all coins are added twice, so the cancel out Only the extra 1 added by the payer (if there is a payer) remains Note: this protocol could be extended to broadcast data anonymously, but the problem is that there in no distributed, efficient way to ensure that there is only one agent communicating the datum at each moment.

Paris, 17 December 2007MPRI Course on Concurrency 11 Anonymity of the protocol How can we define the notion of anonymity? First we have to fix the notion of observable: The anonymity property change depending on who is the observer / what actions he can see - An external observer can only see the declarations - One of the cryptographers can also see some of the coins

Paris, 17 December 2007MPRI Course on Concurrency 12 Notion of anonymity Observables... a1a1 amam o1o1 onon Protocol identity (info to be protected) Input Output Once we have fixed the observables, the protocol can be seen as a channel

Paris, 17 December 2007MPRI Course on Concurrency 13 Notion of anonymity Protocols are noisy channels... a1a1 amam o1o1 onon

Paris, 17 December 2007MPRI Course on Concurrency 14 Notion of anonymity Example: The protocol of the dining cryptographers C0C0 C2C2 aad C1C1 ada daa ddd

Paris, 17 December 2007MPRI Course on Concurrency 15 Notion of anonymity The conditional probabilities... a1a1 amam o1o1 onon p(o n |a 1 ) p(o 1 |a 1 )

Paris, 17 December 2007MPRI Course on Concurrency 16 Notion of anonymity The conditional probabilities form a matrix. In general the notion of anonymity will depend on these conditional probabilities... a1a1 amam o1o1 onon p(o n |a 1 )p(o 1 |a 1 ) p(o 1 |a m )p(o n |a m )...

Paris, 17 December 2007MPRI Course on Concurrency 17 Notions of strong anonymity In the following, a, a′ are hidden events, o is an observable 1. [Halpern and O’Neill - like] for all a, a′: p(a|o) = p(a′|o) 2. [Chaum], [Halpern and O’Neill]: for all a, o: p(a|o) = p(a) 3. [Bhargava and Palamidessi]: for all a, a′, o: p(o|a) = p(o|a′) (2) and (3) are equivalent. Exercise: prove it (1) is equivalent to (2),(3) plus p(a) = p(a′) for all a, a′ the condition for all a, a′ p(a) = p(a′) depends on the input’s distribution rather than on the features of the protocol

Paris, 17 December 2007MPRI Course on Concurrency 18 Anonymity in the Dining Cryptographers For an external observer the only observable actions are sequences of agree/disagree (daa, ada, aad,...) Strong anonymity: different payers produce the observables with equal probability p(daa | C 0 pays) = p(daa | C 1 pays) p(daa | C 0 pays) = p(daa | C 2 pays) p(ada | C 0 pays) = p(ada | C 1 pays)... This is equivalent to requiring that p(C i pays) = p(C i pays | o 0 o 1 o 2 )

Paris, 17 December 2007MPRI Course on Concurrency 19 Expressing the protocol in probabilistic (value passing) CCS Advantage: use model checker of probabilistic CCS to compute the conditional probabilities automatically

Paris, 17 December 2007MPRI Course on Concurrency 20 Expressing the protocol in probabilistic (value-passing) CCS Observables Anonymous action Probabilistic choices

Paris, 17 December 2007MPRI Course on Concurrency 21 Probabilistic automaton associated to the probabilistic π program for the D.C. aaa Assume we already fixed the scheduler

Paris, 17 December 2007MPRI Course on Concurrency 22 Anonymity of the protocol Assuming fair coins, we compute these probabilities Strong anonymity is satisfied daaadaaadddd C0C0C0C0 1/4 C1C1C1C1 C2C2C2C2

Paris, 17 December 2007MPRI Course on Concurrency 23 Anonymity of the protocol If the coins are unfair this is no longer true For example, if p(heads) = 0.7 Now if we see daa, we know that c1 is more likely to be the payer daaadaaadddd C0C0C0C C1C1C1C C2C2C2C

Paris, 17 December 2007MPRI Course on Concurrency 24 Anonymity of the protocol Even if we don’t know the fact that the coins are unfair, we could find out using statistical analysis Exercise: suppose we see almost all the time one of the following announcements ada aad daa - what can we infer about the coins? - then can we find the payer? - Now if we see daa, we know that C 0 is more likely to be the payer

Paris, 17 December 2007MPRI Course on Concurrency 25 Weaker notions of anonymity There are some problems in which it is practically impossible to achieve strong anonymity We need to define weaker notions In general, we need to give a quantitative characterization of the degree of protection provided by a protocol

Paris, 17 December 2007MPRI Course on Concurrency 26 Example: Crowds A protocol for anonymous web surfing goal: send a request from a user (initiator) to a web serer problem: sending the message directly reveals the user’s identity more efficient that the dining cryptographers: involves only a small fraction of the users in each execution server

Paris, 17 December 2007MPRI Course on Concurrency 27 Crowds server A “crowd” of n users participates in the protocol The initiator forwards the message to a randomly selected user (forwarder) A forwarder: With probability p f forwards again the message With probability 1-p f send the message directly to the server

Paris, 17 December 2007MPRI Course on Concurrency 28 Anonymity of the protocol server Wrt the server: strong anonymity. The server sees only the last user More interesting case: some user is corrupted Information gathered by the corrupted user can be used to detect the initiator

Paris, 17 December 2007MPRI Course on Concurrency 29 Anonymity of the protocol In presence of corrupted users: strong anonymity is no longer satisfied A weaker notion called “probable innocence” can be achieved, defined as: “the detected user is less likely to be the initiator than not to be the initiator” Formally: p(u is initiator | u is detected) < p(u is not initiator | u is detected)

Paris, 17 December 2007MPRI Course on Concurrency 30 Degree of protection: an Information-theoretic approach We can use (the converse of) the mutual information as a measure of the degree of protection of the protocol

Paris, 17 December 2007MPRI Course on Concurrency 31 Open problems Information protection is a very active field of research. There are many open problems. For instance: Make model-checking more efficient for the computation of conditional probabilities Active attackers: how does the model of protocol-as-channel change? Inference of the input distribution from the observers

Paris, 17 December 2007MPRI Course on Concurrency 32 Bibliography K. Chatzikokolakis, C. Palamidessi, P. Panangaden. Anonymity Protocols as Noisy Channels. Information and Computation.To appear D. Chaum. The Dining Cryptographers Problem. Journal of Cryptology, 1, , J. Y. Halpern and K. R. O'Neill. Anonymity and information hiding in multiagent systems. Journal of Computer Security, 13(3), , 2005