Robust Sender Anonymity Tamara Rezk - PowerPoint PPT Presentation

1 / 50
About This Presentation
Title:

Robust Sender Anonymity Tamara Rezk

Description:

Case study: DC-Nets. Robustness was not what we expected it to be. Work: definition of robustness ... there is a valid padding, except for at most one position. ... – PowerPoint PPT presentation

Number of Views:57
Avg rating:3.0/5.0
Slides: 51
Provided by: Tama194
Category:

less

Transcript and Presenter's Notes

Title: Robust Sender Anonymity Tamara Rezk


1
Robust Sender AnonymityTamara Rezk
  • FMCrypto (work in progress)
  • G.Barthe, A.Hevia, Z.Luo, T.Rezk, B.Warinschi
  • April, 28th Campinas, Brazil

2
Anonymity Protocols
  • Hide the identity associated to a message
  • The message may be public. Examplevoting
  • Different kind of anonymity properties

3
Anonymity Properties
  • Receiver anonymity
  • Sender Unlinkability (SUL)
  • Receiver Unlinkability (RUL)
  • Sender-Receiver Unlinkability (UL)
  • Sender Anonymity (SA)
  • Strong Sender Anonymity (SA)
  • Receiver Anonymity (RA)
  • Strong Receiver Anonymity (RA)
  • Sender-Receiver Anonymity (SRA)
  • Unobservability (UO)
  • Sender Unlinkability (SUL)
  • Receiver Unlinkability (RUL)
  • Sender-Receiver Unlinkability (UL)
  • Sender Anonymity (SA)
  • Strong Sender Anonymity (SA)
  • Receiver Anonymity (RA)
  • Strong Receiver Anonymity (RA)
  • Sender-Receiver Anonymity (SRA)
  • Unobservability (UO)

4
Anonymity Properties Characterizations
MicciancioHevia06
4
3
2
1
8
7
6
5
a
1
5
a
1
b
b
2
6
2
a
a
3
7
3
c
8
c
4
d
4
d
M
5
6
7
8
mij sets of messages from party i to party j
(Thanks Alejandro for this slide)
5
Capturing information leaks
  • By restricting the matrix pair M0,M1
  • Let f(M) be the information leaked
  • Requirement f(M0) f(M1)
  • Example of leaked information

(Thanks Alejandro for this slide)
6
The anonymity property for protocol PHypothesis
f(M0) f(M1)
  • CAb 0,1
  • if (b 0)
  • then m M0
  • else m M1
  • S ? P(m)
  • g ? A(S,f(m))

PrCA g b - ½ is negligible on the
security parameter
7
Motivation
  • Anonymity in the case of active adversaries
  • Case study DC-Nets

8
Motivation
  • Anonymity in the case of active adversaries
  • Case study DC-Nets
  • Robustness was not what we expected it to be
  • Work definition of robustness

9
Robust anonymous protocol
  • A protocol that is anonymous (it does not leak
    the identity of the participants)

10
Robust anonymous protocol
  • A protocol that is anonymous even if some of the
    participants are corrupt

11
Robust anonymous protocol
  • A protocol that is anonymous even if some of the
    participants are corrupt
  • Honest messages can be delivered even if
    dishonest participants do not follow the protocol

12
Robust anonymous protocol
  • Anonymity property for active adversaries
  • Robustness property

13
The anonymity property for protocol Pfor active
adversariesHypothesis f(M0) f(M1)
  • CRAb 0,1
  • if (b 0)
  • then m M0
  • else m M1
  • g? AP(m) (f(m))

PrCRA g b - ½ is negligible on the
security parameter
14
Dinning Cryptographersall started in a
restaurant
15
Dinning Cryptographers Protocol (DC-nets)
  • Bitwise XOR Chaum88
  • Not robust
  • Bilinear Maps GolleJuels04
  • Robust
  • What does exactly the word robust assure?

16
The robust DC-nets protocol 1/4
inizialization
  • In this phase
  • a non-degenerate pairing e G1 x G1 ? G2
  • generators g, h of a cyclic group G1
  • a hash function H 0,1 ? G1
  • a private key xi and public key yi gxi
    (secret xi is (t,n)-shared )
  • a common reference string

17
The robust DC-nets protocol 2/4
inizialization
transmission
In this phase each participant computes a vector
that contains a padding and a unique message
that cannot be distinguished from the padding.
18
transmission
1/3
In this phase each participant computes a vector
that contains a padding and a unique message
that cannot be distinguished from the padding.
1
2
i
n
19
transmission
2/3
In this phase each participant computes a vector
that contains a padding and a unique message
that cannot be distinguished from the padding.
1
  • e(H(s2), yj)xic
  • j?i

2
i
n
20
transmission
3/3
In this phase each participant computes a vector
that contains a padding and a unique message
that cannot be distinguished from the padding.
1
  • e(H(s2), yj)xic
  • j?i

2
Padding participant i. Coefficient c is 1 if iltj
or -1 otherwise.
i
n
21
transmission
3/3
In this phase each participant computes a vector
that contains a padding and a unique message
that cannot be distinguished from the padding.
  • e(H(s2), yj)xic
  • j?i
  • m

1
2
i
Message m transmission
n
22
transmission
If each participant transmits exactly one message
without collisions then multiplication of vectors
yields the messages.
Vector Party 1
Vector Party n
1
1
1
1
m1 m2 mn
2
2
2
2



n
n
n
n
23
transmission
Example for 2 paticipants n2 1/9
24
transmission
Example for 2 paticipants n2 2/9
Vector Party 1
25
transmission
Example for 2 paticipants n2 3/9
Vector Party 1
Vector Party 2
26
transmission
Example for 2 paticipants n2 4/9
m1 m2
1


2
Vector Party 1
Vector Party 2
transmission result
27
transmission
Example for 2 paticipants n2 5/9
e(H(s1), y2)x1 e(H(s1), y1)-x2 m1
m1 m2
1


2
Vector Party 1
Vector Party 2
transmission result
28
transmission
Example for 2 paticipants n2 6/9
e(H(s1), y2)x1 e(H(s1), y1)-x2 m1
public key inlining e(H(s1), x2g)x1
e(H(s1), x1g)-x2 m1
m1 m2
1


2
Vector Party 1
Vector Party 2
transmission result
29
transmission
Example for 2 paticipants n2 7/9
e(H(s1), y2)x1 e(H(s1), y1)-x2 m1
public key inlining e(H(s1), x2g)x1
e(H(s1), x1g)-x2 m1 bilinearity
e(H(s1), x1x2g) e(H(s1), x2x1g)-1 m1
m1 m2
1


2
Vector Party 1
Vector Party 2
transmission result
30
transmission
Example for 2 paticipants n2 8/9
e(H(s1), y2)x1 e(H(s1), y1)-x2 m1
public key inlining e(H(s1), x2g)x1
e(H(s1), x1g)-x2 m1 bilinearity
e(H(s1), x1x2g) e(H(s1), x2x1g)-1 m1
conmutativity e(H(s1), x1x2g) e(H(s1),
x1x2g)-1 m1
m1 m2
1


2
Vector Party 1
Vector Party 2
transmission result
31
transmission
Example for 2 paticipants n2 9/9
e(H(s1), y2)x1 e(H(s1), y1)-x2 m1
public key inlining e(H(s1), x2g)x1
e(H(s1), x1g)-x2 m1 bilinearity
e(H(s1), x1x2g) e(H(s1), x2x1g)-1 m1
conmutativity e(H(s1), x1x2g) e(H(s1),
x1x2g)-1 m1 inverse m1
m1 m2
1


2
Vector Party 1
Vector Party 2
transmission result
32
transmission
If there is a collision, or the padding is
incorrect, or there is more than one message in
the vector, recuperation of messages fail!
Vector Party 1
Vector Party n
1
1
1
1
m1 m2 mn
2
2
2
2



n
n
n
n
33
transmission
Vectors are transmitted with a proof of knowledge
(zkpk)
For all positions in the vector there is a valid
padding, except for at most one position.
34
The robust DC-nets protocol 3/4
inizialization
transmission
reconstruction
In this phase each participant computes a vector
that contains a padding and a unique message
that cannot be distinguished from the padding.
35
reconstruction
In this phase if a proof of knowledge does not
verify then the vector of the dishonest
participant is reconstructed using trheshold
cryptography
After this phase, we are left with a set of valid
vectors , that is
For all positions in the vector there is a valid
padding, except for at most one position.
36
The robust DC-nets protocol 4/4
inizialization
transmission
reconstruction
recuperation
37
recuperation
In this phase All vectors are correct (honest
participants or recovered vectors). Messages are
recuperated by multiplication.
Vector Party 1
Vector Party n
1
1
1
1
m1 m2 mn
2
2
2
2



n
n
n
n
38
What does exactly the word robust assure?
  • If the vector is correct, then there is a unique
    message in the vector
  • An adversary may violate the slot reservation
    protocol to intentionally produce a collision
  • For each collision, one honest message is not
    delivered

39
Robustness property
  • We propose to state this formally by definning a

40
Sender robustness, t-n
SR M,N ? A0 m MN S? PA(m)
if ((M?S) lt 2t-n) then b1 else
b0
PrSR b1 is negligible on the security
parameter
41
Sender Robustness Violation 1 Example for 2
paticipants n2
???? m2
1


2
Vector Party 1
Vector Party 2
transmission result
42
Sender Robustness Violation 2 Example for 2
paticipants n2
???? m2
1


2
Vector Party 1
Vector Party 2
transmission result
43
Sender Robustness Example for 2 paticipants
n2
m1m2 m2
1


2
Vector Party 1
Vector Party 2
transmission result
This is considered secure!
44
A stronger robustness propertyConfusion
resistant t-n
CR M,N ? A0 m MN S? PA(m)
if honest received lt honest-dishonest then
b1 else b0
PrCR b1 is negligible on the security
parameter
45
A stronger robustness propertyConfusion
resistant t-n
CR M,N ? A0 m MN S? PA(m)
if honest not receiveddishonest received gt
dishonest. then b1 else b0
PrCR b1 is negligible on the security
parameter
46
A stronger robustness propertyConfusion
resistant t-n
CR M,N ? A0 m MN S? PA(m)
if ((S\M) (M\S) gt n-t) then b1
else b0
PrCR b1 is negligible on the security
parameter
47
Confussion Resistant Violation Example for 2
paticipants n2
m1m2 m2
1


2
Vector Party 1
Vector Party 2
transmission result
48
Theorems and Remarks
  • Theo DC-Nets is sender anonymous
  • Theo DC-Nets is sender robust
  • Remark DC-Nets is not confussion resistant

49
Theorems and Remarks
  • Theo DC-Nets is sender anonymous
  • Theo DC-Nets is sender robust
  • Remark DC-Nets is not confussion resistant
  • Solution? messages should be sealed in such a
    way that multiplication of two seals produces
    another seal only with negligible probability

50
Conclusions
  • We have a proposed 2 properties to formally
    specify robustness of sender anonymous protocols
  • We have detected GJ protocol satisfies only a
    weak form of robustness, and proposed a stronger
    version of the protocol
  • Open questions how to implement the stronger
    GJ?, how all these definitions extend to other
    forms of anonymity? generic conversion to
    stronger robustness?
Write a Comment
User Comments (0)
About PowerShow.com