Privacy-Preserv rving Im Implicit Authentication
Nashad Safa Rei Safavi-Naini Siamak Shahandashti
Authentication Nashad Safa Rei Safavi-Naini Siamak Shahandashti 2 - - PowerPoint PPT Presentation
Privacy-Preserv rving Im Implicit Authentication Nashad Safa Rei Safavi-Naini Siamak Shahandashti 2 Outline Device, Implicit Authentication Usage patterns, authentication decision making Cost: privacy! Our Basic Protocol
Nashad Safa Rei Safavi-Naini Siamak Shahandashti
ncl.ac.uk
IFIP SEC 2014
2
4 June 2014
ncl.ac.uk
IFIP SEC 2014
3
4 June 2014
Authentication Protocol Device Carrier
ncl.ac.uk
IFIP SEC 2014
4
App Server
4 June 2014
Jakobsson, Shi, Golle, Chow – USENIX 2009
ncl.ac.uk
Usage pattern history needs to be stored on the carrier side!
= ability to mimic (physically or artificially) the usage pattern = loss of authentication security! = loss of privacy!
IFIP SEC 2014
5
4 June 2014
ncl.ac.uk
implicit authentication
IFIP SEC 2014
6
4 June 2014
ncl.ac.uk
a collection of clusters e.g. based on time of day
IFIP SEC 2014
7
4 June 2014
ncl.ac.uk
𝑦 +𝑒 −𝑒
between 𝑦 − 𝑒 and 𝑦 + 𝑒
recorded in the history
calculation of dispersion 𝑒
IFIP SEC 2014
8
4 June 2014
ncl.ac.uk
IFIP SEC 2014
9 Boldyreva et al. EuroCrypt’09
4 June 2014
ncl.ac.uk
Basic idea:
stored on the carrier side as history: 𝐼. 𝐹𝑜𝑑 𝑤 𝑢𝑗 , 𝑃𝑄. 𝐹𝑜𝑑 𝑤 𝑢𝑗 Pre-computation:
encrypted median, calculates average absolute deviation (AAD): 𝐼. 𝐹𝑜𝑑 𝐵𝐵𝐸 𝑤
IFIP SEC 2014
10
4 June 2014
ncl.ac.uk
Authentication:
𝐼. 𝐹𝑜𝑑 𝑤 𝑢𝑗 − 𝐵𝐵𝐸 𝑤 , 𝐼. 𝐹𝑜𝑑 𝑤 𝑢𝑗 + 𝐵𝐵𝐸 𝑤
𝑃𝑄. 𝐹𝑜𝑑 𝑤 𝑢𝑗 − 𝐵𝐵𝐸 𝑤 , 𝑃𝑄. 𝐹𝑜𝑑 𝑤 𝑢𝑗 + 𝐵𝐵𝐸 𝑤
Update:
IFIP SEC 2014
11
4 June 2014
ncl.ac.uk
honest-but-curious carrier
long as the device is not ‘hacked’
IFIP SEC 2014
12
4 June 2014
ncl.ac.uk
𝐼. 𝐹𝑜𝑑 𝑤 𝑢𝑗
ciphertexts
with history records via binary tree search
IFIP SEC 2014
13 Baudron et al. PODC’01
4 June 2014
ncl.ac.uk
cheat
still might cheat
might still cheat, but will be caught with high probability
4 June 2014 IFIP SEC 2014
14
ncl.ac.uk
Cost of privacy for device: encryption
IFIP SEC 2014
15
4 June 2014
ncl.ac.uk
loss of device
the trade-off between privacy & security is a false one!
IFIP SEC 2014
16
4 June 2014
Full version: Contact me: eprint.iacr.org/2014/203 siamak.shahandashti@ncl.ac.uk www.esperez.com