but quite a lot is. Coordination among users can help with - - PowerPoint PPT Presentation

but quite a lot is
SMART_READER_LITE
LIVE PREVIEW

but quite a lot is. Coordination among users can help with - - PowerPoint PPT Presentation

Not all is lost for anonymity but quite a lot is. Coordination among users can help with anonymity. Debajyoti Das 1 Sebastian Meiser 2 Esfandiar Mohammadi 3 Aniket Kate 1 1 Purdue University 2 Visa Research 3 ETH Zurich 1 Sender Anonymity


slide-1
SLIDE 1

Not all is lost for anonymity – but quite a lot is.

Debajyoti Das1 Sebastian Meiser2 Esfandiar Mohammadi3 Aniket Kate1

1Purdue University 2Visa Research 3ETH Zurich

1

Coordination among users can help with anonymity.

slide-2
SLIDE 2

Sender Anonymity (AnoA definition)

Alice

Eve

2

Bob

Pr[Eve:“Alice”| Alice sends message] ≤ Pr[Eve:“Alice”| Bob sends message] + δ(η)

slide-3
SLIDE 3

Sender Anonymity (AnoA definition)

Alice

Eve

2

Bob

Pr[Eve:“Alice”| Alice sends message] ≤ Pr[Eve:“Alice”| Bob sends message] + δ(η) strong: δ(η) ≤ negl(η)

slide-4
SLIDE 4

Sender Anonymity (AnoA definition)

Alice

Eve

2

Bob

Pr[Eve:“Alice”| Alice sends message] ≤ Pr[Eve:“Alice”| Bob sends message] + δ(η) strong: δ(η) ≤ negl(η)

slide-5
SLIDE 5

Anonymity Trilemma

  • Q1: Can we achieve strong

anonymity without introducing large latency or bandwidth overhead?

3

strong anonymity low latency

  • verhead

low bandwidth

  • verhead
slide-6
SLIDE 6

Anonymity Trilemma

  • Q1: Can we achieve strong

anonymity without introducing large latency or bandwidth overhead?

  • NO.

3

strong anonymity low latency

  • verhead

low bandwidth

  • verhead
slide-7
SLIDE 7

Anonymity Trilemma

  • Q1: Can we achieve strong

anonymity without introducing large latency or bandwidth overhead?

  • NO.

3

Low = constant(η)

strong anonymity low latency

  • verhead

low bandwidth

  • verhead
slide-8
SLIDE 8

Anonymity Trilemma

  • Q1: Can we achieve strong

anonymity without introducing large latency or bandwidth overhead?

  • NO.

3

Low = constant(η)

strong anonymity low latency

  • verhead

low bandwidth

  • verhead

IEEE S&P 2018

slide-9
SLIDE 9

Outline

❖ Prior Results on Anonymity Trilemma ❖ How coordination among users can help anonymity ❖ New impossibility results for anonymity ❖ Future direction of anonymity communication protocols

4

slide-10
SLIDE 10

Bandwidth Overhead and Latency Overhead

  • We consider one communication round as one time unit.
  • Latency overhead l is the number of rounds a message can be delayed

by the protocol before being delivered.

  • Bandwidth overhead β is the number
  • f noise messages per user per round,

i.e., the dummy message rate.

S R Latency overhead l = 4 Bandwidth overhead β = 2

5

slide-11
SLIDE 11

Prior Results for mix-nets (including onion routing)

  • When users send messages at

a rate of p’ per user per round, To achieve strong anonymity:

2l (β+p’) ≥ 1

6

2l (β+p’) = 1

latency l δ = negl(η) bandwidth β

slide-12
SLIDE 12

When Adversary can compromise c protocol parties

  • to achieve strong anonymity:
  • l > θ(1)

7

2l (β+p’) = 1

latency l 2(l −c)β ≥ 1 when c>0 bandwidth β

l in θ(1)

  • 2(l −c)β ≥ 1, when l > c.
slide-13
SLIDE 13

When Adversary can compromise c protocol parties

  • to achieve strong anonymity:
  • l > θ(1)

7

2l (β+p’) = 1

latency l 2(l −c)β ≥ 1 when c>0 bandwidth β

l in θ(1)

  • 2(l −c)β ≥ 1, when l > c.
slide-14
SLIDE 14

Is it impossible to achieve strong anonymity with constant latency overhead, when c>0 ?

8

slide-15
SLIDE 15

Is it impossible to achieve strong anonymity with constant latency overhead, when c>0 ?

8

  • NO.
  • Example: DC-net with user coordination.
slide-16
SLIDE 16

Is it impossible to achieve strong anonymity with constant latency overhead, when c>0 ?

8

  • NO.
  • Example: DC-net with user coordination.

Our earlier protocol model did not assume any out-of-band user coordination.

slide-17
SLIDE 17

DC-net type protocols – user coordination

  • Eve cannot point to a single packet to say

the real message is only inside this packet.

  • Another naïve way is to secret share the

real message among several parties.

  • Can provide strong anonymity

even with constant latency.

9

Alice Eve Bob Charlie

Eve can retrieves the actual message only after combining all three packets.

slide-18
SLIDE 18

DC-net type protocols – user coordination

  • Eve cannot point to a single packet to say

the real message is only inside this packet.

  • Another naïve way is to secret share the

real message among several parties.

  • Can provide strong anonymity

even with constant latency.

9

Issue: these protocols use very high bandwidth overhead. The overhead (number of dummy messages) per real message, B > (N-1), N = total users.

Alice Eve Bob Charlie

Eve can retrieves the actual message only after combining all three packets.

slide-19
SLIDE 19

Protocols beyond mix-nets –hybrid protocols

1 2 3

10

Alice Eve Bob Charlie Debo

slide-20
SLIDE 20

Protocols beyond mix-nets –hybrid protocols

1 2 3

10

Bob and Charlie send shares for Alice’s message, with some pre-setup, without Alice communicating to them.

Alice Eve Bob Charlie Debo

slide-21
SLIDE 21

Protocols beyond mix-nets –hybrid protocols

1 2 3

10

Bob and Charlie send shares for Alice’s message, with some pre-setup, without Alice communicating to them.

Alice Eve Bob Charlie

Eve can retrieves the actual message only after combining all three packets.

Debo

slide-22
SLIDE 22

Assumptions on the protocols

1 2 3

11

Alice Eve1 Eve2 Bob Charlie

slide-23
SLIDE 23

Assumptions on the protocols

1 2 3

11

Alice Eve1 Eve2 Bob Charlie

slide-24
SLIDE 24

Assumptions on the protocols

1 2 3

11

Assumption 1: One packet does not take part in the reconstruction of two separate messages.

Alice Eve1 Eve2 Bob Charlie

slide-25
SLIDE 25

Assumptions on the protocols

1 2 3

12

Alice Eve Bob

slide-26
SLIDE 26

Assumptions on the protocols

1 2 3

12

Assumption 2: Oblivious swapping is not possible.

Alice Eve Bob

slide-27
SLIDE 27

Assumptions on the protocols

1 2 3

12

Assumption 2: Oblivious swapping is not possible.

Alice Eve Bob

slide-28
SLIDE 28

Necessary Invariant for Anonymity

For anonymity we need:

  • Bob sends at least one message within the time slice [r- l , r).

r r- l t0 t1 t2

Alice Bob Bob

13

Protocol Alice at time r at time t0 Bob after (r- l ) Eve

slide-29
SLIDE 29

Necessary Invariant for Anonymity

For anonymity we need:

  • Bob sends at least one message within the time slice [r- l , r).

r r- l t0 t1 t2

Alice Bob Bob

13

Protocol Alice at time r at time t0 Bob after (r- l ) Eve

slide-30
SLIDE 30

Necessary Invariant for Anonymity

For anonymity we need:

  • Bob sends at least one message within the time slice [r- l , r).
  • At least one of the packets helping the message from Alice meets a

message from Bob at an honest node.

r r- l t0 t1 t2

Alice Bob Bob

13

Protocol Alice at time r at time t0 Bob after (r- l ) Eve

slide-31
SLIDE 31

2l (β+p’) = 1

Results are same when no parties are compromised

  • To achieve strong anonymity:

14

latency l δ = negl(η) bandwidth β

2l (β+p’) ≥ 1

slide-32
SLIDE 32

2l (β+p’) = 1

Results are same when no parties are compromised

  • To achieve strong anonymity:

14

latency l δ = negl(η) bandwidth β

The basic trilemma still holds, except l =0.

2l (β+p’) ≥ 1

slide-33
SLIDE 33

Quantum of Solace: when protocol parties are compromised

15

slide-34
SLIDE 34

Quantum of Solace: when protocol parties are compromised

  • If strong anonymity is not

required, user coordination could allow better anonymity.

15

slide-35
SLIDE 35

Quantum of Solace: when protocol parties are compromised

  • If strong anonymity is not

required, user coordination could allow better anonymity.

  • Better resistance against

compromization.

15

slide-36
SLIDE 36

Quantum of Solace: when protocol parties are compromised

  • If strong anonymity is not

required, user coordination could allow better anonymity.

  • Better resistance against

compromization.

15

2l (β+p’) = 1

latency l

slide-37
SLIDE 37

Quantum of Solace: when protocol parties are compromised

  • If strong anonymity is not

required, user coordination could allow better anonymity.

  • Better resistance against

compromization.

15

2l (β+p’) = 1

latency l 2(l −c)β ≥ 1 when c>0

slide-38
SLIDE 38

Quantum of Solace: when protocol parties are compromised

  • If strong anonymity is not

required, user coordination could allow better anonymity.

  • Better resistance against

compromization.

15

2l (β+p’) = 1

latency l 2(l −c)β ≥ 1 when c>0

slide-39
SLIDE 39

Effect of coordination: resistance against compromised protocol parties

16

K: total number of intermediate protocol parties (routers/nodes), c: total number of compromised parties out of K parties, p: the probability that a user sends a message in a round, η: security parameter, l : latency overhead

slide-40
SLIDE 40

Takeaways

  • Our work points protocol designers to

focus on hybrid protocols, to at least achieve resistance against compromization.

  • Still we can not do better than the limit

specified by the trilemma: 2l (β+p’) ≥ 1.

  • If a protocol achieves strong anonymity

for 2l (β+p’) = 1, then that will be the

  • ptimal ACN.

17

2l (β+p’) = 1

latency l when c>0 bandwidth β

slide-41
SLIDE 41

Leap of faith:

18

Challenge: Achieve oblivious swapping at a dishonest node.

2l (β+p’) = 1

latency l bandwidth β when c>0

slide-42
SLIDE 42

Leap of faith:

18

Challenge: Achieve oblivious swapping at a dishonest node.

2l (β+p’) = 1

latency l bandwidth β when c>0

Still strong anonymity will be impossible for 2l (β+p’) < 1

slide-43
SLIDE 43

A New Hope:

19

Challenge 2: Break Assumption 1. If a protocol can use a secret sharing scheme that generates w < k*n shares for n messages such that k shares are sufficient to reconstruct all the n messages correctly, without using any trusted third party, with a communication of O(n) and constant latency overhead, that protocol can break anonymity trilemma.

slide-44
SLIDE 44

Thank you. ☺

20

http://bit.ly/AnonymityTrilemma

@tutaidas das48@purdue.edu