Not all is lost for anonymity – but quite a lot is.
Debajyoti Das1 Sebastian Meiser2 Esfandiar Mohammadi3 Aniket Kate1
1Purdue University 2Visa Research 3ETH Zurich
1
but quite a lot is. Coordination among users can help with - - PowerPoint PPT Presentation
Not all is lost for anonymity but quite a lot is. Coordination among users can help with anonymity. Debajyoti Das 1 Sebastian Meiser 2 Esfandiar Mohammadi 3 Aniket Kate 1 1 Purdue University 2 Visa Research 3 ETH Zurich 1 Sender Anonymity
Debajyoti Das1 Sebastian Meiser2 Esfandiar Mohammadi3 Aniket Kate1
1Purdue University 2Visa Research 3ETH Zurich
1
Alice
Eve
2
Bob
Pr[Eve:“Alice”| Alice sends message] ≤ Pr[Eve:“Alice”| Bob sends message] + δ(η)
Alice
Eve
2
Bob
Pr[Eve:“Alice”| Alice sends message] ≤ Pr[Eve:“Alice”| Bob sends message] + δ(η) strong: δ(η) ≤ negl(η)
Alice
Eve
2
Bob
Pr[Eve:“Alice”| Alice sends message] ≤ Pr[Eve:“Alice”| Bob sends message] + δ(η) strong: δ(η) ≤ negl(η)
anonymity without introducing large latency or bandwidth overhead?
3
strong anonymity low latency
low bandwidth
anonymity without introducing large latency or bandwidth overhead?
3
strong anonymity low latency
low bandwidth
anonymity without introducing large latency or bandwidth overhead?
3
Low = constant(η)
strong anonymity low latency
low bandwidth
anonymity without introducing large latency or bandwidth overhead?
3
Low = constant(η)
strong anonymity low latency
low bandwidth
IEEE S&P 2018
4
S R Latency overhead l = 4 Bandwidth overhead β = 2
5
6
2l (β+p’) = 1
latency l δ = negl(η) bandwidth β
7
2l (β+p’) = 1
latency l 2(l −c)β ≥ 1 when c>0 bandwidth β
l in θ(1)
7
2l (β+p’) = 1
latency l 2(l −c)β ≥ 1 when c>0 bandwidth β
l in θ(1)
8
8
8
Our earlier protocol model did not assume any out-of-band user coordination.
9
Alice Eve Bob Charlie
Eve can retrieves the actual message only after combining all three packets.
9
Issue: these protocols use very high bandwidth overhead. The overhead (number of dummy messages) per real message, B > (N-1), N = total users.
Alice Eve Bob Charlie
Eve can retrieves the actual message only after combining all three packets.
1 2 3
10
Alice Eve Bob Charlie Debo
1 2 3
10
Bob and Charlie send shares for Alice’s message, with some pre-setup, without Alice communicating to them.
Alice Eve Bob Charlie Debo
1 2 3
10
Bob and Charlie send shares for Alice’s message, with some pre-setup, without Alice communicating to them.
Alice Eve Bob Charlie
Eve can retrieves the actual message only after combining all three packets.
Debo
1 2 3
11
Alice Eve1 Eve2 Bob Charlie
1 2 3
11
Alice Eve1 Eve2 Bob Charlie
1 2 3
11
Assumption 1: One packet does not take part in the reconstruction of two separate messages.
Alice Eve1 Eve2 Bob Charlie
1 2 3
12
Alice Eve Bob
1 2 3
12
Assumption 2: Oblivious swapping is not possible.
Alice Eve Bob
1 2 3
12
Assumption 2: Oblivious swapping is not possible.
Alice Eve Bob
r r- l t0 t1 t2
Alice Bob Bob
13
Protocol Alice at time r at time t0 Bob after (r- l ) Eve
r r- l t0 t1 t2
Alice Bob Bob
13
Protocol Alice at time r at time t0 Bob after (r- l ) Eve
r r- l t0 t1 t2
Alice Bob Bob
13
Protocol Alice at time r at time t0 Bob after (r- l ) Eve
2l (β+p’) = 1
14
latency l δ = negl(η) bandwidth β
2l (β+p’) = 1
14
latency l δ = negl(η) bandwidth β
The basic trilemma still holds, except l =0.
15
15
15
15
2l (β+p’) = 1
latency l
15
2l (β+p’) = 1
latency l 2(l −c)β ≥ 1 when c>0
15
2l (β+p’) = 1
latency l 2(l −c)β ≥ 1 when c>0
16
K: total number of intermediate protocol parties (routers/nodes), c: total number of compromised parties out of K parties, p: the probability that a user sends a message in a round, η: security parameter, l : latency overhead
focus on hybrid protocols, to at least achieve resistance against compromization.
specified by the trilemma: 2l (β+p’) ≥ 1.
for 2l (β+p’) = 1, then that will be the
17
2l (β+p’) = 1
latency l when c>0 bandwidth β
18
2l (β+p’) = 1
latency l bandwidth β when c>0
18
2l (β+p’) = 1
latency l bandwidth β when c>0
Still strong anonymity will be impossible for 2l (β+p’) < 1
19
Challenge 2: Break Assumption 1. If a protocol can use a secret sharing scheme that generates w < k*n shares for n messages such that k shares are sufficient to reconstruct all the n messages correctly, without using any trusted third party, with a communication of O(n) and constant latency overhead, that protocol can break anonymity trilemma.
20
@tutaidas das48@purdue.edu