ClaimChain A Decentralized Public Key Infrastructure based on - - PowerPoint PPT Presentation

claimchain
SMART_READER_LITE
LIVE PREVIEW

ClaimChain A Decentralized Public Key Infrastructure based on - - PowerPoint PPT Presentation

ClaimChain A Decentralized Public Key Infrastructure based on Cross-Referenced Hash chains Marios Isaakidis, George Danezis @ UCL Bogdan Kulynych , Carmela Troncoso @ IMDEA December 28, 2016 bogdankulynych.me/33c3 Bogdan Kulynych PhD student,


slide-1
SLIDE 1

ClaimChain

A Decentralized Public Key Infrastructure based on Cross-Referenced Hash chains

Marios Isaakidis, George Danezis @ UCL Bogdan Kulynych, Carmela Troncoso @ IMDEA December 28, 2016

bogdankulynych.me/33c3

slide-2
SLIDE 2

Bogdan Kulynych PhD student, IMDEA Software Institute, Madrid Twitter: @hiddenmarkov Email: bogdan.kulynych at imdea.org NEXTLEAP project nextleap.eu

1

slide-3
SLIDE 3

Goals ClaimChain basics Cross-Referencing Supporting infrastructure Privacy and Security

2

slide-4
SLIDE 4

Work in progress

2

slide-5
SLIDE 5

Goals

slide-6
SLIDE 6

Modern Key Management needs

  • Frequent key updates
  • Support for ephemeral keys, OTR, Bitcoin wallets…
  • Multi-device support
  • Better handling of key compromisation/loss
  • Interoperability with legacy agents
  • Better Web of Trust
  • Privacy of the social graph
  • Also vouching for the “state” of a PGP key

3

slide-7
SLIDE 7

Modern Key Management needs

  • Frequent key updates
  • Support for ephemeral keys, OTR, Bitcoin wallets…
  • Multi-device support
  • Better handling of key compromisation/loss
  • Interoperability with legacy agents
  • Better Web of Trust
  • Privacy of the social graph
  • Also vouching for the “state” of a PGP key

3

slide-8
SLIDE 8

Modern Key Management needs

  • Frequent key updates
  • Support for ephemeral keys, OTR, Bitcoin wallets…
  • Multi-device support
  • Better handling of key compromisation/loss
  • Interoperability with legacy agents
  • Better Web of Trust
  • Privacy of the social graph
  • Also vouching for the “state” of a PGP key

3

slide-9
SLIDE 9

Modern Key Management needs

  • Frequent key updates
  • Support for ephemeral keys, OTR, Bitcoin wallets…
  • Multi-device support
  • Better handling of key compromisation/loss
  • Interoperability with legacy agents
  • Better Web of Trust
  • Privacy of the social graph
  • Also vouching for the “state” of a PGP key

3

slide-10
SLIDE 10

Modern Key Management needs

  • Frequent key updates
  • Support for ephemeral keys, OTR, Bitcoin wallets…
  • Multi-device support
  • Better handling of key compromisation/loss
  • Interoperability with legacy agents
  • Better Web of Trust
  • Privacy of the social graph
  • Also vouching for the “state” of a PGP key

3

slide-11
SLIDE 11

Modern Key Management needs

  • Frequent key updates
  • Support for ephemeral keys, OTR, Bitcoin wallets…
  • Multi-device support
  • Better handling of key compromisation/loss
  • Interoperability with legacy agents
  • Better Web of Trust
  • Privacy of the social graph
  • Also vouching for the “state” of a PGP key

3

slide-12
SLIDE 12

Modern Key Management needs

  • Frequent key updates
  • Support for ephemeral keys, OTR, Bitcoin wallets…
  • Multi-device support
  • Better handling of key compromisation/loss
  • Interoperability with legacy agents
  • Better Web of Trust
  • Privacy of the social graph
  • Also vouching for the “state” of a PGP key

3

slide-13
SLIDE 13

ClaimChain basics

slide-14
SLIDE 14

Claim

  • Key material
  • Signature key
  • Recovery key
  • Generic things
  • Encryption keys
  • Signal prekeys
  • Identity in social nets / emails
  • Revocations
  • Cross-references (will get back to this)

Clients maintain per-device append-only logs of claims.

4

slide-15
SLIDE 15

Claim

  • Key material
  • Signature key
  • Recovery key
  • Generic things
  • Encryption keys
  • Signal prekeys
  • Identity in social nets / emails
  • Revocations
  • Cross-references (will get back to this)

Clients maintain per-device append-only logs of claims.

4

slide-16
SLIDE 16

Claim

  • Key material
  • Signature key
  • Recovery key
  • Generic things
  • Encryption keys
  • Signal prekeys
  • Identity in social nets / emails
  • Revocations
  • Cross-references (will get back to this)

Clients maintain per-device append-only logs of claims.

4

slide-17
SLIDE 17

Claim

  • Key material
  • Signature key
  • Recovery key
  • Generic things
  • Encryption keys
  • Signal prekeys
  • Identity in social nets / emails
  • Revocations
  • Cross-references (will get back to this)

Clients maintain per-device append-only logs of claims.

4

slide-18
SLIDE 18

Hash chains of claims

5

slide-19
SLIDE 19

Claim chain imprint

Imprint is a hash of the chain head: H(Bn)

  • Compact representation of the

chain state

  • Can verify the integrity of the

chain top to bottom

  • Signatures allow to verify new

blocks

6

slide-20
SLIDE 20

Cross-Referencing

slide-21
SLIDE 21

Cross-referencing

  • Alice commits to an imprint of

Bob’s chain

  • Resulting in WoT which also

tracks the updates of chains

7

slide-22
SLIDE 22

Social evidence processing policy

Validating someone’s claim chain need to involve social verification to detect forks (compromise) or fake imprint.

  • A client decides a set of other nodes they choose to trust
  • Defines client’s the trust model

8

slide-23
SLIDE 23

Social evidence processing policy

Validating someone’s claim chain need to involve social verification to detect forks (compromise) or fake imprint.

  • A client decides a set of other nodes they choose to trust
  • Defines client’s the trust model

8

slide-24
SLIDE 24

Social evidence processing policy

Validating someone’s claim chain need to involve social verification to detect forks (compromise) or fake imprint.

  • A client decides a set of other nodes they choose to trust
  • Defines client’s the trust model

8

slide-25
SLIDE 25

Supporting infrastructure

slide-26
SLIDE 26

Storage infrastructure

Options to distribute the claim chains:

  • Peer-to-peer / In-band
  • Not efficient
  • Centralized storage / the Cloud
  • Can be highly available
  • Easy to deploy
  • No need to trust for integrity!
  • Privacy problems
  • Other security problems
  • DHT, etc.

Chains can be stored in KV stores with K = H(Bi), V = Bi.

9

slide-27
SLIDE 27

Storage infrastructure

Options to distribute the claim chains:

  • Peer-to-peer / In-band
  • Not efficient
  • Centralized storage / the Cloud
  • Can be highly available
  • Easy to deploy
  • No need to trust for integrity!
  • Privacy problems
  • Other security problems
  • DHT, etc.

Chains can be stored in KV stores with K = H(Bi), V = Bi.

9

slide-28
SLIDE 28

Storage infrastructure

Options to distribute the claim chains:

  • Peer-to-peer / In-band
  • Not efficient
  • Centralized storage / the Cloud
  • Can be highly available
  • Easy to deploy
  • No need to trust for integrity!
  • Privacy problems
  • Other security problems
  • DHT, etc.

Chains can be stored in KV stores with K = H(Bi), V = Bi.

9

slide-29
SLIDE 29

State tracking mechanism

Need a kind of ”DNS” to resolve names to latest head imprints

  • In-band
  • Opportunistic encryption-like
  • Easy to deploy
  • No availability
  • Centralized
  • Privacy problems
  • Can be highly available
  • Gossiping, DHT, The Blockchain, etc.

10

slide-30
SLIDE 30

State tracking mechanism

Need a kind of ”DNS” to resolve names to latest head imprints

  • In-band
  • Opportunistic encryption-like
  • Easy to deploy
  • No availability
  • Centralized
  • Privacy problems
  • Can be highly available
  • Gossiping, DHT, The Blockchain, etc.

10

slide-31
SLIDE 31

State tracking mechanism

Need a kind of ”DNS” to resolve names to latest head imprints

  • In-band
  • Opportunistic encryption-like
  • Easy to deploy
  • No availability
  • Centralized
  • Privacy problems
  • Can be highly available
  • Gossiping, DHT, The Blockchain, etc.

10

slide-32
SLIDE 32

State tracking mechanism

Need a kind of ”DNS” to resolve names to latest head imprints

  • In-band
  • Opportunistic encryption-like
  • Easy to deploy
  • No availability
  • Centralized
  • Privacy problems
  • Can be highly available
  • Gossiping, DHT, The Blockchain, etc.

10

slide-33
SLIDE 33

Privacy and Security

slide-34
SLIDE 34

Access control

  • Clients can encrypt blocks so that only chosen groups can

read them

  • Naive way — encrypt blocks with a session key, encrypt

session key with other people public keys

  • Attribute-based or predicate-based encryption

11

slide-35
SLIDE 35

Query privacy

Centralized storage infrastructure or state tracking mechanism can learn the social graph

  • Privacy through anonymity
  • Dummy queries
  • Private information retrieval
  • Not practical
  • Relaxed PIR hard to deploy

12

slide-36
SLIDE 36

Summary

ClaimChain:

  • Put claims of any nature, mainly cryptographic material, in

high-integrity stores

  • Clients commit to states of other chains
  • Each client defines their source of authority about states
  • Complementary to opportunistic encryption efforts
  • Allow to be stored on untrusted storage
  • Other than setting social policy, can be made automatic

13

slide-37
SLIDE 37

Thank you!

13

slide-38
SLIDE 38

Bogdan Kulynych PhD student, IMDEA Software Institute, Madrid Twitter: @hiddenmarkov Email: bogdan.kulynych at imdea.org NEXTLEAP project nextleap.eu

14