Compositionality of Secure Information Flow
Christelle Braun, Ecole Polytechnique Kostas Chatzikokolakis, University of Eindhoven Catuscia Palamidessi, INRIA & Ecole Polytechnique
Compositionality of Secure Information Flow Christelle Braun, Ecole - - PowerPoint PPT Presentation
Compositionality of Secure Information Flow Christelle Braun, Ecole Polytechnique Kostas Chatzikokolakis, University of Eindhoven Catuscia Palamidessi, INRIA & Ecole Polytechnique Probabilistic Methods for Security Outline Motivations
Christelle Braun, Ecole Polytechnique Kostas Chatzikokolakis, University of Eindhoven Catuscia Palamidessi, INRIA & Ecole Polytechnique
Braun, Chatzikokolakis, Palamidessi Probabilistic Methods for Security AMAST 2010
2
Braun, Chatzikokolakis, Palamidessi Probabilistic Methods for Security AMAST 2010
information is an important issue in the modern world
because the protocols for information hiding often use randomization
the presence of probability and concurrency makes verification difficult
3
Braun, Chatzikokolakis, Palamidessi Probabilistic Methods for Security AMAST 2010
4
Braun, Chatzikokolakis, Palamidessi Probabilistic Methods for Security AMAST 2010
5
Braun, Chatzikokolakis, Palamidessi Compositional Methods for Information-Hiding AMAST 2010
Example: Chaum’s generalized dining cryptographers
some communication channels (edges).
may select one of them to pay for the bill
whether one of them is the payer, without getting to know who is he
6
Braun, Chatzikokolakis, Palamidessi Compositional Methods for Information-Hiding AMAST 2010
Chaum’s solution to the generalized dining cryptogr.
sum of the incident edges. If there is a payer, he adds 1
sum is 1
7
Braun, Chatzikokolakis, Palamidessi Compositional Methods for Information-Hiding AMAST 2010
Chaum’s solution to the generalized dining cryptogr.
sum of the incident edges. If there is a payer, he adds 1
sum is 1
8
Braun, Chatzikokolakis, Palamidessi Compositional Methods for Information-Hiding AMAST 2010
Chaum’s solution to the generalized dining cryptogr.
sum of the incident edges. If there is a payer, he adds 1
sum is 1
9
1
Braun, Chatzikokolakis, Palamidessi Compositional Methods for Information-Hiding AMAST 2010
Chaum’s solution to the generalized dining cryptogr.
sum of the incident edges. If there is a payer, he adds 1
sum is 1
10
1 1 1
Braun, Chatzikokolakis, Palamidessi Compositional Methods for Information-Hiding AMAST 2010
Chaum’s solution to the generalized dining cryptogr.
If the coins are fair, then the a posteriori probability that a certain node be the payer is equal to its a priori probability
11
1 1 1
Braun, Chatzikokolakis, Palamidessi Probabilistic Methods for Security AMAST 2010
and forwards the request to it
randomly a new node and forwards the request to him
request to the server
server
12
Braun, Chatzikokolakis, Palamidessi Probabilistic Methods for Security AMAST 2010
hidden and observable information
13
Braun, Chatzikokolakis, Palamidessi Probabilistic Methods for Security AMAST 2010
14
Probabilistic Methods for Security Braun, Chatzikokolakis, Palamidessi AMAST 2010
is given by p(o | s)
from the input’s distribution, i.e. the users of the protocol
15
Observables
Probabilistic Methods for Security AMAST 2010 Braun, Chatzikokolakis, Palamidessi
General framework: Protocols as Information-Theoretic channels
.. . .. .
s1 sm
Protocol
Information to be protected
Input
Output
16
Probabilistic Methods for Security AMAST 2010 Braun, Chatzikokolakis, Palamidessi
Protocols are noisy channels. Each run has 1 input and 1 output, but:
.. . .. .
s1 sm
.. .
17
Probabilistic Methods for Security AMAST 2010 Braun, Chatzikokolakis, Palamidessi
C1 C3 aad C2 ada daa ddd
18
Probabilistic Methods for Security AMAST 2010 Braun, Chatzikokolakis, Palamidessi
.. . .. .
s1 sm
.. .
p(on|s1) p(o1|s1)
19
Probabilistic Methods for Security AMAST 2010 Braun, Chatzikokolakis, Palamidessi
The channel matrix: the array of conditional probabilities .. . .. .
s1 sm
p(on|s1) p(o1|s1) p(o1|sm) p(on|sm)
... ...
20
Braun, Chatzikokolakis, Palamidessi Probabilistic Methods for Security AMAST 2010
21
Braun, Chatzikokolakis, Palamidessi Probabilistic Methods for Security AMAST 2010
22
is known
guessing the wrong hypothesis P(f, M, π) = ∑O p(o) ( 1 - p(f(o)| o) )
Braun, Chatzikokolakis, Palamidessi Probabilistic Methods for Security AMAST 2010
i.e. max p(f(o)| o) or, equivalently, max p(o| f(o)) πf(o)
by
23
Braun, Chatzikokolakis, Palamidessi Probabilistic Methods for Security AMAST 2010
selecting the hypothesis with Maximum Likelihood, i.e. max p(o| f(o))
input distribution, so in the rest of this talk we will only consider the MAP
24
Braun, Chatzikokolakis, Palamidessi Probabilistic Methods for Security AMAST 2010
25
Braun, Chatzikokolakis, Palamidessi Probabilistic Methods for Security AMAST 2010
26
Braun, Chatzikokolakis, Palamidessi Probabilistic Methods for Security AMAST 2010
27
Braun, Chatzikokolakis, Palamidessi Probabilistic Methods for Security AMAST 2010
externally
compatible with the secret choices
28
Braun, Chatzikokolakis, Palamidessi Probabilistic Methods for Security AMAST 2010
29
Braun, Chatzikokolakis, Palamidessi Probabilistic Methods for Security AMAST 2010
30
Probabilistic Methods for Security AMAST 2010 Braun, Chatzikokolakis, Palamidessi
Proof: (1) The convex combination of matrices preserves the degree of protection
31
c 1-c
+
⇒
Probabilistic Methods for Security AMAST 2010 Braun, Chatzikokolakis, Palamidessi
Proof: (2) The combination of columns preserves the degree of protection
32
⇒
p p′ p + p′
Braun, Chatzikokolakis, Palamidessi Probabilistic Methods for Security AMAST 2010
33
Braun, Chatzikokolakis, Palamidessi Compositional Methods for Information-Hiding AMAST 2010
An application: A compositional proof of a generalization of Chaum’s anonymity result
A network of dining cryptographers is strongly anonymous if there is a spanning tree composed by fair coins (the other coins don’t matter)
34
Braun, Chatzikokolakis, Palamidessi Compositional Methods for Information-Hiding AMAST 2010
An application: A compositional proof of an extension of Chaum’s anonymity result
A network of dining cryptographers is strongly anonymous if there is a spanning tree composed by fair coins (the other coins don’t matter)
35
Braun, Chatzikokolakis, Palamidessi Compositional Methods for Information-Hiding AMAST 2010
An application: A compositional proof of an extension of Chaum’s anonymity result
Proof of the if part: by induction Base: two cryptographers connected by a fair coin are strongly anonymous
36
Braun, Chatzikokolakis, Palamidessi Compositional Methods for Information-Hiding AMAST 2010
An application: A compositional proof of an extension of Chaum’s anonymity result
Proof of the if part: by induction Base: two cryptographers connected by a fair coin are strongly anonymous Induction step: given a strongly anonymous network, add one cryptographer and a fair coin (edge). Using the compositionality result, the resulting network is still strongly anonymous
37
Braun, Chatzikokolakis, Palamidessi Compositional Methods for Information-Hiding AMAST 2010
An application: A compositional proof of an extension of Chaum’s anonymity result
Proof of the if part: by induction Base: two cryptographers connected by a fair coin are strongly anonymous Induction step: given a strongly anonymous network, add one cryptographer and a fair coin (edge). Using the compositionality result, the resulting network is still strongly anonymous
38
Braun, Chatzikokolakis, Palamidessi Compositional Methods for Information-Hiding AMAST 2010
Note: we have proved also the converse, but with a different method
A network of dining cryptographers is strongly anonymous
there is a spanning tree composed by fair coins
39
Braun, Chatzikokolakis, Palamidessi Probabilistic Methods for Security AMAST 2010
40