express lowering the cost of metadata hiding
play

Express: Lowering the Cost of Metadata-hiding Communication with - PowerPoint PPT Presentation

Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, Dan Boneh Stanford MIT CSAIL Stanford Stanford Our Story Our Story How to Communicate


  1. Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, Dan Boneh Stanford MIT CSAIL Stanford Stanford

  2. Our Story

  3. Our Story

  4. How to Communicate Privately? Option 1: End to end encrypted messaging apps E.g. Signal, WhatsApp Problem: metadata

  5. How to Communicate Privately? Option 1: Option 2: End to end encrypted messaging apps Anonymizing proxy E.g. Signal, WhatsApp E.g. Tor, SecureDrop Problem: metadata Problem: global adversaries

  6. How to Communicate Privately? Option 3: Metadata-hiding communication systems with cryptographic privacy

  7. How to Communicate Privately? Option 3: Metadata-hiding communication systems with cryptographic privacy E.g. Riposte, Pung, Talek, Karaoke, Atom, XRD, Verdict, Dissent, ….

  8. How to Communicate Privately? Option 3: Metadata-hiding communication systems with cryptographic privacy E.g. Riposte, Pung, Talek, Karaoke, Atom, XRD, Verdict, Dissent, …. Drawback: heavy requirements placed on clients - Requirement to run in synchronized rounds - High communication costs

  9. How to Communicate Privately? Option 3: Metadata-hiding communication systems with cryptographic privacy E.g. Riposte, Pung, Talek, Karaoke, Atom, XRD, Verdict, Dissent, …. Drawback: heavy requirements placed on clients - Requirement to run in synchronized rounds - High communication costs Can we make metadata-hiding communication work for whistleblowing?

  10. Introducing Express Communication system designed for practical metadata-hiding whistleblowing

  11. Introducing Express Communication system designed for practical metadata-hiding whistleblowing Journalists can register mailboxes for sources to send messages/documents

  12. Introducing Express Communication system designed for practical metadata-hiding whistleblowing Journalists can register mailboxes for sources to send messages/documents Whistleblowers do not need to access the system in synchronized rounds

  13. Introducing Express Communication system designed for practical metadata-hiding whistleblowing Journalists can register mailboxes for sources to send messages/documents Whistleblowers do not need to access the system in synchronized rounds Asymptotic improvements: client computation costs O(1) communication costs O(1) (both previously O(√N))

  14. Introducing Express Communication system designed for practical metadata-hiding whistleblowing Journalists can register mailboxes for sources to send messages/documents Whistleblowers do not need to access the system in synchronized rounds Asymptotic improvements: Practical improvements: client computation costs O(1) 6x improvement in server computation time communication costs O(1) 8x improvement in client computation time (both previously O(√N)) >10x improvement in communication costs 6x reduction in dollar cost to run system

  15. Express Overview 2 server system, secure against: - Arbitrarily many corrupt users - Up to one corrupt server

  16. Express Overview 2 server system, secure against: - Arbitrarily many corrupt users - Up to one corrupt server Supported operations: Register mailbox (Private) write to mailbox Read from mailbox

  17. Express Overview 2 server system, secure against: - Arbitrarily many corrupt users - Up to one corrupt server Supported operations: Register mailbox (Private) write to mailbox Read from mailbox Security: can’t tell who the recipient of a message is

  18. Express Overview 2 server system, secure against: - Arbitrarily many corrupt users - Up to one corrupt server Supported operations: Register mailbox (Private) write to mailbox Read from mailbox Security: can’t tell who the recipient of a message is Assumption: user knows “address” of mailbox to which it sends message

  19. Tool: Private Writing with Distributed Point Functions Point function : a function that is zero everywhere, except at one point Distributed Point Functions and their Applications, Niv Gilboa, Yuval Ishai, Eurocrypt’14.

  20. Tool: Private Writing with Distributed Point Functions Point function : a function that is zero everywhere, except at one point x f(x) 0 0 1 0 2 0 3 “Hi!” 4 0 Distributed Point Functions and their Applications, Niv Gilboa, Yuval Ishai, Eurocrypt’14.

  21. Tool: Private Writing with Distributed Point Functions Point function : a function that is zero everywhere, except at one point x f 1 (x) x f 2 (x) x f(x) 0 “abc” 0 “abc” 0 0 1 “xf$” 1 “xf$” 1 0 = ⊕ 2 “^tg” 2 “^tg” 2 0 3 “!7≈” 3 “‘2!)” 3 “Hi!” 4 “jhV” 4 “jhV” 4 0 Distributed Point Functions and their Applications, Niv Gilboa, Yuval Ishai, Eurocrypt’14.

  22. Tool: Private Writing with Distributed Point Functions Point function : a function that is zero everywhere, except at one point Distributed point function: technique for efficiently splitting a point function into two pieces, each a (non-point) function whose XOR is the original point function x f 1 (x) x f 2 (x) x f(x) Key features: 0 “abc” 0 “abc” 0 0 - concise 1 “xf$” 1 “xf$” 1 0 representation = ⊕ 2 “^tg” 2 “^tg” 2 0 - fast to generate 3 “!7≈” 3 “‘2!)” 3 “Hi!” 4 “jhV” 4 “jhV” 4 0 Distributed Point Functions and their Applications, Niv Gilboa, Yuval Ishai, Eurocrypt’14.

  23. Tool: Private Writing with Distributed Point Functions I want to write “Hi!” to address 3 Addr Data Addr Data 0 0 0 0 1 0 1 0 2 0 2 0 3 0 3 0 4 0 4 0 Distributed Point Functions and their Applications, Niv Gilboa, Yuval Ishai, Eurocrypt’14. Private Information Storage, Rafail Ostrovsky, Victor Shoup, STOC’97

  24. Tool: Private Writing with Distributed Point Functions x f(x) 0 0 1 0 Addr Data Addr Data 2 0 0 0 0 0 3 “Hi!” 1 0 1 0 4 0 2 0 2 0 3 0 3 0 4 0 4 0 Distributed Point Functions and their Applications, Niv Gilboa, Yuval Ishai, Eurocrypt’14. Private Information Storage, Rafail Ostrovsky, Victor Shoup, STOC’97

  25. Tool: Private Writing with Distributed Point Functions x f 1 (x) x f 2 (x) 0 “abc” 0 “abc” 1 “xf$” 1 “xf$” Addr Data Addr Data 2 “^tg” 2 “^tg” 0 0 0 0 3 “!7≈” 3 “‘2!)” 1 0 1 0 4 “jhV” 4 “jhV” 2 0 2 0 3 0 3 0 4 0 4 0 Distributed Point Functions and their Applications, Niv Gilboa, Yuval Ishai, Eurocrypt’14. Private Information Storage, Rafail Ostrovsky, Victor Shoup, STOC’97

  26. Tool: Private Writing with Distributed Point Functions f 1 f 2 Addr Data Addr Data 0 0 0 0 1 0 1 0 2 0 2 0 3 0 3 0 4 0 4 0 Distributed Point Functions and their Applications, Niv Gilboa, Yuval Ishai, Eurocrypt’14. Private Information Storage, Rafail Ostrovsky, Victor Shoup, STOC’97

  27. Tool: Private Writing with Distributed Point Functions f 1 f 2 Addr Data Addr Data 0 f 1 (0) 0 f 2 (0) 1 f 1 (1) 1 f 2 (1) 2 f 1 (2) 2 f 2 (2) 3 f 1 (3) 3 f 2 (3) 4 f 1 (4) 4 f 2 (4) Distributed Point Functions and their Applications, Niv Gilboa, Yuval Ishai, Eurocrypt’14. Private Information Storage, Rafail Ostrovsky, Victor Shoup, STOC’97

  28. Tool: Private Writing with Distributed Point Functions f 1 f 2 Addr Data Addr Data 0 “abc” 0 “abc” 1 “xf$” 1 “xf$” 2 “^tg” 2 “^tg” 3 “!7≈” 3 “‘2!)” 4 “jhV” 4 “jhV” Distributed Point Functions and their Applications, Niv Gilboa, Yuval Ishai, Eurocrypt’14. Private Information Storage, Rafail Ostrovsky, Victor Shoup, STOC’97

  29. Tool: Private Writing with Distributed Point Functions f 1 f 2 Addr Data Addr Data 0 “abc” 0 “abc” 1 “xf$” 1 “xf$” ⊕ 2 “^tg” 2 “^tg” 3 “!7≈” 3 “‘2!)” “Hi!” 4 “jhV” 4 “jhV” Distributed Point Functions and their Applications, Niv Gilboa, Yuval Ishai, Eurocrypt’14. Private Information Storage, Rafail Ostrovsky, Victor Shoup, STOC’97

  30. Hiding Data How to prevent curious clients from reading others’ mailboxes? Addr Data Addr Data 0 “abc” 0 “abc” 1 “xf$” 1 “xf$” 2 “^tg” 2 “^tg” 3 “!7≈” 3 “‘2!)” 4 “jhV” 4 “jhV”

  31. Hiding Data How to prevent curious clients from reading others’ mailboxes? Encrypt each row with a different key held by the owner of the mailbox Addr Data Key Addr Data Key 0 “abc” k NYT 0 “abc” k NYT 1 “xf$” k WaPo 1 “xf$” k WaPo 2 “^tg” k WSJ 2 “^tg” k WSJ 3 “!7≈” k Buzzfeed 3 “‘2!)” k Buzzfeed 4 “jhV” k Inquirer 4 “jhV” k Inquirer

  32. Hiding Data How to prevent curious clients from reading others’ mailboxes? Encrypt each row with a different key held by the owner of the mailbox Different key sent to each server, encrypt in CTR mode to allow adding messages Addr Data Key Addr Data Key 0 “abc” k NYT1 0 “abc” k NYT2 1 “xf$” k WaPo1 1 “xf$” k WaPo2 2 “^tg” k WSJ1 2 “^tg” k WSJ2 3 “!7≈” k Buzzfeed1 3 “‘2!)” k Buzzfeed2 4 “jhV” k Inquirer1 4 “jhV” k Inquirer2

  33. Hiding Meta data Construction thus far vulnerable to polling attack: Attacker reads every row after each write to see which one was changed

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend