financial cryptography 2000
play

Financial Cryptography 2000 21-25 february 2000 - Anguilla - PDF document

Financial Cryptography 2000 21-25 february 2000 - Anguilla Self-Scrambling Anonymizers David Pointcheval Dpartement d Informatique ENS - CNRS David.Pointcheval@ens.fr http://www.di.ens.fr/~pointche Overview Overview


  1. Financial Cryptography ‘2000 21-25 february 2000 - Anguilla Self-Scrambling Anonymizers David Pointcheval Département d ’Informatique ENS - CNRS David.Pointcheval@ens.fr http://www.di.ens.fr/~pointche Overview Overview ◆ Introduction to E-cash ◆ Weak/Strong Anonymity ◆ A New Scenario ◆ Self-Scrambling Anonymizer ◆ An Example: DL-based ◆ Security Analysis ◆ Conclusion David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 2 ENS-CNRS

  2. Introduction Introduction E-cash usually involves 3 participants: ◆ the bank ◆ the user B ◆ the shop U S David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 3 ENS-CNRS Classical Scenario Classical Scenario Use of e-coins: ◆ the coin is obtained from the bank ⇒ withdrawal ◆ the user buys something with it ⇒ spending ◆ the shop gives it back to the bank ⇒ deposit David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 4 ENS-CNRS

  3. Anonymity Anonymity B ① B knows the coin it gives to U ① ② ② B sees the coin deposited by S U S ⇒ B learns the transaction U-S Leakage of private data ❶ cannot be avoided ❷ usually avoided: blind signatures David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 5 ENS-CNRS Over- -Spending Spending Over ◆ Duplication of a coin: ⇒ possibility of spending it many times ◆ Two scenarios: ● the bank is on-line during the spending → immediate detection ● the bank is off-line → late detection because of anonymity: who is the bad guy? David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 6 ENS-CNRS

  4. Identity in the Coin Identity in the Coin ◆ Chaum-Fiat-Naor (1988): identity embedded in the coin such that ● ID remains concealed after one use ● ID is revealed after twice ◆ Still allows “perfect crime”: blackmailing without any risk! ⇒ ⇒ revokable anonymity ⇒ ⇒ David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 7 ENS-CNRS Revokable Anonymity Revokable Anonymity New participant: Revocation Center → can revoke anonymity ⇒ reveal the link between ● a coin and a user RC B ● a transaction and a user when the need arises U S David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 8 ENS-CNRS

  5. Strong Anonymity Strong Anonymity Problem of hiding: ◆ the link transaction-user → untraceability ◆ the link transaction-transaction → unlinkability of one user Strong notion: any adversary cannot learn the link, but with negligible probability David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 9 ENS-CNRS Weak Anonymity Weak Anonymity Weak notion: an adversary may know a link, however, he cannot prove it His knowledge is non-transferable David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 10 ENS-CNRS

  6. New Scenario New Scenario New participants: Anonymity Providers → help the user to get anonymous coins (still revocable by RC) RC AP 1 B U AP 2 S AP 3 David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 11 ENS-CNRS New Scenario New Scenario Usually: the bank “blindly” certifies a coin after an intricate proof of its validity ( i.e. that revocability is possible by RC) → restrictive blind signatures Here: the bank certifies c= E RC ( I U ; r ) after the view of both I U and r Coin = ( c, Cert c ) David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 12 ENS-CNRS

  7. ( I ; r ) c = E RC ( I U U ; r ) Advantages of c = E RC Advantages of ◆ revocation : very easy I U = D RC ( c ) ● just a decryption ● proof of it ◆ ownership = proof of knowledge of (sk U , r ) (sk U , r ) is the secret key related to c David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 13 ENS-CNRS Self- -Scrambling Anonymity Scrambling Anonymity Self But the bank will recognize c ,… Anonymity? ◆ the user “scrambles himself” c into c’ = E RC ( I U ; r’ ) ⇒ c’ unknown to the bank but c’ is not certified!! ◆ the AP certifies c’ when he knows that with Cert c ● c is valid: with a proof of ownership ● c’ ~ c : with a proof of equivalence David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 14 ENS-CNRS

  8. Proof of Equivalence Proof of Equivalence ◆ to achieve, at least, weak anonymity this proof must be “non-transferable” ⇒ e.g. Zero-Knowledge Proof ◆ to get evidences of over-spending (when a coin is used at least twice) this proof must be “non-repudiable” ⇒ e.g. Undeniable Proof David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 15 ENS-CNRS An Example: DL- -based based An Example: DL ◆ Revocation Center: pk RC = Y = g sk RC ◆ User: pk U = I U = g sk U ◆ Coin : El Gamal Encryption c = ( a = g r , b = Y r I U ) ◆ Ownership : Okamoto’s variant → knowledge of ( r , sk U ) s.t. b = Y r g sk U , ∈ = Y mod  → t u v t u g v p and q ←  e ∈ e k 2 α = − ⋅ mod u e r q ? α , β Y α β mod  → = e t g b p sk mod β = − ⋅ v e q U David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 16 ENS-CNRS

  9. Self- -Scrambling (1/2) Scrambling (1/2) Self c = ( a = g r , b = Y r I U ) and c’ = ( a’ = g r’ , b’ = Y r’ I U ) with r’ = r + ρ ◆ Proof of equivalence of ciphertexts: log g a’/a = log Y b’/b ◆ Proof of ownership: signature of the message m = ( d=h ρ , AP, date, etc) with the secret ( r , sk U ) related to b = Y r g sk U ⇒ the owner of c knows ρ = log h d David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 17 ENS-CNRS Self- -Scrambling (2/2) Scrambling (2/2) Self c = ( a = g r , b = Y r I U ) and c’ = ( a’ = g r’ , b’ = Y r’ I U ) with r’ = r + ρ ◆ Confirmation: proof of equality log h d = log g a’/a = log Y b’/b ● Interactively : Zero-Knowledge proof which just convinces the AP ● Non-Interactively : Designated-Verifier Signature David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 18 ENS-CNRS

  10. Anonymity Anonymity ◆ None, if not required ⇒ no extra cost ◆ Weak Anonymity: with at least one AP (under the DDH assumption) ◆ Strong Anonymity: with at least one honest AP David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 19 ENS-CNRS Security Analysis Security Analysis ◆ Impersonation: the secret sk U is only used in ZK or NIZK proofs ⇒ never leaked But required for any use of a coin ◆ Revocation: with the coin c = ( a,b ) ⇒ I U = b / a sk RC with the proof of log g Y = log a b/I U But under evidences of fraud… David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 20 ENS-CNRS

  11. Evidences Evidences Two of some ◆ spending: signature with b , of some coin c = ( a,b ) , on a purchase ◆ anonymizing: signature with b , of some coin c = ( a,b ) , on m = ( d=h ρ , AP, date, etc) ⇒ related coin c’ = ( a’,b’ ) such that log h d = log g a’/a = log Y b’/b to be blacklisted David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 21 ENS-CNRS Fraud Detection Fraud Detection Counterfeit Money: ◆ duplication of a coin: over-spending ◆ creation of money by an AP when a coin is used, the receiver ● the shop for a spending ● the AP for anonymizing asks for its value to the certifier, the AP, which is seen as a middleman over-spent coin: asked many times David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 22 ENS-CNRS

  12. Conclusion Conclusion New tool for anonymity ◆ efficiency ● no extra-cost, if no anonymity required ● few exponentiations (~10) per anonymizing ◆ security ● anonymity related to semantic security ⇒ based on DDH ◆ practicability: profitability ● AP gives c’ of just 99.9% of the value of c David Pointcheval Self-Scrambling Anonymizers - Financial Cryptography ‘2000 - 23 ENS-CNRS

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend