Group Signatures Concepts cepts, , Applic licati tions* ons*, - - PowerPoint PPT Presentation

group signatures concepts cepts applic licati tions ons
SMART_READER_LITE
LIVE PREVIEW

Group Signatures Concepts cepts, , Applic licati tions* ons*, - - PowerPoint PPT Presentation

Group Signatures Concepts cepts, , Applic licati tions* ons*, and new Advan ances ces** ** Anja Lehmann IBM Research Zurich *Zone Encryption with Anonymous Authentication for V2V Communication. J Camenisch, M Drijver, A Lehmann, G


slide-1
SLIDE 1

Group Signatures Concepts cepts, , Applic licati tions*

  • ns*, and new Advan

ances ces** **

Anja Lehmann

IBM Research – Zurich

*Zone Encryption with Anonymous Authentication for V2V Communication. J Camenisch, M Drijver, A Lehmann, G Neven, P Towa **Group Signatures with Selective Linkability. PKC 2019 L Garms, A Lehmann

slide-2
SLIDE 2

▪ Introduction to Group Signatures

▪ Setting & Security Properties ▪ Schemes ▪ Similar Concepts ▪ Anonymous Credentials ▪ Direct Anonymous Attestation (DAA) ▪ Enhanced Privacy ID (EPID)

▪ Group Signatures & V2X Communication ▪ Group Signatures with Selected Linkability for V2Cloud

Roadmap

slide-3
SLIDE 3

▪ Security property: unforgeability ▪ Important primitive for strong authentication: – Server-side authentication, certified updates, eID cards, …. ▪ Bad for privacy – “leaks” the identity of the signer – Membership based online newsportal, vehicle-to-vehicle (V2V) communication, IoT,…

Standard Signatures

sk pk

𝐿𝐻𝑓𝑜 1𝜐 → 𝑡𝑙, 𝑞𝑙 𝑇𝑗𝑕𝑜 𝑡𝑙, 𝑛 → σ 𝑊𝑔 𝑞𝑙, 𝑛, σ → 0/1

Signed by Alice!

3

slide-4
SLIDE 4

𝑇𝑗𝑕𝑜 𝑡𝑙, 𝑛 → σ

▪ Privacy : Doesn’t leak any information about signer ▪ Security : Access to “group” not controlled

No way to reveal signer in case of abuse (bug or feature?)

Group Signatures | Naive Approach

pk

𝑊𝑔 𝑞𝑙, 𝑛, σ → 0/1

Signed by someone in the “group”! Who was that??

4

slide-5
SLIDE 5

𝑝𝑡𝑙

Group Signatures | High-Level Idea

Group up Manager/ Issuer SIGN JOIN OPEN 𝑊𝑔 𝑕𝑞𝑙, 𝑛, σ → 0/1

Signed by someone in the Issuer’s group !

Opener

Group public key 𝑕𝑞𝑙

𝑇𝑗𝑕𝑜 𝑕𝑡𝑙[𝑗], 𝑛 → σ

▪ Variants: – Static vs dynamic groups – Issuer = opener vs dedicated opener – Verifiable Opening ▪ Priva

vacy

▪ Security

ty

𝑗𝑡𝑙

5

Chaum & van Heyst’91

slide-6
SLIDE 6

Group Signatures | Anonymity

Signed by Alice or Bob?

Issuer SIGN JOIN OPEN

▪ Signatures don’t leak info about signer – Unlinkability of signatures ▪ Full/CCA anonymity: access to Opener

Signed by the same user?

Corruption Setting

▪ Issuer corrupt*

(if dedicated entity)

▪ Opener honest

6

slide-7
SLIDE 7

Group Signatures | Unforgeability (Naïve Approach)

Issuer SIGN JOIN OPEN

▪ Forgery = signature on fresh message ▪ Achievable only if all users are honest

→ very weak notion

7

slide-8
SLIDE 8

Is the signature coming from or ???

Group Signatures | Unforgeability

Issuer SIGN JOIN OPEN

▪ Realistic model with corrupt users

8

slide-9
SLIDE 9

Group Signatures | Unforgeability (Traceability)

Issuer SIGN JOIN OPEN

Corruption Setting

▪ Issuer honest ▪ Opener (somewhat) corrupt

▪ Forgery = valid signature that: – does not open, or – opens to a user that has never joined

9

slide-10
SLIDE 10

Group Signatures | Non-Frameability

Issuer SIGN JOIN OPEN

Corruption Setting

▪ Issuer corru

rrupt pt

▪ Opener (somewhat) corrupt

▪ Forgery = valid signature on m that: – opens to an honest user U – but U has never signed m

10

slide-11
SLIDE 11

Group Signatures | Security Properties

▪ *Only when Issuer ≠ Opener ▪ ** Only for dynami

mic group signatures. Issuer honest in static ones.

▪ Traceability + Non-frameability = unforgeability

Anonymity nymity Tracea eabi bili lity ty Non- Framea eabil ility ity Issuer er Corrupt* Honest Corrupt** Open ener er Honest Corrupt* Corrupt

11

Bellare, Shi, Zhang, '05

slide-12
SLIDE 12

Group Signatures | Schemes

SIGN JOIN OPEN issues membership credential

  • n committed user key

proof of knowledge of user key & membership credential

12

slide-13
SLIDE 13

Group Signatures | Schemes

SIGN JOIN 𝑣𝑞𝑙 = 𝑄𝐿𝐻𝑓𝑜 𝑣𝑡𝑙 Choose random usk 𝑕𝑡𝑙 𝑗 = (𝑣𝑡𝑙, 𝑑𝑠𝑓𝑒) 𝑑𝑠𝑓𝑒 = 𝑇𝑗𝑕𝑜 𝑡𝑡𝑙, 𝑣𝑞𝑙 𝑗𝑡𝑙 = 𝑡𝑡𝑙 𝑕𝑞𝑙 = 𝑡𝑞𝑙 𝜌 = 𝑂𝐽𝑎𝐿 𝑣𝑡𝑙, 𝑣𝑞𝑙, 𝑑𝑠𝑓𝑒: 𝑊𝑔 𝑡𝑞𝑙, 𝑑𝑠𝑓𝑒, 𝑣𝑞𝑙 = 1 ∧ 𝑣𝑞𝑙 = 𝑄𝐿𝐻𝑓𝑜 𝑣𝑡𝑙 ∧ 𝐷 = 𝐹𝑜𝑑(𝑓𝑞𝑙, 𝑣𝑞𝑙) (𝑛) 𝑛, 𝜏 = 𝜌 𝑇𝐽𝐻. 𝐿𝐻𝑓𝑜 1𝜐 → 𝑡𝑡𝑙, 𝑡𝑞𝑙

13

slide-14
SLIDE 14

Group Signatures | Schemes

SIGN JOIN 𝑣𝑞𝑙 = 𝑄𝐿𝐻𝑓𝑜 𝑣𝑡𝑙 𝑑𝑠𝑓𝑒 = 𝑇𝑗𝑕𝑜 𝑡𝑡𝑙, 𝑣𝑞𝑙 𝑭𝑶𝑫. 𝑳𝑯𝒇𝒐 𝟐𝝊 → 𝒇𝒕𝒍, 𝒇𝒒𝒍 𝑇𝐽𝐻. 𝐿𝐻𝑓𝑜 1𝜐 → 𝑡𝑡𝑙, 𝑡𝑞𝑙 OPEN 𝑗𝑡𝑙 = 𝑡𝑡𝑙 𝒑𝒕𝒍 = 𝒇𝒕𝒍 𝑕𝑞𝑙 = 𝑡𝑞𝑙, 𝒇𝒒𝒍 𝑫 = 𝑭𝒐𝒅 𝒇𝒒𝒍, 𝒗𝒒𝒍 𝒏, 𝝉 = (𝝆, 𝑫) 𝒗𝒒𝒍 = 𝑬𝒇𝒅(𝒇𝒕𝒍, 𝑫) 𝜌 = 𝑂𝐽𝑎𝐿 𝑣𝑡𝑙, 𝑣𝑞𝑙, 𝑑𝑠𝑓𝑒: 𝑊𝑔 𝑡𝑞𝑙, 𝑑𝑠𝑓𝑒, 𝑣𝑞𝑙 = 1 ∧ 𝑣𝑞𝑙 = 𝑄𝐿𝐻𝑓𝑜 𝑣𝑡𝑙 ∧ 𝑫 = 𝑭𝒐𝒅(𝒇𝒒𝒍,𝒗𝒒𝒍) (𝑛) 𝑛, 𝜏 = (𝜌, 𝑫)

14

Choose random usk 𝑕𝑡𝑙 𝑗 = (𝑣𝑡𝑙, 𝑑𝑠𝑓𝑒)

slide-15
SLIDE 15

Group Signatures | Schemes

SIGN JOIN 𝑣𝑞𝑙 = 𝑄𝐿𝐻𝑓𝑜 𝑣𝑡𝑙 𝑑𝑠𝑓𝑒 = 𝑇𝑗𝑕𝑜 𝑡𝑡𝑙, 𝑣𝑞𝑙 𝑭𝑶𝑫. 𝑳𝑯𝒇𝒐 𝟐𝝊 → 𝒇𝒕𝒍, 𝒇𝒒𝒍 𝑇𝐽𝐻. 𝐿𝐻𝑓𝑜 1𝜐 → 𝑡𝑡𝑙, 𝑡𝑞𝑙 OPEN 𝑗𝑡𝑙 = 𝑡𝑡𝑙 𝒑𝒕𝒍 = 𝒇𝒕𝒍 𝑕𝑞𝑙 = 𝑡𝑞𝑙, 𝒇𝒒𝒍 𝑫 = 𝑭𝒐𝒅 𝒇𝒒𝒍, 𝒗𝒒𝒍 𝒏, 𝝉 = (𝝆, 𝑫) 𝒗𝒒𝒍 = 𝑬𝒇𝒅(𝒇𝒕𝒍, 𝑫) 𝜌 = 𝑂𝐽𝑎𝐿 𝑣𝑡𝑙, 𝑣𝑞𝑙, 𝑑𝑠𝑓𝑒: 𝑊𝑔 𝑡𝑞𝑙, 𝑑𝑠𝑓𝑒, 𝑣𝑞𝑙 = 1 ∧ 𝑣𝑞𝑙 = 𝑄𝐿𝐻𝑓𝑜 𝑣𝑡𝑙 ∧ 𝑫 = 𝑭𝒐𝒅(𝒇𝒒𝒍,𝒗𝒒𝒍) (𝑛) 𝑛, 𝜏 = (𝜌, 𝑫)

15

Choose random usk 𝑕𝑡𝑙 𝑗 = (𝑣𝑡𝑙, 𝑑𝑠𝑓𝑒)

▪ Traceability: Unforgeability of SIG &

Soundness of NIZK

▪ Non-Frameability: PKGen hiding

slide-16
SLIDE 16

▪ Sign & Encrypt

pt & Prove ve most common approach, mainly differ in signature scheme

– Signatures on committed messages 𝑑𝑠𝑓𝑒 = 𝑇𝑗𝑕𝑜 𝑗𝑡𝑙, 𝑣𝑞𝑙) = "𝑇𝑗𝑕𝑜(𝑗𝑡𝑙, 𝑣𝑡𝑙 " – Efficient proofs of knowledge of a signature – Instantiations: CL‘01 (strong RSA), CL‘04 (LRSW), BBS‘04 (q-SDH), PS‘16 (q-MSDH-1) ▪ Opening flexible: verifiable decryption, threshold decryption ▪ Disadvantage: opening increases signature size, yet is hardly needed ▪ More compact group signatures: GetShor

horty ty (Bichsel et al, SCN’10)

– Join creates user-specific opening secret at Issuer/Opener – To open, Issuer/Opener iterates through all opening secrets & test against signature – Disadvantage: ▪ Opening gets very expensive (feature?) ▪ Issuer = Opener (inherently weaker security guarantees)

Group Signatures | Schemes

16

Bellare, Micciancio, Warinschi‘03

slide-17
SLIDE 17

▪ Introduction to Group Signatures

▪ Setting & Security Properties ▪ Schemes ▪ Similar Concepts ▪ Anonymous Credentials ▪ Direct Anonymous Attestation (DAA) ▪ Enhanced Privacy ID (EPID)

▪ Group Signatures & V2X Communication ▪ Group Signatures with Selected Linkability for V2Cloud

Roadmap

slide-18
SLIDE 18

▪ Membership credentials contain user attributes

Anonymous Credentials

Name Alice Doe Date Of Birth Dec 12, 1978 Address Waterdrive 22 City Berlin Country Germany Expiry Date Aug 4, 2020

Envisioned by Chaum in 1981, first full scheme by Camenisch & Lysyanskaya in 2001

Attribute-based authentication = group signature on nonce & context wrt attributes-based credential

Name Alice Doe Date Of Birth Dec 12, 1978 Address Waterdrive 22 City Berlin Country Germany Expiry Date Aug 4, 2020

18

slide-19
SLIDE 19

Anonymous Credentials

Name Alice Doe Date Of Birth Dec 12, 1978 Address Waterdrive 22 City Berlin Country Germany Expiry Date Aug 4, 2020 Name Alice Doe Date of Birth > 18 18 years ago ago Address 7 Waterdrive City 8003 Zurich Country Germany Expiry Date > today Pseudonym Moviefan

▪ User can selecti

tive vely ly disclo lose se each attribute

▪ User can prove predicate

tes over the attribute butes, e.g., “I'm over 18”

▪ Revocati

ation of credentials (issuer/verifier-driven)

▪ User-controlled linkability via pseudony

donyms ms → Unlink nkabl able authentication as default, linkability as an option

▪ Membership credentials contain user attributes ▪ Construction very similar to group signatures (CL/BBS/PS-based)

19

slide-20
SLIDE 20

▪ Hardware-based attestation using a Trusted Platform Module (TPM) – Secure crypto processor creates, stores, uses cryptographic keys – Makes anonymous remote attestations of host status ▪ Split between host & TPM → shift heavy computations to host ▪ Unlinkability steered via “basename” and pseudonyms. No Opener.

Direct Anonymous Attestation (DAA)

Host

TPM

Platform

JOIN SIGN

Attestation comes from a certified TPM

20

slide-21
SLIDE 21

Direct Anonymous Attestation (DAA)

▪ Standardized in TPM1.2 (2004) & ISO/IEC 20008-2 – RSA-based by Brickell, Camenisch, Chen – Developed for Trusted Computing Group (TCG) ▪ Revised TPM2.0 (2014) – Elliptic curve & pairing based – Flexible API to support different protocols – TPM part & protocols ISO standardized ▪ Over 500 million TPMs sold ▪ Standardized DAA has a number of security issues – All security models & schemes had issues (ISO scheme is trivially forgeable) [CDL16a, CDL16b] – TPM interfaces had inherent security problems [CCD+17] – TPM assumed fully trusted. Subversion-resilient DAA [CDL17]

= industry group that standardizes TPM

21

slide-22
SLIDE 22

Enhanced Privacy ID (EPID)

▪ DAA-variant used for attestation on Intel’s SGX – Without host/TPM split – Signature-based revocation ▪ DAA (and credentials) support key-ba

based d revoca cati tion:

▪ Signatu

ture-ba based d revoca

  • cati

tion:

22

TPM

Revoked keys:

Revocation Authority

Signed with revoked keys?

TPM

Different signer “Bad” signatures

Relies on exposure of corrupted keys Proof scales linearly in #revoked users

slide-23
SLIDE 23

Comparison

Group up Signatur ture Credenti ntials ls DAA EPID Opener Pseudonyms Attributes Revocation Key-based Signature-based TPM Anchor All on TPM

23

slide-24
SLIDE 24

Comparison

Group up Signatur ture Credenti ntials ls DAA EPID Opener Pseudonyms Attributes Revocation Key-based Signature-based TPM Anchor All on TPM

▪ Opener vs. pseudonyms has not only impact on privacy but also on unforgeability ▪ Every new combination of features requires new security model ▪ Attributes: can encode validity, i.e., make creds short-lived = alternative to revocation

24

slide-25
SLIDE 25

Group up Signatur ture Credenti ntials ls DAA EPID Opener Pseudonyms Attributes Revocation Key-based Signature-based TPM Anchor All on TPM

Comparison

SIGN JOIN issues membership credential

  • n committed user key

proof of knowledge of user key & membership credential

25

slide-26
SLIDE 26

▪ Introduction to Group Signatures

▪ Setting & Security Properties ▪ Schemes ▪ Similar Concepts ▪ Anonymous Credentials ▪ Direct Anonymous Attestation (DAA) ▪ Enhanced Privacy ID (EPID)

▪ Group Signatures & V2X Communication ▪ Group Signatures with Selected Linkability for V2Cloud

Roadmap

slide-27
SLIDE 27

Vehicle-to-Vehicle (V2V) Authentication

▪ Short-range radio communication between vehicles (V2V) and infrastructure (V2I) – position, speed,... for collision avoidance, road & traffic conditions – first roll-out in 2019(?), expected mandatory in new vehicles in near future ▪ Requirements: – security:

ty: authenticate real vehicles to exclude attacker trying to disrupt traffic

– privacy:

acy: cannot track vehicles by unique identifiers in radio messages

CA CA Vehic icle certif ifica icate Vehic icles es communication signs/certifies Infras astru ructure re radio radio ▪ V2V/V2I (=V2X) – low communication bandwidth

(300 Bytes max)

– high message frequency

(1-10 msg/vehicle/second)

slide-28
SLIDE 28

Current C-ITS Security Architecture

▪ C-ITS: Cooperative Intelligent Transport Systems – Standardization in CEN and ETSI ▪ C-ITS Platform established by European Commission in 2014 – Cooperative framework incl. national authorities, C-ITS stakeholders and the Commission – Develop a shared vision on the interoperable deployment of C-ITS in the EU

28

slide-29
SLIDE 29

Current C-ITS Security Architecture with Pseudonym CA

▪ Vehicles receive short-term pseudonym certificates (100/week), switch every 5min ▪ Authenticate messages via pseudonym certificates

Long-te term m CA Pseudo dony nym m CA Vehicle le LTC PC1,...,PCn Vehicle les/ s/ Infrastr struc uctur ture revocation status status msg Neithe her optima mal for priva vacy nor secur urity ty:

▪ Pseudonym CA is security/privacy

bottleneck & expensive to maintain

▪ High storage costs for vehicles ▪ Limited pool of pseudonyms

29

slide-30
SLIDE 30

Group Sigs/Credentials: Optimal Privacy and Security

▪ Different key (“credential”) in each vehicle, can be individually revoked ▪ Offline authority (or multiple) can de-anonymize signatures ▪ Vehicles can locally self-certify pseudonyms – no server interaction needed – optionally limit number of pseudonyms per vehicle/day/...

privacy security Vehicle le LTC Vehicle les/ s/ Infrastr struc uctur ture status msg Long-te term m CA

30

slide-31
SLIDE 31

Group Sigs/Credentials: Optimal Privacy and Security

▪ Different key (“credential”) in each vehicle, can be individually revoked ▪ Offline authority (or multiple) can de-anonymize signatures ▪ Vehicles can locally self-certify pseudonyms – no server interaction needed – optionally limit number of pseudonyms per vehicle/day/...

privacy security Vehicle le LTC Vehicle les/ s/ Infrastr struc uctur ture status msg Long-te term m CA

31

slide-32
SLIDE 32

V2X Communication via Group Signatures

▪ Our approach: – Long-term conventional certificate (revocation is easy) – Short-lived group membership credentials incl attribute =validity epoch, e.g, week – Compact sigs: GetShorty + PS group signatures + attribute Sig Size Signin ing Verif ific icat atio ion 2G + 3Zp 1G 1G’ + 2P BLS381: 176 Byte per signature

32

Long-te term m CA Pseudo dony nym m CA Vehicle le LTC Vehicle les/ s/ Infrastr struc uctur ture revocation status status msg STC

slide-33
SLIDE 33

V2X Communication via Group Signatures

▪ Regular position beacon messages, broadcasted 1–10 times per second – Cooperative Awareness Messages (CAMs) – Dynamic information: position, speed, and heading – Static information: length, width, and sensor accuracy ▪ Signed with privacy-preserving (group/pseudonym) signature but broadcast in plainte

ntext

Group Signature ture cannot t guarantee tee priva vacy y when en mess ssages s are alrea eady y iden entifyin tifying! GPS, 48km/h, west, 2.5m long

33

slide-34
SLIDE 34

V2X Communication via Group Signatures

▪ Privacy-preserving V2X communication needs encryption! ▪ New Approach: Zone Encryption with Anonymous Authentication [CDLNT19] – Vehicles exchange short-lived & geo-local symmetric AE keys – Use (compact) group signatures for authenticated key-exchange – Send CAMs encrypted with AE keys (w/o group signature) – Legitimate vehicles can decrypt, but no passive eavesdropping & mass surveillance

& Encryption

GPS, 48km/h, west, SMART

34

slide-35
SLIDE 35

Roadmap

▪ Introduction to Group Signatures

▪ Setting & Security Properties ▪ Schemes ▪ Similar Concepts ▪ Anonymous Credentials ▪ Direct Anonymous Attestation (DAA) ▪ Enhanced Privacy ID (EPID)

▪ Group Signatures & V2X Communication ▪ Group Signatures with Selected Linkability for V2Cloud

slide-36
SLIDE 36

CA / Issuer Data Cloud / Verifi fier collects anonymously authenticated data

▪ V2Cloud communication: updates, diagnostics, services (e.g., insurance) – Less resource critical (via 4/5G, Wifi), less frequent ▪ Collection of sensor, driver data – general statistics, user-specific services – Data usage often not clear at time of collection – Requirements: authenticity & privacy

Vehicle-to-Cloud Communication

36

slide-37
SLIDE 37

collects anonymously authenticated data

Vehicle-to-Cloud Communication with Group Signatures

Data Cloud / Verifi fier NYM Speed Par6q 52 km/h NYM Usage Par6q 4.1l NYM Speed yK11s 64 km/h NYM Usage yK11s 7.8l

▪ Which variant to control privacy vs utility? – Opening

ng not suitable – too invasive and inefficient. Might have to open all signatures

– User-contr

ntroll lled d linkab abili lity ty (pseud udony

  • nym)

m) too inflexible:

▪ Decision about linkability must be done at the moment the data is disclosed ▪ No option to selectively correlate data later on → bad tradeoff between privacy and utility ▪ Static pseudonyms allow inference attacks

37

CA / Issuer

slide-38
SLIDE 38

collects anonymously authenticated data

Group Signatures with Selective Linkability [GL19]

Data Cloud / Verifi fier NYM Speed 67ACu 52 km/h NYM Usage Par6q 4.1l NYM Speed e9SsB 64 km/h NYM Usage yK11s 7.8l

▪ Extends group signatures to allow for selective linkability after the data is collected – Data is fully unlinkable and anonymous when its collected – Selective subsets can be correlated in a consistent manner later on – Linkability is created through a dedicated entity → the converter

Optima mal l priva vacy y when n data is collected ted while prese servi ving ng the full utility ty of the data

38

CA / Issuer

slide-39
SLIDE 39

Data Cloud / Verifi fier NYM Speed e9SsB 64 km/h 67ACu 52 km/h NYM RPM QN5Ru 2518 8xHMg 4009 NYM Usage Par6q 4.1l yK11s 7.8l NYM Speed 67ACu 52 km/h NYM Usage Par6q 4.1l NYM Speed e9SsB 64 km/h NYM Usage yK11s 7.8l

▪ Data is collected in unlinkable, authenticated snippets ▪ Group signatures with fresh pseudonyms for every message

→ Cloud is assured that only legitimate data gets uploaded & full privacy is preserved

Group Signatures with Selective Linkability | Sign

39

CA / Issuer

slide-40
SLIDE 40

NYM Speed e9SsB 64 km/h 67ACu 52 km/h NYM RPM QN5Ru 2518 8xHMg 4009 NYM Usage Par6q 4.1l yK11s 7.8l

Converter

NYM Speed Usage GDA12 64 km/h 7.8l 0tU5r 52 km/h 4.1l

query: speed & usage

Group Signatures with Selective Linkability | Convert

▪ Only required sub-sets of the data are made linkable w.r.t. to join-specific pseudonym ▪ Converter transforms pseudonyms into consistent representation – Oblivi

iviousness: converter learns nothing about pseudonyms / messages it transforms

– Non-tra

transit sitivity ty: different conversion requests cannot be linked

40

slide-41
SLIDE 41

Summary

▪ Group signatures: privacy-preserving authentication ▪ Many variants & extensions exist: – Opener, pseudonyms, attributes, hardware-based, revocation, ... – Anonymous Credentials, DAA, EPID ▪ Defining security for group signatures requires a lot of care ▪ Group signature cannot guarantee privacy when messages are already identifying!

41

anj@zurich.ibm.com

Th Than anks! Questio ions?