Overview Trust Management mechanism. Overview Trust Management - - PowerPoint PPT Presentation

overview
SMART_READER_LITE
LIVE PREVIEW

Overview Trust Management mechanism. Overview Trust Management - - PowerPoint PPT Presentation

P RIVACY -P RESERVING T RUST M ANAGEMENT M ECHANISMS FROM P RIVATE M ATCHING S CHEMES O RIOL F ARRS J OSEP D OMINGO -F ERRER A LBERTO B LANCO -J USTICIA Universitat Rovira i Virgili, Tarragona, Catalonia D ATA P RIVACY M ANAGEMENT 2013 Overview


slide-1
SLIDE 1

PRIVACY-PRESERVING TRUST MANAGEMENT MECHANISMS

FROM

PRIVATE MATCHING SCHEMES

ORIOL FARRÀS JOSEP DOMINGO-FERRER ALBERTO BLANCO-JUSTICIA

Universitat Rovira i Virgili, Tarragona, Catalonia

DATA PRIVACY MANAGEMENT 2013

slide-2
SLIDE 2

Overview

Trust Management mechanism.

slide-3
SLIDE 3

Overview

Trust Management mechanism. Trust among parties is established by means of the exchange of credentials.

slide-4
SLIDE 4

Overview

Trust Management mechanism. Trust among parties is established by means of the exchange of credentials. Mechanism for choosing the credentials to be exchanged...

slide-5
SLIDE 5

Overview

Trust Management mechanism. Trust among parties is established by means of the exchange of credentials. Mechanism for choosing the credentials to be exchanged... ... preserving the privacy of the parties.

slide-6
SLIDE 6

Overview

Trust Management mechanism. Trust among parties is established by means of the exchange of credentials. Mechanism for choosing the credentials to be exchanged... ... preserving the privacy of the parties. Based on a cryptographic primitive: a secure two-party computation protocol for the set intersection,

slide-7
SLIDE 7

Program

1

Motivation

2

Trust Management

3

Privacy-Preserving Trust Management

4

Our Solution

5

Conclusions

slide-8
SLIDE 8

1

Motivation

2

Trust Management

3

Privacy-Preserving Trust Management

4

Our Solution

5

Conclusions

slide-9
SLIDE 9

Information Exchange

There are many situations in which we need to exchange sensitive information: Credit card payment

slide-10
SLIDE 10

Information Exchange

There are many situations in which we need to exchange sensitive information: Credit card payment Asking for directions

slide-11
SLIDE 11

Information Exchange

There are many situations in which we need to exchange sensitive information: Credit card payment Asking for directions Medical information

slide-12
SLIDE 12

Information Exchange

There are many situations in which we need to exchange sensitive information: Credit card payment Asking for directions Medical information ...

slide-13
SLIDE 13

Information Exchange

There are many situations in which we need to exchange sensitive information: Credit card payment Asking for directions Medical information ... These interactions are easy to carry out face to face in a specific context...

slide-14
SLIDE 14

Information Exchange

There are many situations in which we need to exchange sensitive information: Credit card payment Asking for directions Medical information ... These interactions are easy to carry out face to face in a specific context... but they are challenging on the Internet, where personal identification is not obvious.

slide-15
SLIDE 15

Information Exchange

There are many situations in which we need to exchange sensitive information: Credit card payment Asking for directions Medical information ... These interactions are easy to carry out face to face in a specific context... but they are challenging on the Internet, where personal identification is not obvious. Cryptography provides tools to guarantee secure communication and to avoid malicious agents.

slide-16
SLIDE 16

Information Exchange

There are many situations in which we need to exchange sensitive information: Credit card payment Asking for directions Medical information ... These interactions are easy to carry out face to face in a specific context... but they are challenging on the Internet, where personal identification is not obvious. Cryptography provides tools to guarantee secure communication and to avoid malicious agents.

But it is not always enough...

slide-17
SLIDE 17

Need of Trust

Cryptography is not always enough. Consumers ask for more than security: 35% of consumers cite a lack of trust as the reason why they didn’t purchase on their phone more often. (GPR’13)

slide-18
SLIDE 18

Need of Trust

Cryptography is not always enough. Consumers ask for more than security: 35% of consumers cite a lack of trust as the reason why they didn’t purchase on their phone more often. (GPR’13) 33% not at all comfortable sharing personal information in an

  • App. (GPR’13)
slide-19
SLIDE 19

Need of Trust

Cryptography is not always enough. Consumers ask for more than security: 35% of consumers cite a lack of trust as the reason why they didn’t purchase on their phone more often. (GPR’13) 33% not at all comfortable sharing personal information in an

  • App. (GPR’13)

43% claim that have been asked for more personal information than necessary. (Eurobarometer)

slide-20
SLIDE 20

Need of Trust

Cryptography is not always enough. Consumers ask for more than security: 35% of consumers cite a lack of trust as the reason why they didn’t purchase on their phone more often. (GPR’13) 33% not at all comfortable sharing personal information in an

  • App. (GPR’13)

43% claim that have been asked for more personal information than necessary. (Eurobarometer) Majority is concerned about the behavior being recorded.

slide-21
SLIDE 21

Need of Trust

Cryptography is not always enough. Consumers ask for more than security: 35% of consumers cite a lack of trust as the reason why they didn’t purchase on their phone more often. (GPR’13) 33% not at all comfortable sharing personal information in an

  • App. (GPR’13)

43% claim that have been asked for more personal information than necessary. (Eurobarometer) Majority is concerned about the behavior being recorded. ...

slide-22
SLIDE 22

Need of Trust

Cryptography is not always enough. Consumers ask for more than security: 35% of consumers cite a lack of trust as the reason why they didn’t purchase on their phone more often. (GPR’13) 33% not at all comfortable sharing personal information in an

  • App. (GPR’13)

43% claim that have been asked for more personal information than necessary. (Eurobarometer) Majority is concerned about the behavior being recorded. ... There is need of designing methods to establish trust among parties.

slide-23
SLIDE 23

Need of Trust

Cryptography is not always enough. Consumers ask for more than security: 35% of consumers cite a lack of trust as the reason why they didn’t purchase on their phone more often. (GPR’13) 33% not at all comfortable sharing personal information in an

  • App. (GPR’13)

43% claim that have been asked for more personal information than necessary. (Eurobarometer) Majority is concerned about the behavior being recorded. ... There is need of designing methods to establish trust among parties. We need new access control systems in which trust is built. A solution is to exchange credentials that contain attributes of the parties.

slide-24
SLIDE 24

1

Motivation

2

Trust Management

3

Privacy-Preserving Trust Management

4

Our Solution

5

Conclusions

slide-25
SLIDE 25

Trust Management Schemes

Trust management schemes: seek the trust among strangers. Early proposals to establish trust:

slide-26
SLIDE 26

Trust Management Schemes

Trust management schemes: seek the trust among strangers. Early proposals to establish trust: To sign a Service Level Agreement

slide-27
SLIDE 27

Trust Management Schemes

Trust management schemes: seek the trust among strangers. Early proposals to establish trust: To sign a Service Level Agreement Transport Layer Security and Secure Sockets Layers

slide-28
SLIDE 28

Trust Management Schemes

Trust management schemes: seek the trust among strangers. Early proposals to establish trust: To sign a Service Level Agreement Transport Layer Security and Secure Sockets Layers Automatic Trust Negotiation schemes (Winslett, Winsborough et al.): t.m.s. in which the trust is built by means of credentials. Credentials are disclosed sequentially, according to access control policies determined by the parties.

slide-29
SLIDE 29

Trust Management Schemes

Trust management schemes: seek the trust among strangers. Early proposals to establish trust: To sign a Service Level Agreement Transport Layer Security and Secure Sockets Layers Automatic Trust Negotiation schemes (Winslett, Winsborough et al.): t.m.s. in which the trust is built by means of credentials. Credentials are disclosed sequentially, according to access control policies determined by the parties. TrustBuilder (Lee et al.)

slide-30
SLIDE 30

Trust Management Schemes

Trust management schemes: seek the trust among strangers. Early proposals to establish trust: To sign a Service Level Agreement Transport Layer Security and Secure Sockets Layers Automatic Trust Negotiation schemes (Winslett, Winsborough et al.): t.m.s. in which the trust is built by means of credentials. Credentials are disclosed sequentially, according to access control policies determined by the parties. TrustBuilder (Lee et al.) Trust-X (Squicciarini et al.)

slide-31
SLIDE 31

Trust Management Schemes

Trust management schemes: seek the trust among strangers. Early proposals to establish trust: To sign a Service Level Agreement Transport Layer Security and Secure Sockets Layers Automatic Trust Negotiation schemes (Winslett, Winsborough et al.): t.m.s. in which the trust is built by means of credentials. Credentials are disclosed sequentially, according to access control policies determined by the parties. TrustBuilder (Lee et al.) Trust-X (Squicciarini et al.) PeerTrust (Nejdl et al.)

slide-32
SLIDE 32

Trust Management Schemes

Trust management schemes: seek the trust among strangers. Early proposals to establish trust: To sign a Service Level Agreement Transport Layer Security and Secure Sockets Layers Automatic Trust Negotiation schemes (Winslett, Winsborough et al.): t.m.s. in which the trust is built by means of credentials. Credentials are disclosed sequentially, according to access control policies determined by the parties. TrustBuilder (Lee et al.) Trust-X (Squicciarini et al.) PeerTrust (Nejdl et al.) Xena (Haidar et al.)

slide-33
SLIDE 33

Trust Management Schemes

Trust management schemes: seek the trust among strangers. Early proposals to establish trust: To sign a Service Level Agreement Transport Layer Security and Secure Sockets Layers Automatic Trust Negotiation schemes (Winslett, Winsborough et al.): t.m.s. in which the trust is built by means of credentials. Credentials are disclosed sequentially, according to access control policies determined by the parties. TrustBuilder (Lee et al.) Trust-X (Squicciarini et al.) PeerTrust (Nejdl et al.) Xena (Haidar et al.) Traust (Lee et al.)

slide-34
SLIDE 34

Trust Management Schemes

Trust management and trust negotiation schemes are used as building block of commercial frameworks.

slide-35
SLIDE 35

Trust Management Schemes

Trust management and trust negotiation schemes are used as building block of commercial frameworks. The project Interoperable Trust Assurance Infrastructure (Inter-Trust) has a trust negotiation module.

slide-36
SLIDE 36

Trust Management Schemes

Trust management and trust negotiation schemes are used as building block of commercial frameworks. The project Interoperable Trust Assurance Infrastructure (Inter-Trust) has a trust negotiation module. Framework for trustworthy applications

slide-37
SLIDE 37

Trust Management Schemes

Trust management and trust negotiation schemes are used as building block of commercial frameworks. The project Interoperable Trust Assurance Infrastructure (Inter-Trust) has a trust negotiation module. Framework for trustworthy applications heterogeneous networks and devices

slide-38
SLIDE 38

Trust Management Schemes

Trust management and trust negotiation schemes are used as building block of commercial frameworks. The project Interoperable Trust Assurance Infrastructure (Inter-Trust) has a trust negotiation module. Framework for trustworthy applications heterogeneous networks and devices looks for agreements on the security policies

slide-39
SLIDE 39

Trust Management Schemes

Trust management and trust negotiation schemes are used as building block of commercial frameworks. The project Interoperable Trust Assurance Infrastructure (Inter-Trust) has a trust negotiation module. Framework for trustworthy applications heterogeneous networks and devices looks for agreements on the security policies

slide-40
SLIDE 40

Inter-Trust

Negotiation module Resource classification Negotiation policies Policy evaluation Access policies Exception treatment module Exception treatment policies Negotiation module Resource classification Negotiation policies Policy evaluation Access policies Exception treatment module Exception treatment policies

SERVICE REQUESTER SERVICE PROVIDER

request negotiation answer

Figure : Negotiation module of Inter-Trust

slide-41
SLIDE 41

1

Motivation

2

Trust Management

3

Privacy-Preserving Trust Management

4

Our Solution

5

Conclusions

slide-42
SLIDE 42

The Privacy Problem

A client C wants to access a service from S.

slide-43
SLIDE 43

The Privacy Problem

A client C wants to access a service from S. C and S exchange credentials.

slide-44
SLIDE 44

The Privacy Problem

A client C wants to access a service from S. C and S exchange credentials. If both trust on each other, the service is provided.

slide-45
SLIDE 45

The Privacy Problem

A client C wants to access a service from S. C and S exchange credentials. If both trust on each other, the service is provided. The privacy of C and S should not be compromised.

slide-46
SLIDE 46

The Privacy Problem

A client C wants to access a service from S. C and S exchange credentials. If both trust on each other, the service is provided. The privacy of C and S should not be compromised. The credentials must be appropriate.

slide-47
SLIDE 47

The Privacy Problem

A client C wants to access a service from S. C and S exchange credentials. If both trust on each other, the service is provided. The privacy of C and S should not be compromised. The credentials must be appropriate. Moreover:

slide-48
SLIDE 48

The Privacy Problem

A client C wants to access a service from S. C and S exchange credentials. If both trust on each other, the service is provided. The privacy of C and S should not be compromised. The credentials must be appropriate. Moreover: C does not want to provide information on his credentials.

unless those credentials are essential for the transaction.

slide-49
SLIDE 49

The Privacy Problem

A client C wants to access a service from S. C and S exchange credentials. If both trust on each other, the service is provided. The privacy of C and S should not be compromised. The credentials must be appropriate. Moreover: C does not want to provide information on his credentials.

unless those credentials are essential for the transaction.

S is reluctant to show a full description of his access policy.

slide-50
SLIDE 50

The Privacy Problem

A client C wants to access a service from S. C and S exchange credentials. If both trust on each other, the service is provided. The privacy of C and S should not be compromised. The credentials must be appropriate. Moreover: C does not want to provide information on his credentials.

unless those credentials are essential for the transaction.

S is reluctant to show a full description of his access policy. Each party should learn no information about the access policies or preferences of the other parties beyond what is strictly required for trust establishment.

slide-51
SLIDE 51

1

Motivation

2

Trust Management

3

Privacy-Preserving Trust Management

4

Our Solution

5

Conclusions

slide-52
SLIDE 52

Overview

Privacy-preserving mechanism to determine the optimal set of credentials to be disclosed, according to their preferences. It is an asymmetric solution, for a client-server context.

slide-53
SLIDE 53

Overview

Privacy-preserving mechanism to determine the optimal set of credentials to be disclosed, according to their preferences. It is an asymmetric solution, for a client-server context. Based on the private matching scheme of Freedman, Nissim, and Pinkas’04. A secure two-party computation protocols for the set intersection.

slide-54
SLIDE 54

Overview

Privacy-preserving mechanism to determine the optimal set of credentials to be disclosed, according to their preferences. It is an asymmetric solution, for a client-server context. Based on the private matching scheme of Freedman, Nissim, and Pinkas’04. A secure two-party computation protocols for the set intersection. Uses additive homomorphic encryption (Paillier cryptosystem).

slide-55
SLIDE 55

The Mechanism

X: domain of combinations of credentials of C, X = {VISA+ >65 Card, Driving License+Unemployed Card, Student Card+Library Card,... }

slide-56
SLIDE 56

The Mechanism

X: domain of combinations of credentials of C, X = {VISA+ >65 Card, Driving License+Unemployed Card, Student Card+Library Card,... } Y: domain of combinations of credentials credentials of S. Y = {ISOx, Membership credential+VISA certificate, ... }

slide-57
SLIDE 57

The Mechanism

X: domain of combinations of credentials of C, X = {VISA+ >65 Card, Driving License+Unemployed Card, Student Card+Library Card,... } Y: domain of combinations of credentials credentials of S. Y = {ISOx, Membership credential+VISA certificate, ... } Inputs:

slide-58
SLIDE 58

The Mechanism

X: domain of combinations of credentials of C, X = {VISA+ >65 Card, Driving License+Unemployed Card, Student Card+Library Card,... } Y: domain of combinations of credentials credentials of S. Y = {ISOx, Membership credential+VISA certificate, ... } Inputs: C introduce a list with his combinations of credentials A ⊆ X he could show.

slide-59
SLIDE 59

The Mechanism

X: domain of combinations of credentials of C, X = {VISA+ >65 Card, Driving License+Unemployed Card, Student Card+Library Card,... } Y: domain of combinations of credentials credentials of S. Y = {ISOx, Membership credential+VISA certificate, ... } Inputs: C introduce a list with his combinations of credentials A ⊆ X he could show. S introduce a list B ⊆ X × Y of pairs (b, c) showing his access policies: if S receives b ∈ X, he would reveal c ∈ Y and he would provide the service.

slide-60
SLIDE 60

The Mechanism

X: domain of combinations of credentials of C, X = {VISA+ >65 Card, Driving License+Unemployed Card, Student Card+Library Card,... } Y: domain of combinations of credentials credentials of S. Y = {ISOx, Membership credential+VISA certificate, ... } Inputs: C introduce a list with his combinations of credentials A ⊆ X he could show. S introduce a list B ⊆ X × Y of pairs (b, c) showing his access policies: if S receives b ∈ X, he would reveal c ∈ Y and he would provide the service. Output:

slide-61
SLIDE 61

The Mechanism

X: domain of combinations of credentials of C, X = {VISA+ >65 Card, Driving License+Unemployed Card, Student Card+Library Card,... } Y: domain of combinations of credentials credentials of S. Y = {ISOx, Membership credential+VISA certificate, ... } Inputs: C introduce a list with his combinations of credentials A ⊆ X he could show. S introduce a list B ⊆ X × Y of pairs (b, c) showing his access policies: if S receives b ∈ X, he would reveal c ∈ Y and he would provide the service. Output: C receives the pairs (b, c) with b ∈ A: Acceptable credential combinations to obtain the service.

slide-62
SLIDE 62

The Mechanism

X: domain of combinations of credentials of C, X = {VISA+ >65 Card, Driving License+Unemployed Card, Student Card+Library Card,... } Y: domain of combinations of credentials credentials of S. Y = {ISOx, Membership credential+VISA certificate, ... } Inputs: C introduce a list with his combinations of credentials A ⊆ X he could show. S introduce a list B ⊆ X × Y of pairs (b, c) showing his access policies: if S receives b ∈ X, he would reveal c ∈ Y and he would provide the service. Output: C receives the pairs (b, c) with b ∈ A: Acceptable credential combinations to obtain the service. Privacy:

slide-63
SLIDE 63

The Mechanism

X: domain of combinations of credentials of C, X = {VISA+ >65 Card, Driving License+Unemployed Card, Student Card+Library Card,... } Y: domain of combinations of credentials credentials of S. Y = {ISOx, Membership credential+VISA certificate, ... } Inputs: C introduce a list with his combinations of credentials A ⊆ X he could show. S introduce a list B ⊆ X × Y of pairs (b, c) showing his access policies: if S receives b ∈ X, he would reveal c ∈ Y and he would provide the service. Output: C receives the pairs (b, c) with b ∈ A: Acceptable credential combinations to obtain the service. Privacy: S does not learn A

slide-64
SLIDE 64

The Mechanism

X: domain of combinations of credentials of C, X = {VISA+ >65 Card, Driving License+Unemployed Card, Student Card+Library Card,... } Y: domain of combinations of credentials credentials of S. Y = {ISOx, Membership credential+VISA certificate, ... } Inputs: C introduce a list with his combinations of credentials A ⊆ X he could show. S introduce a list B ⊆ X × Y of pairs (b, c) showing his access policies: if S receives b ∈ X, he would reveal c ∈ Y and he would provide the service. Output: C receives the pairs (b, c) with b ∈ A: Acceptable credential combinations to obtain the service. Privacy: S does not learn A C does not learn the pairs (b, c) ∈ B with b / ∈ A.

slide-65
SLIDE 65

The Mechanism II

slide-66
SLIDE 66

The Mechanism II

Let A = {a1, . . . , as} ⊆ Zn be the list of C’s credentials.

slide-67
SLIDE 67

The Mechanism II

Let A = {a1, . . . , as} ⊆ Zn be the list of C’s credentials. C computes the polynomial p(x) = s

i=1(x − ai)

slide-68
SLIDE 68

The Mechanism II

Let A = {a1, . . . , as} ⊆ Zn be the list of C’s credentials. C computes the polynomial p(x) = s

i=1(x − ai)

C encrypts p0, . . . , ps, the coefficients of p

slide-69
SLIDE 69

The Mechanism II

Let A = {a1, . . . , as} ⊆ Zn be the list of C’s credentials. C computes the polynomial p(x) = s

i=1(x − ai)

C encrypts p0, . . . , ps, the coefficients of p C sends Enc(p0), . . . , Enc(ps) to S

slide-70
SLIDE 70

The Mechanism II

Let A = {a1, . . . , as} ⊆ Zn be the list of C’s credentials. C computes the polynomial p(x) = s

i=1(x − ai)

C encrypts p0, . . . , ps, the coefficients of p C sends Enc(p0), . . . , Enc(ps) to S

slide-71
SLIDE 71

The Mechanism II

Let A = {a1, . . . , as} ⊆ Zn be the list of C’s credentials. C computes the polynomial p(x) = s

i=1(x − ai)

C encrypts p0, . . . , ps, the coefficients of p C sends Enc(p0), . . . , Enc(ps) to S Let B = {(b1, c1), . . . , (bt, ct)} ⊆ Z2

n be the list of pairs of

accepted credentials.

slide-72
SLIDE 72

The Mechanism II

Let A = {a1, . . . , as} ⊆ Zn be the list of C’s credentials. C computes the polynomial p(x) = s

i=1(x − ai)

C encrypts p0, . . . , ps, the coefficients of p C sends Enc(p0), . . . , Enc(ps) to S Let B = {(b1, c1), . . . , (bt, ct)} ⊆ Z2

n be the list of pairs of

accepted credentials. For every 1 ≤ j ≤ t, S picks a random element rj ∈ Zn.

slide-73
SLIDE 73

The Mechanism II

Let A = {a1, . . . , as} ⊆ Zn be the list of C’s credentials. C computes the polynomial p(x) = s

i=1(x − ai)

C encrypts p0, . . . , ps, the coefficients of p C sends Enc(p0), . . . , Enc(ps) to S Let B = {(b1, c1), . . . , (bt, ct)} ⊆ Z2

n be the list of pairs of

accepted credentials. For every 1 ≤ j ≤ t, S picks a random element rj ∈ Zn. S computes Enc(rj · p(bj)) and Enc(bj||cj) for 1 ≤ j ≤ t.

slide-74
SLIDE 74

The Mechanism II

Let A = {a1, . . . , as} ⊆ Zn be the list of C’s credentials. C computes the polynomial p(x) = s

i=1(x − ai)

C encrypts p0, . . . , ps, the coefficients of p C sends Enc(p0), . . . , Enc(ps) to S Let B = {(b1, c1), . . . , (bt, ct)} ⊆ Z2

n be the list of pairs of

accepted credentials. For every 1 ≤ j ≤ t, S picks a random element rj ∈ Zn. S computes Enc(rj · p(bj)) and Enc(bj||cj) for 1 ≤ j ≤ t. S sends Enc(rj · p(bj) + (bj||cj)) to C.

slide-75
SLIDE 75

The Mechanism II

Let A = {a1, . . . , as} ⊆ Zn be the list of C’s credentials. C computes the polynomial p(x) = s

i=1(x − ai)

C encrypts p0, . . . , ps, the coefficients of p C sends Enc(p0), . . . , Enc(ps) to S Let B = {(b1, c1), . . . , (bt, ct)} ⊆ Z2

n be the list of pairs of

accepted credentials. For every 1 ≤ j ≤ t, S picks a random element rj ∈ Zn. S computes Enc(rj · p(bj)) and Enc(bj||cj) for 1 ≤ j ≤ t. S sends Enc(rj · p(bj) + (bj||cj)) to C.

slide-76
SLIDE 76

The Mechanism II

Let A = {a1, . . . , as} ⊆ Zn be the list of C’s credentials. C computes the polynomial p(x) = s

i=1(x − ai)

C encrypts p0, . . . , ps, the coefficients of p C sends Enc(p0), . . . , Enc(ps) to S Let B = {(b1, c1), . . . , (bt, ct)} ⊆ Z2

n be the list of pairs of

accepted credentials. For every 1 ≤ j ≤ t, S picks a random element rj ∈ Zn. S computes Enc(rj · p(bj)) and Enc(bj||cj) for 1 ≤ j ≤ t. S sends Enc(rj · p(bj) + (bj||cj)) to C. C decrypts the received messages.

slide-77
SLIDE 77

The Mechanism II

Let A = {a1, . . . , as} ⊆ Zn be the list of C’s credentials. C computes the polynomial p(x) = s

i=1(x − ai)

C encrypts p0, . . . , ps, the coefficients of p C sends Enc(p0), . . . , Enc(ps) to S Let B = {(b1, c1), . . . , (bt, ct)} ⊆ Z2

n be the list of pairs of

accepted credentials. For every 1 ≤ j ≤ t, S picks a random element rj ∈ Zn. S computes Enc(rj · p(bj)) and Enc(bj||cj) for 1 ≤ j ≤ t. S sends Enc(rj · p(bj) + (bj||cj)) to C. C decrypts the received messages. C obtains a valid pair (b, c) with b ∈ A or a random number

slide-78
SLIDE 78

The Mechanism III

The protocol is secure in the honest-but-curious model: parties follow the protocol’s instructions.

slide-79
SLIDE 79

The Mechanism III

The protocol is secure in the honest-but-curious model: parties follow the protocol’s instructions. The amount of exponentiations needed is O(s · t), and it can be reduced to O(s + t ln ln s), where s = |A|, t = |B|

slide-80
SLIDE 80

The Mechanism III

The protocol is secure in the honest-but-curious model: parties follow the protocol’s instructions. The amount of exponentiations needed is O(s · t), and it can be reduced to O(s + t ln ln s), where s = |A|, t = |B| More efficient than other proposals:

slide-81
SLIDE 81

The Mechanism III

The protocol is secure in the honest-but-curious model: parties follow the protocol’s instructions. The amount of exponentiations needed is O(s · t), and it can be reduced to O(s + t ln ln s), where s = |A|, t = |B| More efficient than other proposals: Point-Based Trust (Yao et al.): quantitative approach

slide-82
SLIDE 82

The Mechanism III

The protocol is secure in the honest-but-curious model: parties follow the protocol’s instructions. The amount of exponentiations needed is O(s · t), and it can be reduced to O(s + t ln ln s), where s = |A|, t = |B| More efficient than other proposals: Point-Based Trust (Yao et al.): quantitative approach Privacy-Reconciliation Protocols (Meyer et al.): the optimal credentials is hard to compute.

slide-83
SLIDE 83

1

Motivation

2

Trust Management

3

Privacy-Preserving Trust Management

4

Our Solution

5

Conclusions

slide-84
SLIDE 84

Conclusions and Open Problems

Conclusions

slide-85
SLIDE 85

Conclusions and Open Problems

Conclusions Privacy-preserving mechanism for trust management.

slide-86
SLIDE 86

Conclusions and Open Problems

Conclusions Privacy-preserving mechanism for trust management. The parties can control of the information revealed about their credentials.

slide-87
SLIDE 87

Conclusions and Open Problems

Conclusions Privacy-preserving mechanism for trust management. The parties can control of the information revealed about their credentials. Secure two-party computation protocol.

slide-88
SLIDE 88

Conclusions and Open Problems

Conclusions Privacy-preserving mechanism for trust management. The parties can control of the information revealed about their credentials. Secure two-party computation protocol. Open problems:

slide-89
SLIDE 89

Conclusions and Open Problems

Conclusions Privacy-preserving mechanism for trust management. The parties can control of the information revealed about their credentials. Secure two-party computation protocol. Open problems: Find more suitable private matching schemes.

slide-90
SLIDE 90

Conclusions and Open Problems

Conclusions Privacy-preserving mechanism for trust management. The parties can control of the information revealed about their credentials. Secure two-party computation protocol. Open problems: Find more suitable private matching schemes. Extend to other adversary models.

slide-91
SLIDE 91

Conclusions and Open Problems

Conclusions Privacy-preserving mechanism for trust management. The parties can control of the information revealed about their credentials. Secure two-party computation protocol. Open problems: Find more suitable private matching schemes. Extend to other adversary models. Combine with fair exchange mechanisms.

slide-92
SLIDE 92

Conclusions and Open Problems

Conclusions Privacy-preserving mechanism for trust management. The parties can control of the information revealed about their credentials. Secure two-party computation protocol. Open problems: Find more suitable private matching schemes. Extend to other adversary models. Combine with fair exchange mechanisms. Integration into general frameworks.

slide-93
SLIDE 93

THANK YOU