privacy preserving alibi systems
play

PRIVACY-PRESERVING ALIBI SYSTEMS Benjamin Davis , Hao Chen, Matthew - PowerPoint PPT Presentation

PRIVACY-PRESERVING ALIBI SYSTEMS Benjamin Davis , Hao Chen, Matthew Franklin University of California, Davis ASIACCS 2012 Motivation 2 Murder Case Dropped After MetroCard Verifies Alibi New York Times, January 2009 Limitations


  1. PRIVACY-PRESERVING ALIBI SYSTEMS Benjamin Davis , Hao Chen, Matthew Franklin University of California, Davis ASIACCS 2012

  2. Motivation 2  “Murder Case Dropped After MetroCard Verifies Alibi” – New York Times, January 2009  Limitations of traditional alibis  Not ubiquitous  Can’t provide privacy

  3. Motivation 3  Can we use our mobile devices to create alibis for us… without giving up our privacy?  We can create alibis without revealing our identity  Facilitate opportunistic alibi creation

  4. Participants in an Alibi Scheme 4  Alibi Owner: “Olivia”  Privacy always protected  Alibi Corroborator: “Charlie”  Identity may be public or private  Judge:

  5. Requirements for our Schemes 5  Privacy: owner identity hidden unless claimed  No centralized or trusted third-party  No storage burden on corroborators

  6. Assumptions 6  Public Key Infrastructure  Public/private keys for all owners, corroborators  Devices with private keys are not shared  ID of private key user == ID of private key owner ==

  7. Alibi Creation 7  Two participants are in the same place

  8. Alibi Creation 8  Owner records her identity and context Identity: “Olivia” Context: GPS, Date, Time

  9. Alibi Creation 9  Owner sends sealed record to Corroborator

  10. Alibi Creation 10  Corroborator certifies observation of record and context Context: GPS, Date, Time

  11. Alibi Creation 11  Corroborator sends certification back to Owner Context: GPS, Date, Time

  12. Alibi Storage 12  Owner stores “testimony” from corroborator  Corroborator doesn’t store anything Context: GPS, Date, Time

  13. Claiming an Alibi 13  Alibi owner sends testimony to Judge Context: GPS, Date, Time

  14. Claiming an Alibi 14  Alibi owner links identity to record Context: GPS, Date, Time

  15. Alibi Verification 15  Judge confirms  Corroborator’s testimony matches owner’s claim and can be attributed to the corroborator  Link between record and owner’s identity Identity: “Olivia” Context: GPS, Date, Time Context: GPS, Date, Time 15

  16. Background: String Commitment Schemes 16  Cryptographic commitment schemes provide:  Commit : commit to a value without revealing the value  Decommit : reveal the committed value  Our implementation uses [Halevi & Micali ‘96]  Noninteractive  Efficient computation and storage

  17. Alibi Creation (public corroborator) 17  Owner Statement Owner Statement CORROB OWNER COMMITMENT TO { Corroborating Evidence Owner identity, Owner’s view of Context Owner’s signature } Corroborating OWNER JUDGE Evidence Owner Statement + Secret

  18. Alibi Creation (public corroborator) 18  Corroborating Evidence Owner Statement CORROB OWNER { Corroborating Evidence Corroborator’s view of the Context, Corroborator’s signature over (OwnerStatement || Corroborator’s Context) Corroborating OWNER JUDGE Evidence } Owner Statement + Secret

  19. Alibi Verification (public corroborator) 19  Owner presents: Owner Statement CORROB OWNER  Corroborating Evidence  Owner Statement Corroborating Evidence  Decommitment for Owner Statement Corroborating OWNER JUDGE Evidence Owner Statement + Secret

  20. Alibi Verification (public corroborator) 20  Judge checks: Owner Statement CORROB OWNER  Corroborator’s signature  Decommit Owner Statement Corroborating Evidence  Owner’s signature  Owner’s context matches Corroborator’s context Corroborating OWNER JUDGE Evidence Owner Statement + Secret

  21. Security Against Malicious Alibi Owners 21  Alibi owner can’t modify context  Alibi owner can’t transfer alibi  Can’t reuse Corroborating Evidence

  22. Security Against Malicious Alibi Corroborators 22  Identity of alibi owner is hidden until alibi is claimed  Corroborator can’t reuse or fabricate Owner Statement

  23. Private Corroborator Scheme 23  Limitations of Public Corroborator Scheme  Corroborator must reveal identity during creation  Naïve solutions to this problem  Corroborator decides at creation time?  usability nightmare  Corroborator maintains state until owner claims alibi?  misaligned incentives

  24. Review: Public Corroborator Scheme 24 Owner Statement 1) Alibi Creation Owner learns corroborator’s identity CORROB OWNER Corroborating Evidence Corroborating 2) Alibi Verification OWNER JUDGE Evidence Owner Statement + Secret

  25. Private Corroborator Scheme 25 Owner Statement CORROB 1) Alibi Creation OWNER  Neither identity revealed Evidence Reminder Owner 2) Alibi Corroboration Statement + Secret CORROB OWNER  Both must choose to Evidence Reminder participate Corroborating Evidence + Secret 3) Alibi Verification Corroborating OWNER JUDGE  Same as public scheme Evidence Owner Statement + Secret

  26. Private Corroborator Scheme 26  New requirement: anonymous messaging system*  Only for message delivery, not our security/privacy properties  Owner contacts corroborator to obtain corroboration before claiming an alibi * E.g. SMILE [Manweiler, Scudellari, Cox. CCS 2009]

  27. Advantages over Traditional Alibis 27  Alibi owner’s consent required to  Create alibi  Reveal identity  Alibis are unambiguous, nontransferrable  Owner can’t fabricate corroboration without the corroborator’s participation  Corroborator can’t fabricate an alibi without the owner’s participation

  28. Limitations Shared with Traditional Alibis 28  Some forms of perjury  Alibi owner and alibi corroborator collude  Someone makes alibi on owner’s behalf (sharing of private key/device)

  29. Conclusion 29  Privacy-preserving alibi systems  Privacy not compromised when creating alibis  Efficient design and implementation for mobile devices  Fast, small for alibi owners  Stateless for alibi corroborators

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend