PRIVACY-PRESERVING ALIBI SYSTEMS Benjamin Davis , Hao Chen, Matthew - - PowerPoint PPT Presentation

privacy preserving alibi systems
SMART_READER_LITE
LIVE PREVIEW

PRIVACY-PRESERVING ALIBI SYSTEMS Benjamin Davis , Hao Chen, Matthew - - PowerPoint PPT Presentation

PRIVACY-PRESERVING ALIBI SYSTEMS Benjamin Davis , Hao Chen, Matthew Franklin University of California, Davis ASIACCS 2012 Motivation 2 Murder Case Dropped After MetroCard Verifies Alibi New York Times, January 2009 Limitations


slide-1
SLIDE 1

PRIVACY-PRESERVING ALIBI SYSTEMS

Benjamin Davis, Hao Chen, Matthew Franklin University of California, Davis ASIACCS 2012

slide-2
SLIDE 2

Motivation

2

 “Murder Case Dropped After MetroCard Verifies

Alibi” – New York Times, January 2009

 Limitations of traditional alibis

 Not ubiquitous  Can’t provide privacy

slide-3
SLIDE 3

Motivation

3

 Can we use our mobile devices to create alibis for

us… without giving up our privacy?

 We can create alibis without revealing our identity  Facilitate opportunistic alibi creation

slide-4
SLIDE 4

Participants in an Alibi Scheme

4

 Alibi Owner: “Olivia”

 Privacy always protected

 Alibi Corroborator: “Charlie”

 Identity may be public or private

 Judge:

slide-5
SLIDE 5

Requirements for our Schemes

5

 Privacy: owner identity hidden unless claimed

 No centralized or trusted third-party  No storage burden on corroborators

slide-6
SLIDE 6

Assumptions

6

 Public Key Infrastructure

 Public/private keys for all owners, corroborators

 Devices with private keys are not shared

 ID of private key user == ID of private key owner

==

slide-7
SLIDE 7

Alibi Creation

7

 Two participants are in the same place

slide-8
SLIDE 8

Alibi Creation

8

 Owner records her identity and context

Identity: “Olivia” Context: GPS, Date, Time

slide-9
SLIDE 9

Alibi Creation

9

 Owner sends sealed record to Corroborator

slide-10
SLIDE 10

Alibi Creation

10

 Corroborator certifies observation of record and

context

Context: GPS, Date, Time

slide-11
SLIDE 11

Alibi Creation

11

 Corroborator sends certification back to Owner

Context: GPS, Date, Time

slide-12
SLIDE 12

Alibi Storage

12

 Owner stores “testimony” from corroborator  Corroborator doesn’t store anything

Context: GPS, Date, Time

slide-13
SLIDE 13

Claiming an Alibi

13

 Alibi owner sends testimony to Judge

Context: GPS, Date, Time

slide-14
SLIDE 14

Claiming an Alibi

14

 Alibi owner links identity to record

Context: GPS, Date, Time

slide-15
SLIDE 15

Alibi Verification

15

 Judge confirms

 Corroborator’s testimony matches owner’s claim and

can be attributed to the corroborator

 Link between record and owner’s identity

15

Context: GPS, Date, Time

Identity: “Olivia” Context: GPS, Date, Time

slide-16
SLIDE 16

Background: String Commitment Schemes

16

 Cryptographic commitment schemes provide:

 Commit: commit to a value without revealing the value  Decommit: reveal the committed value

 Our implementation uses [Halevi & Micali ‘96]

 Noninteractive  Efficient computation and storage

slide-17
SLIDE 17

Alibi Creation (public corroborator)

17

OWNER CORROB Corroborating Evidence Owner Statement Corroborating Evidence Owner Statement + Secret OWNER JUDGE

 Owner Statement

COMMITMENT TO {

Owner identity, Owner’s view of Context Owner’s signature

}

slide-18
SLIDE 18

Alibi Creation (public corroborator)

18

OWNER CORROB Corroborating Evidence Owner Statement Corroborating Evidence Owner Statement + Secret OWNER JUDGE

 Corroborating Evidence

{

Corroborator’s view of the Context, Corroborator’s signature over (OwnerStatement || Corroborator’s Context)

}

slide-19
SLIDE 19

Alibi Verification (public corroborator)

19

Corroborating Evidence Owner Statement + Secret OWNER JUDGE OWNER CORROB Corroborating Evidence Owner Statement

 Owner presents:

 Corroborating Evidence  Owner Statement  Decommitment for Owner

Statement

slide-20
SLIDE 20

Alibi Verification (public corroborator)

20

 Judge checks:

 Corroborator’s signature  Decommit Owner Statement

 Owner’s signature  Owner’s context matches

Corroborator’s context

Corroborating Evidence Owner Statement + Secret OWNER JUDGE OWNER CORROB Corroborating Evidence Owner Statement

slide-21
SLIDE 21

Security Against Malicious Alibi Owners

21

 Alibi owner can’t modify context  Alibi owner can’t transfer alibi  Can’t reuse Corroborating Evidence

slide-22
SLIDE 22

Security Against Malicious Alibi Corroborators

22

 Identity of alibi owner is hidden until alibi is claimed  Corroborator can’t reuse or fabricate Owner

Statement

slide-23
SLIDE 23

Private Corroborator Scheme

23

 Limitations of Public Corroborator Scheme

 Corroborator must reveal identity during creation

 Naïve solutions to this problem

 Corroborator decides at creation time?

 usability nightmare

 Corroborator maintains state until owner claims alibi?

 misaligned incentives

slide-24
SLIDE 24

Review: Public Corroborator Scheme

24

1) Alibi Creation

Owner learns corroborator’s identity

2) Alibi Verification

OWNER CORROB Corroborating Evidence Corroborating Evidence Owner Statement + Secret Owner Statement OWNER JUDGE

slide-25
SLIDE 25

Private Corroborator Scheme

25

1) Alibi Creation

 Neither identity revealed

2) Alibi Corroboration

 Both must choose to

participate

3) Alibi Verification

 Same as public scheme OWNER CORROB Owner Statement + Secret Evidence Reminder Corroborating Evidence + Secret Corroborating Evidence Owner Statement + Secret Evidence Reminder Owner Statement OWNER CORROB OWNER JUDGE

slide-26
SLIDE 26

Private Corroborator Scheme

26

 New requirement: anonymous messaging system*

 Only for message delivery, not our security/privacy

properties

 Owner contacts corroborator to obtain

corroboration before claiming an alibi

* E.g. SMILE [Manweiler, Scudellari, Cox. CCS 2009]

slide-27
SLIDE 27

Advantages over Traditional Alibis

27

 Alibi owner’s consent required to

 Create alibi  Reveal identity

 Alibis are unambiguous, nontransferrable  Owner can’t fabricate corroboration without the

corroborator’s participation

 Corroborator can’t fabricate an alibi without the

  • wner’s participation
slide-28
SLIDE 28

Limitations Shared with Traditional Alibis

28

 Some forms of perjury

 Alibi owner and alibi corroborator collude  Someone makes alibi on owner’s behalf (sharing of

private key/device)

slide-29
SLIDE 29

Conclusion

29

 Privacy-preserving alibi systems

 Privacy not compromised when creating alibis

 Efficient design and implementation for mobile

devices

 Fast, small for alibi owners  Stateless for alibi corroborators