theorem proving privacy and anonymity
play

Theorem-proving Privacy and Anonymity Yoshinobu KAWABE NTT - PowerPoint PPT Presentation

Theorem-proving Privacy and Anonymity Yoshinobu KAWABE NTT Communication Science Laboratories NTT Corporation References Simulation-based proof method of privacy/anonymity Y. Kawabe, K. Mano, H. Sakurada and Y. Tsukada


  1. Theorem-proving Privacy and Anonymity Yoshinobu KAWABE NTT Communication Science Laboratories NTT Corporation

  2. References • Simulation-based proof method of privacy/anonymity – Y. Kawabe, K. Mano, H. Sakurada and Y. Tsukada Theorem-proving anonymity of infinite state systems Information Processing Letters, vol. 101, No.1, 2007 – Y. Kawabe, K. Mano, H. Sakurada and Y. Tsukada Backward simulations for anonymity WITS ’06 (Full version: submitted for journal publication) – I. Hasuo and Y. Kawabe Probabilistic anonymity via coalgebraic simulations Submitted for publication

  3. Online privacy Online anonymity is attracting growing • Threats – ISPs in EU are forced to keep logs of your web access • Public concerns – You don’t care? • Research interest – See Anonymity Bibliography http://freehaven.net/anonbib/ – No decisive definition for “privacy”, “anonymity”, etc.

  4. Overview of this talk A formal definition of anonymity which is based on traces [ESORICS ’96, Schneider & Sidiropoulos] Proving trace inclusion by simulation [Lynch & Vaandrager] • Simulation-based proof method for trace anonymity • Theorem-proving anonymity

  5. Contents • A method to prove anonymity (=privacy) • Formalization of anonymity & anonymous simulation technique • Theorem-proving anonymity/privacy • Crowds protocol

  6. What is anonymity? • Nobody can know “who it is”. • Key notion: Principle of confusion Who?

  7. What is anonymity? Adversary’s viewpoint This person looks like Kawabe … but his face is hidden. This person • Nobody can know “who it is”. might not be Kawabe. • Key notion: Principle of confusion Who?

  8. What is anonymity? Adversary’s viewpoint This person looks like Kawabe … but his face is hidden. This person • Nobody can know “who it is”. The guys on this photo might not be Kawabe. are too small ! I cannot • Key notion: Principle of confusion recognize Kawabe! Who? Can you Releasing find me? sea turtles

  9. “Trace” anonymity [Schneider&Sidiropoulos, ESORICS’96] • Anonymous donation as an example X X’ Alice Alice Bob Bob

  10. “Trace” anonymity [Schneider&Sidiropoulos, ESORICS’96] • Anonymous donation as an example X X’ : actor action Alice Alice Alice (invisible for adversary) : observable action Bob Bob Are these protocols anonymous?

  11. “Trace” anonymity [Schneider&Sidiropoulos, ESORICS’96] • Anonymous donation as an example Anonymous! Not anonymous! X X’ Alice Alice Bob Bob

  12. “Trace” anonymity [Schneider&Sidiropoulos, ESORICS’96] • Anonymous donation as an example Anonymous! Not anonymous! X X’ Alice Alice Bob Bob Observation can be attributed to anybody (confusion!) Definition (Trace anonymity) Alice Bob Chris

  13. How to prove anonymity? --- Find an anonymous simulation! • Binary relation as over states ( X ) 1. Initial state condition: as ( s, s ) for any s ∈ start ( X ) 2. Step correspondence condition: (Case 1) a is an actor action (Case 2) a is not an actor action a a s 1 s 2 s 1 s 2 as as t 1 t 1 s 2 s 2 implies implies as as ∀ a’ a ∃ ∃ t 1 t 1 t 2 t 2

  14. Soundness of the technique • An anonymous simulation is a simulation from anonym ( X ) to X . [Thm] ∃simulation from X to Y ⇒ traces ( X ) ⊆ traces ( Y ) . [Lynch and Vaandrager, Inform.&Comput. 1995] X anonym ( X ) Alice Alice Bob Alice Bob Bob

  15. Soundness of the technique • An anonymous simulation is a simulation from anonym ( X ) to X . “anonymized” version of X [Thm] ∃simulation from X to Y ⇒ traces ( X ) ⊆ traces ( Y ) . (trivially anonymous) [Lynch and Vaandrager, Inform.&Comput. 1995] X anonym ( X ) Alice Alice Bob Alice Bob Bob

  16. Soundness of the technique • An anonymous simulation is a simulation from anonym ( X ) to X . “anonymized” version of X [Thm] ∃simulation from X to Y ⇒ traces ( X ) ⊆ traces ( Y ) . (trivially anonymous) [Lynch and Vaandrager, Inform.&Comput. 1995] X anonym ( X ) Alice Alice Bob Alice Bob Bob traces ( X ) ⊆ traces ( anonym ( X )) is trivial. ⇒ traces ( X ) = traces ( anonym ( X )) holds!

  17. Contents • A method to prove anonymity (=privacy) • Formalization of anonymity & anonymous simulation technique • Theorem-proving anonymity/privacy • Crowds protocol

  18. An example: Crowds [Reiter & Rubin, ACM Trans. 1998] • Comm. system for anonymous web access Crowds Web site Next agent is chosen randomly. Initiator

  19. An example: Crowds [Reiter & Rubin, ACM Trans. 1998] • Comm. system for anonymous web access Crowds Web site Next agent is chosen randomly. observe Initiator reporting Forwarders Adversary might be “corrupt” Anonymous = the adversary cannot know the initiator.

  20. Theorem-proving anonymity of the Crowds example • Steps – Specify the system in IOA language which is a formal specification language based I/O- automaton – Translate the specification into LP’s language --- first-order logic formulae --- with IOA-Toolkit – Prove anonymity with Larch Prover by proving there is an anonymous simulation

  21. IOA language • Formal specification language based on I/O- automaton – I/O-automaton (N. Lynch): formal system to describe and analyze distributed algorithms • Formalization of distributed algorithms in IOA – Actions: precondition-effect style (i.e. if ~ then ~ ) – Data: (many-sorted) equational theory • LSL (Larch Specification Language)

  22. Specification of Crowds Crowds Web site Next agent is chosen randomly. observe observe Initiator reporting reporting Forwarders Forwarders Adversary Adversary might be “corrupt” might be “corrupt”

  23. IOA-Toolkit • Collection of formal verification tools for distributed systems Prove anonymity Larch ioaCheck lsl .ioa .lsl .lp Prover il2lsl Target Source file file .lsl Libraries Compiling .ioa into .lp with IOA-Toolkit

  24. Theorem-proving anonymity • Introducing a candidate relation • Proving that as is an anonymous simulation Initial state condition Step correspondence condition (for actor actions)

  25. Conclusion • A technique to theorem-prove anonymity of security protocols – Simulation technique for trace-based anonymity • Example – Crowds

  26. Coming soon with theorem provers

  27. Ongoing work • Simulation-based proof techniques for probabilistic anonymity – Conditional anonymity (with Ichiro Hasuo) • With coalgebras, our method is extended. – Probable innocence (with Hideki Sakurada and Ichiro Hasuo) • Verifying anonymity for protocols in the presence of intruders

  28. Questions?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend