NSLab 

Paper Presentation

B06902097 資工三 楊皓丞

這學期主要做的研究

  • Anonymous Authentication Protocols:
    • Direct Anonymous Attestation (DAA)
    • Group Signatures
    • Ring Signatures
    • Their applications on wifi authentication
  • Anonymous Communication (AC) Protocols:
    • 後來有空有興趣就看了一些這方面的paper
    • Tor, Mix net, DC net, ...
    • 今天要報一篇關於AC protocol性質的paper

Topic

  • Anonymity Trilemma:
    • Strong Anonymity
    • Low Bandwidth Overhead
    • Low Latency Overhead
  • Choose two!

Reference: D. Das, S. Meiser, E. Mohammadi, and A. Kate, “Anonymity trilemma: Strong anonymity, low bandwidth overhead, low latency—choose two,” Proceedings of IEEE S&P 2018 (to appear), San Francisco, CA, USA, May 2018. Available: https://eprint.iacr.org/2017/954

AC Networks

Alice

Eve

Oliver

Anonymous set

Example

Alice

Eve

Oliver

Low Anonymity

High Anonymity

The Trilemma

  • Given the user behavior, either:
  • Accept low anonymity
  • Increase latency overhead
    (wait for messages)
  • Increase bandwidth overhead
    (produce dummy messages)

Anonymity Trilemma

Strong Anonymity

Low Bandwidth Overhead

Low Latency Overhead

mix-nets

DC-nets

Tor

Can we achieve this?

No

Aim of the paper

  • State that there's a tradeoff among anonymity \(\delta\) , latency overhead \(l\), and bandwidth overhead \(\beta\).
  • Give the constraints of the parameters \(\delta, l, \beta\), for protocol designers to consider.
  • Give the constraints of the parameters \(l, \beta\) that must hold to achieve strong anonymity, for protocol designers to consider.

Definitions - Anonymity

  • AnoA style challenge response game
  • \(\delta \ge 0\) is the advantage of the attacker
  • \(\delta\) is a function of \(\eta\), the security parameter
  • \(\Pr(\text{Attacker wins}) \le \Pr(\text{Attacker loses}) + \delta(\eta)\)
  • Strong anonymity: \(\delta(\eta) = neg(\eta)\)

Alice

Eve

Oliver

Bob

Alice or Bob?

Definitions - Latency

  • One time unit = One communication round
  • \(l\) is the maximum number of rounds the message can stay in the network before being delivered
  • In this example, \(l=3\) if the routers always forward messages the next round after receiving them

Alice

Eve

Definitions - Bandwidth

  • \(\beta\) is the average number of dummy messages that needs to be sent per user per round
  • In this example, \(\beta=\frac{2}{N}\) if the blue and green arrows are two users assigned to send one dummy message this turn, and there are \(N\) users in total.

Alice

Eve

Scenarios Discussed

  • User behavior
    • Synchronized: over \(N\) rounds, exactly one user per round sends a message, and each user sends once
    • Unsynchronized: in each round, each user sends a message with probability \(p\)

Scenarios Discussed

  • Attacker capability
    • Global passive: monitors all the message flows, but cannot see the content of the message except at compromised nodes
    • Attacker compromised the receiver and \(c\) out of \(K\) protocol parties
    • Non-compromising attacker: \(c = 0\)
    • Compromising attacker: \(c > 0\)

Scenarios Discussed

  • For each scenario, the paper gives two sets of constraints:
    • The inequalities of  \(\delta, l, \beta\)
    • The inequalities of \(l, \beta\) to achieve strong anonymity
  • ​​Necessary conditions, not sufficient conditions.
  • We focus on synchronized, non-compromising attacker scenario, the others are of similar logic
Non-compromising Compromising
Synchronized
Unsynchronized

Most simple!

Proof Outline

  • Derive a lower bound on attacker advantage \(\delta\)
    • For a protocol \(\prod\), \(\delta\) is the greatest advantage of all attackers \(A \in Attackers\)
    • Which is bounded by the advantage of a specific attacker \(A_{paths}\)
    • Which is bounded by \(\Pr(\text{Invariant 1 is true})\)
    • Which is bounded by \(\min(\Pr(\text{Invariant 1 is true}))\) among all protocols with parameters \(l, \beta\)
    • Which can be expressed as an inequality
  • Derive a necessary condition for strong anonymity, using the bound derived above

Construction of \(A_{paths}\)

Alice

Eve

Bob

Alice!

Construction of \(A_{paths}\)

Alice

Eve

Bob

I don't know...

Construction of \(A_{paths}\)

Alice

Eve

Bob

if \(l=4\):

I don't know...

if \(l=3\):

Alice!

Construction of \(A_{paths}\)

  • \(A_{paths}\) simply checks reachability based on \(l\) and the network structure
  • If it is impossible that either Alice or Bob send the message, \(A_{paths}\) wins with probability 1
  • Else, it flips a coin and guess Alice or Bob and wins with probability 0.5
  • \(A_{paths}\) only checks reachability, it does't analyze whether Alice or Bob is more likely to send the message if both are possible

Invariant 1

  • Let \(u_0, u_1\) be the challenged users
  • \(u_b\) is the real user sending the challenge message
  • The challenge message is sent at \(t_0\) by \(u_b\)
  • The challenge message is received at  time \(r\)
  • \(u_{1-b}\) sent messages at time \(V=\{t_1, t_2, ..., t_k\}\)
  • Let \(T=\{t:t \in V \land (r-l) \le t < r\}\)

Invariant 1

  • \(u_{1-b}\) sent messages at time \(V=\{t_1, t_2, ..., t_k\}\)
  • Let \(T=\{t:t \in V \land (r-l) \le t < r\}\)
  • Then (Invariant 1 is true) is defined as the event that
    1. \(T \ne \phi\), and
    2. The challenge message passed through a not compromised node at time \(t'\), where
      \(\min(T) \le t' \le r - 1\)

Invariant 1

\(r\)

\(t_1\)

\(t_2\)

\(t_0\)

\(t_3\)

\(t_4\)

\(t_5\)

\(r-l\)

Alice sends

Eve receives

Bob sends a message inside this interval

Challenge message passes through a honest node in this interval

If Invariant 1 doesn't hold, \(A_{paths}\) wins with probability 1

Derive the probability

  • Synchronized and non-compromising case
  • \(H_1\): In the \(l\) rounds, \(u_{1-b}\) sends at least one noise message
  • \(H_2\): In the \(l\) rounds, \(u_{1-b}\) sends his user message
  • \(H_3\): Invariant 1 is true \(\equiv (T \ne \phi) \equiv (H_1 \lor H_2)\)

Derive the probability

  • \(H_2\): In the \(l\) rounds, \(u_{1-b}\) sends his user message
  • \(\Pr(H_2) \le \frac{l-1}{N-1}\)
  • \(H_1\): In the \(l\) rounds, \(u_{1-b}\) sends at least one noise message
  • \(\Pr(H_1) \le \frac{\beta N l}{N-1}\)
  • \(H_3\): Invariant 1 is true \(\equiv (T \ne \phi) \equiv (H_1 \lor H_2)\)
  • \(\Pr(H_3) = \Pr(H_1 \lor H_2) \le \min(1, \Pr(H_1) + \Pr(H_2))\\ \Pr(H_3) \le \min(1, \frac{l+\beta N l}{N-1})\)

Derive the constraint - 1

  • \( \Pr(H_3) \le \min(1, \frac{l+\beta N l}{N-1})\)
  • Let \(f_\beta(l)=\min(1,\frac{1+\beta N l}{N - 1})\)
  • Since \(A_{paths}\) wins with probability \(P \ge\)
    \(\Pr(H_3) \times 0.5 + (1 - \Pr(H_3)) \times 1=1+0.5\Pr(\lnot H_3)\)
  • \(A_{paths}\)'s advantage \(\delta \ge \Pr(\lnot H_3) \ge  1-f_\beta(l)\)
     
  • Any protocol must satisfy  \(\delta \ge 1-f_\beta(l)\)

Derive the constraint - 2

  • \(\delta \ge 1-f_\beta(l)\)
  • \(\delta(\eta) \ge \frac{N-l-\beta N l}{N-1} \ge 1 - \frac{l}{N} - \beta l\)
  • Assume that \(\delta(\eta) =neg(\eta)\) and \( 2l\beta < 1 - \epsilon(\eta)\)
  • By \(\epsilon(\eta) > \delta(\eta)\), we can derive that if \(l < N\), there must be a contradiction that \(\epsilon(\eta) < \delta(\eta)\)
     
  • Any protocol with \(l<N\) and \( 2l\beta < 1 - \epsilon(\eta)\) cannot achieve strong anonymity

Derive the constraint

  • Any protocol must satisfy  \(\delta \ge 1-f_\beta(l)\)
  • Any protocol with \(l<N\) and \( 2l\beta < 1 - \epsilon(\eta)\) cannot achieve strong anonymity
     
  • In unsynchronized case, if user sends message \(p\) of the time, strong anonymity cannot be achieved if
    \( 2l(\beta+p) < 1 - \epsilon(\eta)\)
  • Constraints of other scenarios use similar proof techniques

Cases

  • \(l=N,\beta=0\): possible

Alice

Eve

Bob

I don't know...

Carol

Cases

  • \(l=\frac{N}{3},\beta=\frac{3}{N}\): possible

Alice

Eve

Bob

I don't know...

Carol

Cases

  • \(l=1,\beta=\frac{1}{2}\): impossible,
    although constraint holds

Alice

Eve

Bob

If \(u_0\) or \(u_1\) is Carol, I win

Carol

Non-negligible
advantage!

Results

\(l\)

\(\beta\)

mix-net

Tor

DC-net

\(O(N)\)

\(O(1)\)

\(O(\frac{1}{N})\)

grey area: \(2l\beta < 1 - \epsilon\)

no strong anonymity

\(O(1)\)

Takeaways & Thoughts

  • When designing AC protocols, there will always be a trilemma between anonymity, latency, and bandwidth
  • The constraints are necessary conditions, and I think the bounds are too loose
  • Maybe tighter bounds can be derived
  • User behavior (message sending rate) can compensate for bandwidth, so is the trilemma really unavoidable?

Questions?

Paper Presentation

By Howard Yang

Paper Presentation

  • 51