EPFL Dialog with the ETH Board 2020 Presentation title · 2020. 7. 1. · Carmela Troncoso ....

Post on 04-Sep-2020

1 views 0 download

Transcript of EPFL Dialog with the ETH Board 2020 Presentation title · 2020. 7. 1. · Carmela Troncoso ....

Cryptographybeyondmessage encryption

Carmela Troncoso

24.06.2020

Car

mel

a Tr

onco

so

2

Example 1: Decentralized privacy-preserving proximity tracing

How it works

Car

mel

a Tr

onco

so

3

The App creates a secret every day (TEK) and from this key it derives random identifiers (RPIs) that it broadcasts via Bluetooth A random identifier is used for a limited

amount of time Without the key, no-one can link two

identifiers

Cryptography as a support for privacy

Car

mel

a Tr

onco

so

4

A

Iu&^#&980

kbdf4933&

Jhbd**@65

...

https://blog.google/documents/69/Exposure_Notification_-_Cryptography_Specification_v1.2.1.pdf

Key derivation function

Key derivation function

RPI Metadata

TEK

AES

AES

time

info

Car

mel

a Tr

onco

so

5

Example 2: Datashare NetworkDecentralized search engine for journalists

Datashare Network Goal

6

I’m searching for:“mickey mouse scandal”

Journalists can search on others’ collections for keywords of interest

- Only ICIJ and associates can use the system

- Query content is not revealed

- Searching is anonymous

- Journalists can anonymously converse with journalists that have matching documents

Authentication 7

Journalists can search on others’ collections for keywords of interest

- Only ICIJ and associates can use the system

ATTRIBUTE-BASED CREDENTIALS

Prove attributes in “Zero-knowledge”

“I am a member of the organization”Prove that you have a signature of the organization on a secret you only know

Search 8

Journalists can search on others’ collections for keywords of interest

- Query content is not revealed

(MULTI SET) PRIVATE SET INTERSECTION

Find (cardinality of) the intersectionbetween two sets without learning anything about the rest of the elements

Encrypted for PSI

Anonymous communications

9

Journalists can search on others’ collections for keywords of interest

- Searching is anonymous

ANONYMOUS COMMUNICATIONS

Rerouting to hide IPs

Tor or Nym

Encryption not only hides content, also avoids tracing messages across routers

Anonymous messaging 10

Journalists can search on others’ collections for keywords of interest

- Journalists can anonymously converse with journalists that have matching documents

ANONYMOUS ASYNCHRONOUSMESSAGING

Cryptography to establish rendez-vouspigeonholes only known to conversation partners

Dummy messages (encrypted for indistinguishability)

Contain cryptographic material that combined provides an address in the communication server

Take away message 11

Encryption is a KEY tool for privacy, because it can do MUCH MORE than hiding the content of messages

Ensure unlinkability: messages, actions, authentications, of a user cannot be linked over time

Enable anonymous authenticationwhile still providing guarantees against misuse

Enable private search and multi-party operations without revealing data

Provide common knowledge to bootstrap further private actions

Thank you for your attention

Carmela Troncoso