v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v...

32
The 3 rd IEEE International Workshop on Big Data and IoT Security in Smart Computing (BITS 2019) co-held with The 5 th IEEE International Conference on Smart Computing (SMARTCOMP 2019) 12 June 2019, Washington D.C., USA Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs Hiroaki ANADA *1 *1: Dept. Information Security, University of Nagasaki, JAPAN

Transcript of v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v...

Page 1: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

The 3rd IEEE International Workshop on Big Data and IoT Security in Smart Computing (BITS 2019)

co-held with The 5th IEEE International Conference on Smart Computing (SMARTCOMP 2019)

12 June 2019, Washington D.C., USA

Decentralized Multi-authority Anonymous Authentication

for Global Identities with Non-interactive Proofs

Hiroaki ANADA*1

*1: Dept. Information Security, University of Nagasaki, JAPAN

Page 2: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

Table of ContentPart I. Introduction

1. Motivation2. Challenging Problem

Part II. Construction1. Approach2. Building blocks3. How to compose them (& our Ideas)4. Security Analysis on Collusion attacks5. Security Analysis on Anonymity

Conclusion

2

Page 3: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

Part I: Motivation

IoT with Cloud• Access to Internet• Delegation of

computation• Collaborative Service

• Key Technology of

SMART CITY

3

INTERNETOF THINGS

Page 4: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

Motivation:

Collaborative Service: Example1

Authenticate her single digital IDto generate additional value

4

Page 5: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

Motivation

Collaborative Service: Example2 Authenticate her single digital ID

to generate additional value

29 Oct 2018 5

Page 6: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

MotivationWhat’s a problem?• Privacy Issue

No ID information should be leaked!

29 Oct 2018 6

Page 7: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

MotivationWhat’s a problem? • Privacy Issue

No ID information should be leaked!

29 Oct 2018 7

?

??

Page 8: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

Motivation

Decentralized Multi-authority Anonymous Authentication(DMA-A-AUTH)

• Anonymous protocol Not by pseudonym, but by unlinkable processes

8

?

?

Ano.Prot.

Ano.Prot. ?

Page 9: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

MotivationWhat’s a problem? • The very anonymity causes potential drawback:Collusion Attack

9

?

?

Ano.Prot.

Ano.Prot.

?

Page 10: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

MotivationSo, our challenging problem is:

• Construct DMA-A-AUTH

• For global digital ID So that authorities only have to generate a digital

signature on them

• Capable of preventing collusion attacks

10

?

? ?

Page 11: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

Previous Work1. DMA-ABS• Decentralized Multi-authority

Attribute-Based Signature Scheme

• State-of-the-art work; for example;[1] “Decentralized Attribute-Based Signatures” Okamoto and Takashima, PKC 2013

But not for direct signing onglobal digital identifiers

11

Page 12: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

Previous Work2. DMA-A-AUTH w. Interactive Protocol

• Some papers: [2] “Anonymous Authentication Scheme with Decentralized Multi-Authorities” Anada and Arita, BITS 2017[3] “Witness-Indistinguishable Arguments with ∑-Protocols for Bundled Witness Spaces and Its Application to Global Identities” Anada and Arita, ICICS 2018

• Three-move protocol

Needs on-line interaction 12

Msg 1

Msg 2

Msg 3

Page 13: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

MotivationSo, our challenging problem is:

• Construct DMA-A-AUTH

• For global digital ID So that authorities only have to generate a digital

signature on them

• Non-interactive• Capable of preventing collusion attacks

13

?

? ?

=( , )CertificateAuthority

Page 14: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

Part II. Construction

14

Page 15: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

Approach Language

What is a language?• Language = a set of “statements”

• For ex., statement • For ex., statement • For ex., statement •

• Relation•• Finding of should be hard, but verifying membership:

“ ” should be easy• is called a “witness” of

15

: “public parameter”

NP language

Page 16: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

Approach Language to capture our problem• “Bundled product” of a language

• Why can “Bundled product” capture our problem?• Because if we prove knowledge of such in WI way

statement means:“I’m not colluding cheaters, but a single legitimate person”

16

Page 17: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

Approach Proof System for Language• What is a proof system for ?

•• P: a prover, V: a verifier• Under a statement , P tries to convince a verifier V that P

knows a witness of

• What are requirements for ?1. Completeness2. Soundness, or more strongly, Knowledge Soundness3. Zero-Knowledge, or more weakly,

Witness-Indistinguishability (WI):If has plural witnesses: , then V cannot decide the one used by P

17

Page 18: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

Building blocks 1. Proof System for Our language

• Groth-Sahai Proof System [4]• Non-interactive• Perfectly witness-indistinguishable (GS-NIWI)• Using “bilinear groups”:

: cyclic groups, order

Bilinearity:

18

[4] “Efficient Non-interactive Proof Systems for Bilinear Groups”, Groth andSahai, Eurocrypt 2008

Page 19: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

Building blocks2. Digital Signature Scheme

• For an authority to generate a signature on a global digital identity string of a user

gid, signature

19

= ( , )CertificateAuthority

= ( , )CertificateAuthority

= ( , )CertificateAuthority

Page 20: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

Building blocksSignature Scheme for Our Case

• Structure-preserving signature scheme (SPS) [5]• A message is in one of the source groups ( )• A signature is also in the same

source groups ( )

• Suitable for GS-NIWI• Because can be a witness to be proved

20

[5] “Structure-Preserving Signatures and Commitments to Group Elements”, Abe, Fuchsbauer, Groth, Haralambiev and Ohkubo, Crypto 2010

=( , )CertificateAuthority

Page 21: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

How to Compose Them (& our Ideas)Language

• A statement is the equation:(Symbols in the boxes are unknown variables)

• Intuitively;: “I know one of the solutions which satisfy the equations for all simultaneously”

21=( , )CertificateAuthority

Page 22: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

How to Compose ThemSetup

• Setting-up Public Parameter Algorithm• Executed only once by a tentative central authority

• For example, by NIST

22

Page 23: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

How to Compose ThemAuthKG

• Authority-Key Generator• Executed by an authority with an index

23

Page 24: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

How to Compose ThemSKG

• Secret-Key Generator for a user w. global digital id• Executed by an authority with an index

to issue a private secret-key for the user

24

Page 25: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

How to Compose Them (& our Ideas)Prover• Prover Algorithm• Executed by a user with secret keys for

25

Page 26: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

How to Compose Them (& our Ideas)Verifier

• Verify Algorithm• Executed by authorities

26

Page 27: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

Security AnalysisCollusion Attacks?

27

• From knowledge-soundness and• Binding Property of Commitment to

Page 28: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

Security AnalysisAnonymity?

28

• From hiding property & WI under the mode

Page 29: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

Conclusion

We proposed; • DMA-A-AUTH

• Decentralized Multi-authorityAnonymous Authentication Scheme

Our contribution is; • Authorities only have to generate digital signatures on

global digital ID• Non-interactive• Capable of preventing collusion attacks

29

?

? ?

=( , )CertificateAuthority

Page 30: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

Thank you for your attention

Hiroaki Anada30

?

? ?

=( , )CertificateAuthority

Page 31: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

Security AnalysisCollusion Attacks?

31

• Experiment captures;• Concurrent provers invoked by an adversarial A• Secret-Key Oracle (i.e. Collusion)

Page 32: v o ] Ì D µ o ] r µ Z } ] Ç v } v Ç u } µ µ Z v ] ] } v ...sun.ac.jp/prof/anada/ni-dma-aauth(bits19)a.pdf · Title: Microsoft PowerPoint - ni-dma-aauth(bits19)a.pptx Author:

Security AnalysisAnonymity?

32

• Experiment captures;• Indistinguishability between two secret keys Indistinguishability between two identifiers