SlideShare a Scribd company logo
1 of 17
Download to read offline
TrustBus 2008
                                                                   Turin, Italy
                                                           5. September 2008




On the Design Dilemma in Dining
Cryptographer Networks
                   Institute for IT-Security and Security Law
  Jens Oberender
                   Computer Networks & Communications Group
Hermann de Meer
                   University of Passau
                   Germany

                   partly supported by
                   EuroNGI Design and Engineering of the Next Generation Internet (IST-028022)
                   EuroNF Anticipating the Network of the Future (IST-216366)
Motivation


    Connection-level anonymity


      Establish communication privacy

      Hides relationship between initiator and receiver of a message

      Being undistinguishable within the anonymity set

    Anonymity evolves in a non-cooperative game


      Strategies := cooperate | defect

      Node strategies -> anonymity set -> anonymity grade

      Nash equilibria indicate best strategy




    Does rational behavior have impact on the anonymity?


    How can rationality protect reachability?



                    On the Design Dilemma in DC-nets                2
Overview


Does rational behavior have impact on the anonymity?
 1) Modeling rational behavior

 2) Taxonomy of anonymity techniques

 3) Accessible information in Dining Cryptographer (DC) networks




How can rationality protect availability?
 4) Parameterizing games during design




                   On the Design Dilemma in DC-nets                 3
Rational acting in Anonymity
    Networks

    1. What benefit is received ?                     2. What cost is involved in
                                                

                                                      participation?
      Sender anonymity

                                                        Effective Throughput
      Anonymity set

        enhances                                        Increase of message delay

        grade of anonymity                              Increase of traffic




                                                                     on purpose to
                                                                     counter traffic
Challenges for design of anonymity systems                           analysis
    Impact of strategic behavior on anonymity


    Novel attacks targeting economy of anonymity





                        On the Design Dilemma in DC-nets                             4
Requirements of strategic behavior in
anonymity networks

    Enable senders to determine anonymity


      1) Rely on trustworthy entities

             No abuse of collected system-wide entropy
         

             Trust into computing anonymity grade
         

        2) Neighborhood–based approaches (first-hand experience)
    

             Limited credibility – eclipse attack
         

    Anonymity grade in near future


      1) Based on prediction

      2) Policy enforced




                        On the Design Dilemma in DC-nets           5
Determine anonymity grade


       Strategic users consider anonymity of a message in advance
   

       Decentralization: limited system view
   



                         Predicted                                  Depdendable
  Without
             Perceived anonymity                             Assured anonymity
     Pre-
             • broadcast responses in a DC-net               • queue state in a mixer node
requisites


    Relies   Reported anonymity                              Policy-enforced anonymity
             • reported number of participants               • mixer policy in high-latency
        on
     Trust     e.g. AN.ON                                      mixers, no forwarding,
                                                               before anonymity guaranteed



                          On the Design Dilemma in DC-nets                               6
Dining Cryptographer (DC) networks


    Round-based


        Sender broadcasts
    

        message or empty packet
        Disruption: message collisions
    

        require retransmission
        Security objective: reachability
    




    Coding schemes


        Cost in bandwidth, computation effort
    

        Robustness against collisions
    

        Countermeasure to disrupters
    




                       On the Design Dilemma in DC-nets   7
Apply game theory to Dining                                                Efficient / Robust design
                                                               Designer

Cryptographer (DC) networks                                     User        Participate / Leave


                                                               Adversary     Conforming / Disrupt
    Design dilemma: efficient or robust


Non-cooperative game                            Sequential game
 Complete Information                           Incomplete information

        Payoff functions public                           Adversaries strategy unknown
                                                    


    Imperfect information                           Perfect information
                                               

        Concurrency                                       Time order
                                                    



    Random disruptions


      Disrupter identification removes attacker from network

    Disrupt without being identified as disrupter


      Rational behavior, possible to formulate as utility function



                       On the Design Dilemma in DC-nets                                      8
Resolving dilemma games

    Iterated Prisoner’s Dilemma (IPD) -> Mixed strategy solution





    Nash Equilibria in iterated games

                                                                         1
        Probability distributions
    
                                            0.8




                                                   Disrupt probability
                                                                                 Non-cooperative
      Different strategies
                                            0.6
    p>80% disrupting

                                            0.4
    in non-cooperative game
                                            0.2
    Ability to identify disrupters (>18%)
                                                                                            Sequential
                                              0
    prevents misbehavior in sequential game
                                                                             0   0.2   0.4    0.6    0.8      1
                         Ability to identify disrupter
                     User’s preference for anonymity

                    On the Design Dilemma in DC-nets                                                      9
Conclusions


    Modeling of strategic behavior


      Grade of anonymity relies on behavior of all participants

      For design of anonymity systems

      Risk-prevention of malicious participants

    Dilemma games


      Influence rational players through system parameters

      Incomplete knowledge restrict the designer’s payoff,

        but parameters hinder malicious collisions
      User perspective on future anonymity:

        more research ongoing


                     On the Design Dilemma in DC-nets              10
DC Coding Schemes


    Bitwise XOR [Chaum88]


      Not robust against collisions

      Low computation overhead

    Bilinear Maps [Golle04]


      Robust against collisions

      Medium computation overhead

    Identification of Disrupters [Bos89]


      Robust against collisions

      High computation overhead

      Identifies a disrupter




                     On the Design Dilemma in DC-nets   11
Dining Cryptographers network

    Figure out, whether the meal has been paid


    by either one at the table








    Protocol provides sender anonymity

Communication Anonymity

    Anonymity := do not disclose communication relationship


    between sender and recipient
        Technically: being indistinguishable within the anonymity set,
    

        i.e. all current communication participants
        Level of anonymity scales with size of anonymity set
    

        If a user leaves system  degrades anonymity
    

        Especially in small systems
    DC net


        Coding superimposes messages
    

        Simultaneous slot occupation
    

         communication is disrupted
        Effort to receive/decode broadcasts
    




                      On the Design Dilemma in DC-nets                   13
Game Theory and Dilemmas


    Models strategic behavior, e.g. in cooperative systems


    Game defines players, strategy sets, and utility


      Outcome defined by strategies of all users

      Pay off: effective utility depending on the outcome of the game

    Strategic behavior


      Rationally acting, i.e. maximize payoff

      Predict strategy of other players (Non-cooperative game)

      Minimize own losses (Sequential game, incomplete knowledge)




    Dilemma: strategic behavior


    does not increase payoff for any of the players

                       On the Design Dilemma in DC-nets                  14
Stake holders of a DC-net
                                                             Send M1
    Dining Cryptographers network





                                                             Broadcast

                                                   Send M2               Send M3
    Communicating subjects (=users)


      Anonymous communication with reasonable cost

    Adversary


      Disrupt anonymous communications (increase user costs),

       but remain unidentified
    DC-net designer


      Facilitate high level of anonymity

      Decreasing participation  degrades anonymity (for small sizes)




                      On the Design Dilemma in DC-nets                    15
1) Robust design
    against malicious attacks

    Design parameters


     α    0 none – collision robustness

           1 full




                                                   Designer Strategy s 1
                                                                            1
     β    0 no –disrupter identification
                                                                           0.8
           1 possible
                                                                           0.6                     Sequential
    User (single instance)

                                                                           0.4                     Non-Coop.
     γ    0 low – anonymity preference                                                             =0
                                                                           0.2
           1 high                                                                                   >0
                                                                            0
                                                                                 0   0.2   0.4   0.6   0.8   1

    Compute Nash equilibria , i.e. best strategy for specified parameters


      Probability for efficient (0) or robust (1) algorithm




                        On the Design Dilemma in DC-nets                                                16
References


    Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, undetectability,


    unobservability, pseudonymity, and identity management - a consolidated
    proposal for terminology. (2008) Draft
    Dingledine, R., Mathewson, N.: Anonymity loves company: Usability and


    the network effect. In: Workshop on the Economics of Information
    Security. (2006)
    Acquisti, A., Dingledine, R., Syverson, P.: On the economics of anonymity.


    In Financial Cryptography. Number 2742 in LNCS, Springer (2003)
    Golle, P., Juels, A.: Dining cryptographers revisited. In: EUROCRYPT.


    Volume 3027 of LNCS, Springer (2004) 456-473
    Bos, J.N., den Boer, B.: Detection of Disrupters in the DC Protocol. In:


    Workshop on the theory and application of cryptographic techniques on
    Advances in cryptology. (1989) 320-327

                      On the Design Dilemma in DC-nets                     17

More Related Content

Similar to On the Design Dilemma in Dining Cryptographer Networks

Raise of deep learning
Raise of deep learningRaise of deep learning
Raise of deep learningBill GU
 
Scrambling For Video Surveillance
Scrambling For Video SurveillanceScrambling For Video Surveillance
Scrambling For Video SurveillanceKobi Magnezi
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsJohn Rhoton
 
HighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentationHighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentationHighCloud Security
 
Performance Attacks on Intrusion Detection Systems
Performance Attacks on Intrusion Detection SystemsPerformance Attacks on Intrusion Detection Systems
Performance Attacks on Intrusion Detection SystemsDavide Eynard
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperJPINFOTECH JAYAPRAKASH
 
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionUlf Mattsson
 
PhD Thesis Diogo Mónica
PhD Thesis Diogo MónicaPhD Thesis Diogo Mónica
PhD Thesis Diogo MónicaDiogo Mónica
 
If You Don't Like the Game, Hack the Playbook... (Zatko)
If You Don't Like the Game, Hack the Playbook... (Zatko)If You Don't Like the Game, Hack the Playbook... (Zatko)
If You Don't Like the Game, Hack the Playbook... (Zatko)Michael Scovetta
 
Sql injection to enterprise Owned - K.K. Mookhey
Sql injection to enterprise Owned  - K.K. Mookhey Sql injection to enterprise Owned  - K.K. Mookhey
Sql injection to enterprise Owned - K.K. Mookhey OWASP-Qatar Chapter
 
Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...LogicMindtech Nologies
 
Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...LogicMindtech Nologies
 
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜Seungmin Shin
 
PCI DSS Conference in London UK 2011
PCI DSS Conference in London UK 2011PCI DSS Conference in London UK 2011
PCI DSS Conference in London UK 2011Ulf Mattsson
 
Networked Dynamic Systems: Identification, Controllability, and Randomness
Networked Dynamic Systems: Identification, Controllability, and RandomnessNetworked Dynamic Systems: Identification, Controllability, and Randomness
Networked Dynamic Systems: Identification, Controllability, and RandomnessMarzieh Nabi
 
Network automation seminar
Network automation seminarNetwork automation seminar
Network automation seminarpatmisasi
 
Introduction to web security @ confess 2012
Introduction to web security @ confess 2012Introduction to web security @ confess 2012
Introduction to web security @ confess 2012jakobkorherr
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataArmor
 
DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough? Zscaler
 

Similar to On the Design Dilemma in Dining Cryptographer Networks (20)

Raise of deep learning
Raise of deep learningRaise of deep learning
Raise of deep learning
 
Scrambling For Video Surveillance
Scrambling For Video SurveillanceScrambling For Video Surveillance
Scrambling For Video Surveillance
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network Connections
 
HighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentationHighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentation
 
Performance Attacks on Intrusion Detection Systems
Performance Attacks on Intrusion Detection SystemsPerformance Attacks on Intrusion Detection Systems
Performance Attacks on Intrusion Detection Systems
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
PhD Thesis Diogo Mónica
PhD Thesis Diogo MónicaPhD Thesis Diogo Mónica
PhD Thesis Diogo Mónica
 
If You Don't Like the Game, Hack the Playbook... (Zatko)
If You Don't Like the Game, Hack the Playbook... (Zatko)If You Don't Like the Game, Hack the Playbook... (Zatko)
If You Don't Like the Game, Hack the Playbook... (Zatko)
 
Sql injection to enterprise Owned - K.K. Mookhey
Sql injection to enterprise Owned  - K.K. Mookhey Sql injection to enterprise Owned  - K.K. Mookhey
Sql injection to enterprise Owned - K.K. Mookhey
 
Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...
 
Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...
 
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
 
PCI DSS Conference in London UK 2011
PCI DSS Conference in London UK 2011PCI DSS Conference in London UK 2011
PCI DSS Conference in London UK 2011
 
Networked Dynamic Systems: Identification, Controllability, and Randomness
Networked Dynamic Systems: Identification, Controllability, and RandomnessNetworked Dynamic Systems: Identification, Controllability, and Randomness
Networked Dynamic Systems: Identification, Controllability, and Randomness
 
Network automation seminar
Network automation seminarNetwork automation seminar
Network automation seminar
 
Introduction to web security @ confess 2012
Introduction to web security @ confess 2012Introduction to web security @ confess 2012
Introduction to web security @ confess 2012
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your Data
 
DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough?
 

More from Jens Oberender

Konsumterror #BCBN20 Barcamp Sessopn
Konsumterror #BCBN20 Barcamp SessopnKonsumterror #BCBN20 Barcamp Sessopn
Konsumterror #BCBN20 Barcamp SessopnJens Oberender
 
Erfahrungsbericht als Area Governor bei Toastmasters International
Erfahrungsbericht als Area Governor bei Toastmasters InternationalErfahrungsbericht als Area Governor bei Toastmasters International
Erfahrungsbericht als Area Governor bei Toastmasters InternationalJens Oberender
 
Smartphone Applications - Common Criteria is going Mobile
Smartphone Applications - Common Criteria is going MobileSmartphone Applications - Common Criteria is going Mobile
Smartphone Applications - Common Criteria is going MobileJens Oberender
 
Pitch Your Project and Vision – Zielgerichtete Kommunikation
Pitch Your Project and Vision – Zielgerichtete KommunikationPitch Your Project and Vision – Zielgerichtete Kommunikation
Pitch Your Project and Vision – Zielgerichtete KommunikationJens Oberender
 
Konzeptbotschafter: The Elevator Pitch
Konzeptbotschafter: The Elevator PitchKonzeptbotschafter: The Elevator Pitch
Konzeptbotschafter: The Elevator PitchJens Oberender
 
Schlipsträger werden - Sinnsuche zum Berufseinstieg
Schlipsträger werden - Sinnsuche zum BerufseinstiegSchlipsträger werden - Sinnsuche zum Berufseinstieg
Schlipsträger werden - Sinnsuche zum BerufseinstiegJens Oberender
 
Überblick Common Criteria
Überblick Common CriteriaÜberblick Common Criteria
Überblick Common CriteriaJens Oberender
 
Grundlagen kooperativer Anonymisierungsnetze
Grundlagen kooperativer AnonymisierungsnetzeGrundlagen kooperativer Anonymisierungsnetze
Grundlagen kooperativer AnonymisierungsnetzeJens Oberender
 
Widerstandsfähigkeit von Anonymisierungsnetzen
Widerstandsfähigkeit von AnonymisierungsnetzenWiderstandsfähigkeit von Anonymisierungsnetzen
Widerstandsfähigkeit von AnonymisierungsnetzenJens Oberender
 
Algorithm for Multi-Path Hop-By-Hop Routing
Algorithm for Multi-Path Hop-By-Hop RoutingAlgorithm for Multi-Path Hop-By-Hop Routing
Algorithm for Multi-Path Hop-By-Hop RoutingJens Oberender
 
Getting Things Done (GfA Präsentation)
Getting Things Done (GfA Präsentation)Getting Things Done (GfA Präsentation)
Getting Things Done (GfA Präsentation)Jens Oberender
 
Riding the Flow - Wissenarbeit nach der Getting Things Done Methode
Riding the Flow - Wissenarbeit nach der Getting Things Done MethodeRiding the Flow - Wissenarbeit nach der Getting Things Done Methode
Riding the Flow - Wissenarbeit nach der Getting Things Done MethodeJens Oberender
 
Grundlagen Kooperativer Anonymität
Grundlagen Kooperativer AnonymitätGrundlagen Kooperativer Anonymität
Grundlagen Kooperativer AnonymitätJens Oberender
 
Widerstandsfähigkeit von Anonymisierungsnetzen
Widerstandsfähigkeit von AnonymisierungsnetzenWiderstandsfähigkeit von Anonymisierungsnetzen
Widerstandsfähigkeit von AnonymisierungsnetzenJens Oberender
 
Verlustbehaftete Komprimierung
Verlustbehaftete KomprimierungVerlustbehaftete Komprimierung
Verlustbehaftete KomprimierungJens Oberender
 
Denial Of Service Flooding Detection In Anonymity Networks
Denial Of Service Flooding Detection In Anonymity NetworksDenial Of Service Flooding Detection In Anonymity Networks
Denial Of Service Flooding Detection In Anonymity NetworksJens Oberender
 

More from Jens Oberender (17)

Konsumterror #BCBN20 Barcamp Sessopn
Konsumterror #BCBN20 Barcamp SessopnKonsumterror #BCBN20 Barcamp Sessopn
Konsumterror #BCBN20 Barcamp Sessopn
 
Erfahrungsbericht als Area Governor bei Toastmasters International
Erfahrungsbericht als Area Governor bei Toastmasters InternationalErfahrungsbericht als Area Governor bei Toastmasters International
Erfahrungsbericht als Area Governor bei Toastmasters International
 
Smartphone Applications - Common Criteria is going Mobile
Smartphone Applications - Common Criteria is going MobileSmartphone Applications - Common Criteria is going Mobile
Smartphone Applications - Common Criteria is going Mobile
 
Pitch Your Project and Vision – Zielgerichtete Kommunikation
Pitch Your Project and Vision – Zielgerichtete KommunikationPitch Your Project and Vision – Zielgerichtete Kommunikation
Pitch Your Project and Vision – Zielgerichtete Kommunikation
 
Konzeptbotschafter: The Elevator Pitch
Konzeptbotschafter: The Elevator PitchKonzeptbotschafter: The Elevator Pitch
Konzeptbotschafter: The Elevator Pitch
 
Schlipsträger werden - Sinnsuche zum Berufseinstieg
Schlipsträger werden - Sinnsuche zum BerufseinstiegSchlipsträger werden - Sinnsuche zum Berufseinstieg
Schlipsträger werden - Sinnsuche zum Berufseinstieg
 
Überblick Common Criteria
Überblick Common CriteriaÜberblick Common Criteria
Überblick Common Criteria
 
Grundlagen kooperativer Anonymisierungsnetze
Grundlagen kooperativer AnonymisierungsnetzeGrundlagen kooperativer Anonymisierungsnetze
Grundlagen kooperativer Anonymisierungsnetze
 
Widerstandsfähigkeit von Anonymisierungsnetzen
Widerstandsfähigkeit von AnonymisierungsnetzenWiderstandsfähigkeit von Anonymisierungsnetzen
Widerstandsfähigkeit von Anonymisierungsnetzen
 
Algorithm for Multi-Path Hop-By-Hop Routing
Algorithm for Multi-Path Hop-By-Hop RoutingAlgorithm for Multi-Path Hop-By-Hop Routing
Algorithm for Multi-Path Hop-By-Hop Routing
 
Getting Things Done (GfA Präsentation)
Getting Things Done (GfA Präsentation)Getting Things Done (GfA Präsentation)
Getting Things Done (GfA Präsentation)
 
Riding the Flow - Wissenarbeit nach der Getting Things Done Methode
Riding the Flow - Wissenarbeit nach der Getting Things Done MethodeRiding the Flow - Wissenarbeit nach der Getting Things Done Methode
Riding the Flow - Wissenarbeit nach der Getting Things Done Methode
 
Grundlagen Kooperativer Anonymität
Grundlagen Kooperativer AnonymitätGrundlagen Kooperativer Anonymität
Grundlagen Kooperativer Anonymität
 
Widerstandsfähigkeit von Anonymisierungsnetzen
Widerstandsfähigkeit von AnonymisierungsnetzenWiderstandsfähigkeit von Anonymisierungsnetzen
Widerstandsfähigkeit von Anonymisierungsnetzen
 
Verlustbehaftete Komprimierung
Verlustbehaftete KomprimierungVerlustbehaftete Komprimierung
Verlustbehaftete Komprimierung
 
Peer-to-Peer Security
Peer-to-Peer SecurityPeer-to-Peer Security
Peer-to-Peer Security
 
Denial Of Service Flooding Detection In Anonymity Networks
Denial Of Service Flooding Detection In Anonymity NetworksDenial Of Service Flooding Detection In Anonymity Networks
Denial Of Service Flooding Detection In Anonymity Networks
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

On the Design Dilemma in Dining Cryptographer Networks

  • 1. TrustBus 2008 Turin, Italy 5. September 2008 On the Design Dilemma in Dining Cryptographer Networks Institute for IT-Security and Security Law Jens Oberender Computer Networks & Communications Group Hermann de Meer University of Passau Germany partly supported by EuroNGI Design and Engineering of the Next Generation Internet (IST-028022) EuroNF Anticipating the Network of the Future (IST-216366)
  • 2. Motivation Connection-level anonymity   Establish communication privacy  Hides relationship between initiator and receiver of a message  Being undistinguishable within the anonymity set Anonymity evolves in a non-cooperative game   Strategies := cooperate | defect  Node strategies -> anonymity set -> anonymity grade  Nash equilibria indicate best strategy Does rational behavior have impact on the anonymity?  How can rationality protect reachability?  On the Design Dilemma in DC-nets 2
  • 3. Overview Does rational behavior have impact on the anonymity?  1) Modeling rational behavior  2) Taxonomy of anonymity techniques  3) Accessible information in Dining Cryptographer (DC) networks How can rationality protect availability?  4) Parameterizing games during design On the Design Dilemma in DC-nets 3
  • 4. Rational acting in Anonymity Networks 1. What benefit is received ? 2. What cost is involved in   participation?  Sender anonymity  Effective Throughput  Anonymity set enhances  Increase of message delay grade of anonymity  Increase of traffic on purpose to counter traffic Challenges for design of anonymity systems analysis Impact of strategic behavior on anonymity  Novel attacks targeting economy of anonymity  On the Design Dilemma in DC-nets 4
  • 5. Requirements of strategic behavior in anonymity networks Enable senders to determine anonymity   1) Rely on trustworthy entities No abuse of collected system-wide entropy  Trust into computing anonymity grade  2) Neighborhood–based approaches (first-hand experience)  Limited credibility – eclipse attack  Anonymity grade in near future   1) Based on prediction  2) Policy enforced On the Design Dilemma in DC-nets 5
  • 6. Determine anonymity grade Strategic users consider anonymity of a message in advance  Decentralization: limited system view  Predicted Depdendable Without Perceived anonymity Assured anonymity Pre- • broadcast responses in a DC-net • queue state in a mixer node requisites Relies Reported anonymity Policy-enforced anonymity • reported number of participants • mixer policy in high-latency on Trust e.g. AN.ON mixers, no forwarding, before anonymity guaranteed On the Design Dilemma in DC-nets 6
  • 7. Dining Cryptographer (DC) networks Round-based  Sender broadcasts  message or empty packet Disruption: message collisions  require retransmission Security objective: reachability  Coding schemes  Cost in bandwidth, computation effort  Robustness against collisions  Countermeasure to disrupters  On the Design Dilemma in DC-nets 7
  • 8. Apply game theory to Dining Efficient / Robust design Designer Cryptographer (DC) networks User Participate / Leave Adversary Conforming / Disrupt Design dilemma: efficient or robust  Non-cooperative game Sequential game  Complete Information  Incomplete information Payoff functions public Adversaries strategy unknown   Imperfect information Perfect information   Concurrency Time order   Random disruptions   Disrupter identification removes attacker from network Disrupt without being identified as disrupter   Rational behavior, possible to formulate as utility function On the Design Dilemma in DC-nets 8
  • 9. Resolving dilemma games Iterated Prisoner’s Dilemma (IPD) -> Mixed strategy solution  Nash Equilibria in iterated games  1 Probability distributions  0.8 Disrupt probability Non-cooperative  Different strategies 0.6 p>80% disrupting  0.4 in non-cooperative game 0.2 Ability to identify disrupters (>18%)  Sequential 0 prevents misbehavior in sequential game 0 0.2 0.4 0.6 0.8 1 Ability to identify disrupter User’s preference for anonymity On the Design Dilemma in DC-nets 9
  • 10. Conclusions Modeling of strategic behavior   Grade of anonymity relies on behavior of all participants  For design of anonymity systems  Risk-prevention of malicious participants Dilemma games   Influence rational players through system parameters  Incomplete knowledge restrict the designer’s payoff, but parameters hinder malicious collisions  User perspective on future anonymity: more research ongoing On the Design Dilemma in DC-nets 10
  • 11. DC Coding Schemes Bitwise XOR [Chaum88]   Not robust against collisions  Low computation overhead Bilinear Maps [Golle04]   Robust against collisions  Medium computation overhead Identification of Disrupters [Bos89]   Robust against collisions  High computation overhead  Identifies a disrupter On the Design Dilemma in DC-nets 11
  • 12. Dining Cryptographers network Figure out, whether the meal has been paid  by either one at the table  Protocol provides sender anonymity 
  • 13. Communication Anonymity Anonymity := do not disclose communication relationship  between sender and recipient Technically: being indistinguishable within the anonymity set,  i.e. all current communication participants Level of anonymity scales with size of anonymity set  If a user leaves system  degrades anonymity  Especially in small systems DC net  Coding superimposes messages  Simultaneous slot occupation   communication is disrupted Effort to receive/decode broadcasts  On the Design Dilemma in DC-nets 13
  • 14. Game Theory and Dilemmas Models strategic behavior, e.g. in cooperative systems  Game defines players, strategy sets, and utility   Outcome defined by strategies of all users  Pay off: effective utility depending on the outcome of the game Strategic behavior   Rationally acting, i.e. maximize payoff  Predict strategy of other players (Non-cooperative game)  Minimize own losses (Sequential game, incomplete knowledge) Dilemma: strategic behavior  does not increase payoff for any of the players On the Design Dilemma in DC-nets 14
  • 15. Stake holders of a DC-net Send M1 Dining Cryptographers network  Broadcast Send M2 Send M3 Communicating subjects (=users)   Anonymous communication with reasonable cost Adversary   Disrupt anonymous communications (increase user costs), but remain unidentified DC-net designer   Facilitate high level of anonymity  Decreasing participation  degrades anonymity (for small sizes) On the Design Dilemma in DC-nets 15
  • 16. 1) Robust design against malicious attacks Design parameters  α 0 none – collision robustness 1 full Designer Strategy s 1 1 β 0 no –disrupter identification 0.8 1 possible 0.6 Sequential User (single instance)  0.4 Non-Coop. γ 0 low – anonymity preference =0 0.2 1 high >0 0 0 0.2 0.4 0.6 0.8 1 Compute Nash equilibria , i.e. best strategy for specified parameters   Probability for efficient (0) or robust (1) algorithm On the Design Dilemma in DC-nets 16
  • 17. References Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, undetectability,  unobservability, pseudonymity, and identity management - a consolidated proposal for terminology. (2008) Draft Dingledine, R., Mathewson, N.: Anonymity loves company: Usability and  the network effect. In: Workshop on the Economics of Information Security. (2006) Acquisti, A., Dingledine, R., Syverson, P.: On the economics of anonymity.  In Financial Cryptography. Number 2742 in LNCS, Springer (2003) Golle, P., Juels, A.: Dining cryptographers revisited. In: EUROCRYPT.  Volume 3027 of LNCS, Springer (2004) 456-473 Bos, J.N., den Boer, B.: Detection of Disrupters in the DC Protocol. In:  Workshop on the theory and application of cryptographic techniques on Advances in cryptology. (1989) 320-327 On the Design Dilemma in DC-nets 17