SlideShare a Scribd company logo
TrustBus 2008
                                                                   Turin, Italy
                                                           5. September 2008




On the Design Dilemma in Dining
Cryptographer Networks
                   Institute for IT-Security and Security Law
  Jens Oberender
                   Computer Networks & Communications Group
Hermann de Meer
                   University of Passau
                   Germany

                   partly supported by
                   EuroNGI Design and Engineering of the Next Generation Internet (IST-028022)
                   EuroNF Anticipating the Network of the Future (IST-216366)
Motivation


    Connection-level anonymity


      Establish communication privacy

      Hides relationship between initiator and receiver of a message

      Being undistinguishable within the anonymity set

    Anonymity evolves in a non-cooperative game


      Strategies := cooperate | defect

      Node strategies -> anonymity set -> anonymity grade

      Nash equilibria indicate best strategy




    Does rational behavior have impact on the anonymity?


    How can rationality protect reachability?



                    On the Design Dilemma in DC-nets                2
Overview


Does rational behavior have impact on the anonymity?
 1) Modeling rational behavior

 2) Taxonomy of anonymity techniques

 3) Accessible information in Dining Cryptographer (DC) networks




How can rationality protect availability?
 4) Parameterizing games during design




                   On the Design Dilemma in DC-nets                 3
Rational acting in Anonymity
    Networks

    1. What benefit is received ?                     2. What cost is involved in
                                                

                                                      participation?
      Sender anonymity

                                                        Effective Throughput
      Anonymity set

        enhances                                        Increase of message delay

        grade of anonymity                              Increase of traffic




                                                                     on purpose to
                                                                     counter traffic
Challenges for design of anonymity systems                           analysis
    Impact of strategic behavior on anonymity


    Novel attacks targeting economy of anonymity





                        On the Design Dilemma in DC-nets                             4
Requirements of strategic behavior in
anonymity networks

    Enable senders to determine anonymity


      1) Rely on trustworthy entities

             No abuse of collected system-wide entropy
         

             Trust into computing anonymity grade
         

        2) Neighborhood–based approaches (first-hand experience)
    

             Limited credibility – eclipse attack
         

    Anonymity grade in near future


      1) Based on prediction

      2) Policy enforced




                        On the Design Dilemma in DC-nets           5
Determine anonymity grade


       Strategic users consider anonymity of a message in advance
   

       Decentralization: limited system view
   



                         Predicted                                  Depdendable
  Without
             Perceived anonymity                             Assured anonymity
     Pre-
             • broadcast responses in a DC-net               • queue state in a mixer node
requisites


    Relies   Reported anonymity                              Policy-enforced anonymity
             • reported number of participants               • mixer policy in high-latency
        on
     Trust     e.g. AN.ON                                      mixers, no forwarding,
                                                               before anonymity guaranteed



                          On the Design Dilemma in DC-nets                               6
Dining Cryptographer (DC) networks


    Round-based


        Sender broadcasts
    

        message or empty packet
        Disruption: message collisions
    

        require retransmission
        Security objective: reachability
    




    Coding schemes


        Cost in bandwidth, computation effort
    

        Robustness against collisions
    

        Countermeasure to disrupters
    




                       On the Design Dilemma in DC-nets   7
Apply game theory to Dining                                                Efficient / Robust design
                                                               Designer

Cryptographer (DC) networks                                     User        Participate / Leave


                                                               Adversary     Conforming / Disrupt
    Design dilemma: efficient or robust


Non-cooperative game                            Sequential game
 Complete Information                           Incomplete information

        Payoff functions public                           Adversaries strategy unknown
                                                    


    Imperfect information                           Perfect information
                                               

        Concurrency                                       Time order
                                                    



    Random disruptions


      Disrupter identification removes attacker from network

    Disrupt without being identified as disrupter


      Rational behavior, possible to formulate as utility function



                       On the Design Dilemma in DC-nets                                      8
Resolving dilemma games

    Iterated Prisoner’s Dilemma (IPD) -> Mixed strategy solution





    Nash Equilibria in iterated games

                                                                         1
        Probability distributions
    
                                            0.8




                                                   Disrupt probability
                                                                                 Non-cooperative
      Different strategies
                                            0.6
    p>80% disrupting

                                            0.4
    in non-cooperative game
                                            0.2
    Ability to identify disrupters (>18%)
                                                                                            Sequential
                                              0
    prevents misbehavior in sequential game
                                                                             0   0.2   0.4    0.6    0.8      1
                         Ability to identify disrupter
                     User’s preference for anonymity

                    On the Design Dilemma in DC-nets                                                      9
Conclusions


    Modeling of strategic behavior


      Grade of anonymity relies on behavior of all participants

      For design of anonymity systems

      Risk-prevention of malicious participants

    Dilemma games


      Influence rational players through system parameters

      Incomplete knowledge restrict the designer’s payoff,

        but parameters hinder malicious collisions
      User perspective on future anonymity:

        more research ongoing


                     On the Design Dilemma in DC-nets              10
DC Coding Schemes


    Bitwise XOR [Chaum88]


      Not robust against collisions

      Low computation overhead

    Bilinear Maps [Golle04]


      Robust against collisions

      Medium computation overhead

    Identification of Disrupters [Bos89]


      Robust against collisions

      High computation overhead

      Identifies a disrupter




                     On the Design Dilemma in DC-nets   11
Dining Cryptographers network

    Figure out, whether the meal has been paid


    by either one at the table








    Protocol provides sender anonymity

Communication Anonymity

    Anonymity := do not disclose communication relationship


    between sender and recipient
        Technically: being indistinguishable within the anonymity set,
    

        i.e. all current communication participants
        Level of anonymity scales with size of anonymity set
    

        If a user leaves system  degrades anonymity
    

        Especially in small systems
    DC net


        Coding superimposes messages
    

        Simultaneous slot occupation
    

         communication is disrupted
        Effort to receive/decode broadcasts
    




                      On the Design Dilemma in DC-nets                   13
Game Theory and Dilemmas


    Models strategic behavior, e.g. in cooperative systems


    Game defines players, strategy sets, and utility


      Outcome defined by strategies of all users

      Pay off: effective utility depending on the outcome of the game

    Strategic behavior


      Rationally acting, i.e. maximize payoff

      Predict strategy of other players (Non-cooperative game)

      Minimize own losses (Sequential game, incomplete knowledge)




    Dilemma: strategic behavior


    does not increase payoff for any of the players

                       On the Design Dilemma in DC-nets                  14
Stake holders of a DC-net
                                                             Send M1
    Dining Cryptographers network





                                                             Broadcast

                                                   Send M2               Send M3
    Communicating subjects (=users)


      Anonymous communication with reasonable cost

    Adversary


      Disrupt anonymous communications (increase user costs),

       but remain unidentified
    DC-net designer


      Facilitate high level of anonymity

      Decreasing participation  degrades anonymity (for small sizes)




                      On the Design Dilemma in DC-nets                    15
1) Robust design
    against malicious attacks

    Design parameters


     α    0 none – collision robustness

           1 full




                                                   Designer Strategy s 1
                                                                            1
     β    0 no –disrupter identification
                                                                           0.8
           1 possible
                                                                           0.6                     Sequential
    User (single instance)

                                                                           0.4                     Non-Coop.
     γ    0 low – anonymity preference                                                             =0
                                                                           0.2
           1 high                                                                                   >0
                                                                            0
                                                                                 0   0.2   0.4   0.6   0.8   1

    Compute Nash equilibria , i.e. best strategy for specified parameters


      Probability for efficient (0) or robust (1) algorithm




                        On the Design Dilemma in DC-nets                                                16
References


    Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, undetectability,


    unobservability, pseudonymity, and identity management - a consolidated
    proposal for terminology. (2008) Draft
    Dingledine, R., Mathewson, N.: Anonymity loves company: Usability and


    the network effect. In: Workshop on the Economics of Information
    Security. (2006)
    Acquisti, A., Dingledine, R., Syverson, P.: On the economics of anonymity.


    In Financial Cryptography. Number 2742 in LNCS, Springer (2003)
    Golle, P., Juels, A.: Dining cryptographers revisited. In: EUROCRYPT.


    Volume 3027 of LNCS, Springer (2004) 456-473
    Bos, J.N., den Boer, B.: Detection of Disrupters in the DC Protocol. In:


    Workshop on the theory and application of cryptographic techniques on
    Advances in cryptology. (1989) 320-327

                      On the Design Dilemma in DC-nets                     17

More Related Content

Similar to On the Design Dilemma in Dining Cryptographer Networks

Raise of deep learning
Raise of deep learningRaise of deep learning
Raise of deep learning
Bill GU
 
Scrambling For Video Surveillance
Scrambling For Video SurveillanceScrambling For Video Surveillance
Scrambling For Video SurveillanceKobi Magnezi
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network Connections
John Rhoton
 
HighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentationHighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security
 
Performance Attacks on Intrusion Detection Systems
Performance Attacks on Intrusion Detection SystemsPerformance Attacks on Intrusion Detection Systems
Performance Attacks on Intrusion Detection Systems
Davide Eynard
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
JPINFOTECH JAYAPRAKASH
 
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
Ulf Mattsson
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
Vitor Jesus
 
PhD Thesis Diogo Mónica
PhD Thesis Diogo MónicaPhD Thesis Diogo Mónica
PhD Thesis Diogo Mónica
Diogo Mónica
 
If You Don't Like the Game, Hack the Playbook... (Zatko)
If You Don't Like the Game, Hack the Playbook... (Zatko)If You Don't Like the Game, Hack the Playbook... (Zatko)
If You Don't Like the Game, Hack the Playbook... (Zatko)
Michael Scovetta
 
Sql injection to enterprise Owned - K.K. Mookhey
Sql injection to enterprise Owned  - K.K. Mookhey Sql injection to enterprise Owned  - K.K. Mookhey
Sql injection to enterprise Owned - K.K. Mookhey OWASP-Qatar Chapter
 
Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...
LogicMindtech Nologies
 
Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...
LogicMindtech Nologies
 
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
Seungmin Shin
 
PCI DSS Conference in London UK 2011
PCI DSS Conference in London UK 2011PCI DSS Conference in London UK 2011
PCI DSS Conference in London UK 2011Ulf Mattsson
 
Networked Dynamic Systems: Identification, Controllability, and Randomness
Networked Dynamic Systems: Identification, Controllability, and RandomnessNetworked Dynamic Systems: Identification, Controllability, and Randomness
Networked Dynamic Systems: Identification, Controllability, and Randomness
Marzieh Nabi
 
Network automation seminar
Network automation seminarNetwork automation seminar
Network automation seminarpatmisasi
 
Introduction to web security @ confess 2012
Introduction to web security @ confess 2012Introduction to web security @ confess 2012
Introduction to web security @ confess 2012
jakobkorherr
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your Data
Armor
 
DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough?
Zscaler
 

Similar to On the Design Dilemma in Dining Cryptographer Networks (20)

Raise of deep learning
Raise of deep learningRaise of deep learning
Raise of deep learning
 
Scrambling For Video Surveillance
Scrambling For Video SurveillanceScrambling For Video Surveillance
Scrambling For Video Surveillance
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network Connections
 
HighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentationHighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentation
 
Performance Attacks on Intrusion Detection Systems
Performance Attacks on Intrusion Detection SystemsPerformance Attacks on Intrusion Detection Systems
Performance Attacks on Intrusion Detection Systems
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
PhD Thesis Diogo Mónica
PhD Thesis Diogo MónicaPhD Thesis Diogo Mónica
PhD Thesis Diogo Mónica
 
If You Don't Like the Game, Hack the Playbook... (Zatko)
If You Don't Like the Game, Hack the Playbook... (Zatko)If You Don't Like the Game, Hack the Playbook... (Zatko)
If You Don't Like the Game, Hack the Playbook... (Zatko)
 
Sql injection to enterprise Owned - K.K. Mookhey
Sql injection to enterprise Owned  - K.K. Mookhey Sql injection to enterprise Owned  - K.K. Mookhey
Sql injection to enterprise Owned - K.K. Mookhey
 
Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...
 
Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...
 
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
 
PCI DSS Conference in London UK 2011
PCI DSS Conference in London UK 2011PCI DSS Conference in London UK 2011
PCI DSS Conference in London UK 2011
 
Networked Dynamic Systems: Identification, Controllability, and Randomness
Networked Dynamic Systems: Identification, Controllability, and RandomnessNetworked Dynamic Systems: Identification, Controllability, and Randomness
Networked Dynamic Systems: Identification, Controllability, and Randomness
 
Network automation seminar
Network automation seminarNetwork automation seminar
Network automation seminar
 
Introduction to web security @ confess 2012
Introduction to web security @ confess 2012Introduction to web security @ confess 2012
Introduction to web security @ confess 2012
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your Data
 
DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough?
 

More from Jens Oberender

Konsumterror #BCBN20 Barcamp Sessopn
Konsumterror #BCBN20 Barcamp SessopnKonsumterror #BCBN20 Barcamp Sessopn
Konsumterror #BCBN20 Barcamp Sessopn
Jens Oberender
 
Erfahrungsbericht als Area Governor bei Toastmasters International
Erfahrungsbericht als Area Governor bei Toastmasters InternationalErfahrungsbericht als Area Governor bei Toastmasters International
Erfahrungsbericht als Area Governor bei Toastmasters International
Jens Oberender
 
Smartphone Applications - Common Criteria is going Mobile
Smartphone Applications - Common Criteria is going MobileSmartphone Applications - Common Criteria is going Mobile
Smartphone Applications - Common Criteria is going Mobile
Jens Oberender
 
Pitch Your Project and Vision – Zielgerichtete Kommunikation
Pitch Your Project and Vision – Zielgerichtete KommunikationPitch Your Project and Vision – Zielgerichtete Kommunikation
Pitch Your Project and Vision – Zielgerichtete Kommunikation
Jens Oberender
 
Konzeptbotschafter: The Elevator Pitch
Konzeptbotschafter: The Elevator PitchKonzeptbotschafter: The Elevator Pitch
Konzeptbotschafter: The Elevator Pitch
Jens Oberender
 
Schlipsträger werden - Sinnsuche zum Berufseinstieg
Schlipsträger werden - Sinnsuche zum BerufseinstiegSchlipsträger werden - Sinnsuche zum Berufseinstieg
Schlipsträger werden - Sinnsuche zum Berufseinstieg
Jens Oberender
 
Überblick Common Criteria
Überblick Common CriteriaÜberblick Common Criteria
Überblick Common Criteria
Jens Oberender
 
Grundlagen kooperativer Anonymisierungsnetze
Grundlagen kooperativer AnonymisierungsnetzeGrundlagen kooperativer Anonymisierungsnetze
Grundlagen kooperativer AnonymisierungsnetzeJens Oberender
 
Widerstandsfähigkeit von Anonymisierungsnetzen
Widerstandsfähigkeit von AnonymisierungsnetzenWiderstandsfähigkeit von Anonymisierungsnetzen
Widerstandsfähigkeit von AnonymisierungsnetzenJens Oberender
 
Algorithm for Multi-Path Hop-By-Hop Routing
Algorithm for Multi-Path Hop-By-Hop RoutingAlgorithm for Multi-Path Hop-By-Hop Routing
Algorithm for Multi-Path Hop-By-Hop Routing
Jens Oberender
 
Getting Things Done (GfA Präsentation)
Getting Things Done (GfA Präsentation)Getting Things Done (GfA Präsentation)
Getting Things Done (GfA Präsentation)
Jens Oberender
 
Riding the Flow - Wissenarbeit nach der Getting Things Done Methode
Riding the Flow - Wissenarbeit nach der Getting Things Done MethodeRiding the Flow - Wissenarbeit nach der Getting Things Done Methode
Riding the Flow - Wissenarbeit nach der Getting Things Done Methode
Jens Oberender
 
Grundlagen Kooperativer Anonymität
Grundlagen Kooperativer AnonymitätGrundlagen Kooperativer Anonymität
Grundlagen Kooperativer AnonymitätJens Oberender
 
Widerstandsfähigkeit von Anonymisierungsnetzen
Widerstandsfähigkeit von AnonymisierungsnetzenWiderstandsfähigkeit von Anonymisierungsnetzen
Widerstandsfähigkeit von AnonymisierungsnetzenJens Oberender
 
Verlustbehaftete Komprimierung
Verlustbehaftete KomprimierungVerlustbehaftete Komprimierung
Verlustbehaftete KomprimierungJens Oberender
 
Peer-to-Peer Security
Peer-to-Peer SecurityPeer-to-Peer Security
Peer-to-Peer Security
Jens Oberender
 
Denial Of Service Flooding Detection In Anonymity Networks
Denial Of Service Flooding Detection In Anonymity NetworksDenial Of Service Flooding Detection In Anonymity Networks
Denial Of Service Flooding Detection In Anonymity Networks
Jens Oberender
 

More from Jens Oberender (17)

Konsumterror #BCBN20 Barcamp Sessopn
Konsumterror #BCBN20 Barcamp SessopnKonsumterror #BCBN20 Barcamp Sessopn
Konsumterror #BCBN20 Barcamp Sessopn
 
Erfahrungsbericht als Area Governor bei Toastmasters International
Erfahrungsbericht als Area Governor bei Toastmasters InternationalErfahrungsbericht als Area Governor bei Toastmasters International
Erfahrungsbericht als Area Governor bei Toastmasters International
 
Smartphone Applications - Common Criteria is going Mobile
Smartphone Applications - Common Criteria is going MobileSmartphone Applications - Common Criteria is going Mobile
Smartphone Applications - Common Criteria is going Mobile
 
Pitch Your Project and Vision – Zielgerichtete Kommunikation
Pitch Your Project and Vision – Zielgerichtete KommunikationPitch Your Project and Vision – Zielgerichtete Kommunikation
Pitch Your Project and Vision – Zielgerichtete Kommunikation
 
Konzeptbotschafter: The Elevator Pitch
Konzeptbotschafter: The Elevator PitchKonzeptbotschafter: The Elevator Pitch
Konzeptbotschafter: The Elevator Pitch
 
Schlipsträger werden - Sinnsuche zum Berufseinstieg
Schlipsträger werden - Sinnsuche zum BerufseinstiegSchlipsträger werden - Sinnsuche zum Berufseinstieg
Schlipsträger werden - Sinnsuche zum Berufseinstieg
 
Überblick Common Criteria
Überblick Common CriteriaÜberblick Common Criteria
Überblick Common Criteria
 
Grundlagen kooperativer Anonymisierungsnetze
Grundlagen kooperativer AnonymisierungsnetzeGrundlagen kooperativer Anonymisierungsnetze
Grundlagen kooperativer Anonymisierungsnetze
 
Widerstandsfähigkeit von Anonymisierungsnetzen
Widerstandsfähigkeit von AnonymisierungsnetzenWiderstandsfähigkeit von Anonymisierungsnetzen
Widerstandsfähigkeit von Anonymisierungsnetzen
 
Algorithm for Multi-Path Hop-By-Hop Routing
Algorithm for Multi-Path Hop-By-Hop RoutingAlgorithm for Multi-Path Hop-By-Hop Routing
Algorithm for Multi-Path Hop-By-Hop Routing
 
Getting Things Done (GfA Präsentation)
Getting Things Done (GfA Präsentation)Getting Things Done (GfA Präsentation)
Getting Things Done (GfA Präsentation)
 
Riding the Flow - Wissenarbeit nach der Getting Things Done Methode
Riding the Flow - Wissenarbeit nach der Getting Things Done MethodeRiding the Flow - Wissenarbeit nach der Getting Things Done Methode
Riding the Flow - Wissenarbeit nach der Getting Things Done Methode
 
Grundlagen Kooperativer Anonymität
Grundlagen Kooperativer AnonymitätGrundlagen Kooperativer Anonymität
Grundlagen Kooperativer Anonymität
 
Widerstandsfähigkeit von Anonymisierungsnetzen
Widerstandsfähigkeit von AnonymisierungsnetzenWiderstandsfähigkeit von Anonymisierungsnetzen
Widerstandsfähigkeit von Anonymisierungsnetzen
 
Verlustbehaftete Komprimierung
Verlustbehaftete KomprimierungVerlustbehaftete Komprimierung
Verlustbehaftete Komprimierung
 
Peer-to-Peer Security
Peer-to-Peer SecurityPeer-to-Peer Security
Peer-to-Peer Security
 
Denial Of Service Flooding Detection In Anonymity Networks
Denial Of Service Flooding Detection In Anonymity NetworksDenial Of Service Flooding Detection In Anonymity Networks
Denial Of Service Flooding Detection In Anonymity Networks
 

Recently uploaded

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

On the Design Dilemma in Dining Cryptographer Networks

  • 1. TrustBus 2008 Turin, Italy 5. September 2008 On the Design Dilemma in Dining Cryptographer Networks Institute for IT-Security and Security Law Jens Oberender Computer Networks & Communications Group Hermann de Meer University of Passau Germany partly supported by EuroNGI Design and Engineering of the Next Generation Internet (IST-028022) EuroNF Anticipating the Network of the Future (IST-216366)
  • 2. Motivation Connection-level anonymity   Establish communication privacy  Hides relationship between initiator and receiver of a message  Being undistinguishable within the anonymity set Anonymity evolves in a non-cooperative game   Strategies := cooperate | defect  Node strategies -> anonymity set -> anonymity grade  Nash equilibria indicate best strategy Does rational behavior have impact on the anonymity?  How can rationality protect reachability?  On the Design Dilemma in DC-nets 2
  • 3. Overview Does rational behavior have impact on the anonymity?  1) Modeling rational behavior  2) Taxonomy of anonymity techniques  3) Accessible information in Dining Cryptographer (DC) networks How can rationality protect availability?  4) Parameterizing games during design On the Design Dilemma in DC-nets 3
  • 4. Rational acting in Anonymity Networks 1. What benefit is received ? 2. What cost is involved in   participation?  Sender anonymity  Effective Throughput  Anonymity set enhances  Increase of message delay grade of anonymity  Increase of traffic on purpose to counter traffic Challenges for design of anonymity systems analysis Impact of strategic behavior on anonymity  Novel attacks targeting economy of anonymity  On the Design Dilemma in DC-nets 4
  • 5. Requirements of strategic behavior in anonymity networks Enable senders to determine anonymity   1) Rely on trustworthy entities No abuse of collected system-wide entropy  Trust into computing anonymity grade  2) Neighborhood–based approaches (first-hand experience)  Limited credibility – eclipse attack  Anonymity grade in near future   1) Based on prediction  2) Policy enforced On the Design Dilemma in DC-nets 5
  • 6. Determine anonymity grade Strategic users consider anonymity of a message in advance  Decentralization: limited system view  Predicted Depdendable Without Perceived anonymity Assured anonymity Pre- • broadcast responses in a DC-net • queue state in a mixer node requisites Relies Reported anonymity Policy-enforced anonymity • reported number of participants • mixer policy in high-latency on Trust e.g. AN.ON mixers, no forwarding, before anonymity guaranteed On the Design Dilemma in DC-nets 6
  • 7. Dining Cryptographer (DC) networks Round-based  Sender broadcasts  message or empty packet Disruption: message collisions  require retransmission Security objective: reachability  Coding schemes  Cost in bandwidth, computation effort  Robustness against collisions  Countermeasure to disrupters  On the Design Dilemma in DC-nets 7
  • 8. Apply game theory to Dining Efficient / Robust design Designer Cryptographer (DC) networks User Participate / Leave Adversary Conforming / Disrupt Design dilemma: efficient or robust  Non-cooperative game Sequential game  Complete Information  Incomplete information Payoff functions public Adversaries strategy unknown   Imperfect information Perfect information   Concurrency Time order   Random disruptions   Disrupter identification removes attacker from network Disrupt without being identified as disrupter   Rational behavior, possible to formulate as utility function On the Design Dilemma in DC-nets 8
  • 9. Resolving dilemma games Iterated Prisoner’s Dilemma (IPD) -> Mixed strategy solution  Nash Equilibria in iterated games  1 Probability distributions  0.8 Disrupt probability Non-cooperative  Different strategies 0.6 p>80% disrupting  0.4 in non-cooperative game 0.2 Ability to identify disrupters (>18%)  Sequential 0 prevents misbehavior in sequential game 0 0.2 0.4 0.6 0.8 1 Ability to identify disrupter User’s preference for anonymity On the Design Dilemma in DC-nets 9
  • 10. Conclusions Modeling of strategic behavior   Grade of anonymity relies on behavior of all participants  For design of anonymity systems  Risk-prevention of malicious participants Dilemma games   Influence rational players through system parameters  Incomplete knowledge restrict the designer’s payoff, but parameters hinder malicious collisions  User perspective on future anonymity: more research ongoing On the Design Dilemma in DC-nets 10
  • 11. DC Coding Schemes Bitwise XOR [Chaum88]   Not robust against collisions  Low computation overhead Bilinear Maps [Golle04]   Robust against collisions  Medium computation overhead Identification of Disrupters [Bos89]   Robust against collisions  High computation overhead  Identifies a disrupter On the Design Dilemma in DC-nets 11
  • 12. Dining Cryptographers network Figure out, whether the meal has been paid  by either one at the table  Protocol provides sender anonymity 
  • 13. Communication Anonymity Anonymity := do not disclose communication relationship  between sender and recipient Technically: being indistinguishable within the anonymity set,  i.e. all current communication participants Level of anonymity scales with size of anonymity set  If a user leaves system  degrades anonymity  Especially in small systems DC net  Coding superimposes messages  Simultaneous slot occupation   communication is disrupted Effort to receive/decode broadcasts  On the Design Dilemma in DC-nets 13
  • 14. Game Theory and Dilemmas Models strategic behavior, e.g. in cooperative systems  Game defines players, strategy sets, and utility   Outcome defined by strategies of all users  Pay off: effective utility depending on the outcome of the game Strategic behavior   Rationally acting, i.e. maximize payoff  Predict strategy of other players (Non-cooperative game)  Minimize own losses (Sequential game, incomplete knowledge) Dilemma: strategic behavior  does not increase payoff for any of the players On the Design Dilemma in DC-nets 14
  • 15. Stake holders of a DC-net Send M1 Dining Cryptographers network  Broadcast Send M2 Send M3 Communicating subjects (=users)   Anonymous communication with reasonable cost Adversary   Disrupt anonymous communications (increase user costs), but remain unidentified DC-net designer   Facilitate high level of anonymity  Decreasing participation  degrades anonymity (for small sizes) On the Design Dilemma in DC-nets 15
  • 16. 1) Robust design against malicious attacks Design parameters  α 0 none – collision robustness 1 full Designer Strategy s 1 1 β 0 no –disrupter identification 0.8 1 possible 0.6 Sequential User (single instance)  0.4 Non-Coop. γ 0 low – anonymity preference =0 0.2 1 high >0 0 0 0.2 0.4 0.6 0.8 1 Compute Nash equilibria , i.e. best strategy for specified parameters   Probability for efficient (0) or robust (1) algorithm On the Design Dilemma in DC-nets 16
  • 17. References Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, undetectability,  unobservability, pseudonymity, and identity management - a consolidated proposal for terminology. (2008) Draft Dingledine, R., Mathewson, N.: Anonymity loves company: Usability and  the network effect. In: Workshop on the Economics of Information Security. (2006) Acquisti, A., Dingledine, R., Syverson, P.: On the economics of anonymity.  In Financial Cryptography. Number 2742 in LNCS, Springer (2003) Golle, P., Juels, A.: Dining cryptographers revisited. In: EUROCRYPT.  Volume 3027 of LNCS, Springer (2004) 456-473 Bos, J.N., den Boer, B.: Detection of Disrupters in the DC Protocol. In:  Workshop on the theory and application of cryptographic techniques on Advances in cryptology. (1989) 320-327 On the Design Dilemma in DC-nets 17