820 likes | 917 Views
A Security Model for Anonymous Credential Systems. 26 th August I-NetSec, SEC 2004 Andreas Pashalidis and Chris J. Mitchell. Agenda. Why do we need AC Systems ? How do AC Systems work ? The model. What is “security” in an AC System ? What is “privacy” in an AC System ? Open questions.
E N D
A Security Model forAnonymous Credential Systems 26th August I-NetSec, SEC 2004 Andreas Pashalidis and Chris J. Mitchell
Agenda • Why do we need AC Systems ? • How do AC Systems work ? • The model. • What is “security” in an AC System ? • What is “privacy” in an AC System ? • Open questions.
Agenda • Why do we need AC Systems ? • How do AC Systems work ? • The model. • What is “security” in an AC System ? • What is “privacy” in an AC System ? • Open questions.
Why do we need AC Systems ? We want to prevent this! (technically – not through legislation)
Agenda • Why do we need AC Systems ? • How do AC Systems work ? • The model. • What is “security” in an AC System ? • What is “privacy” in an AC System ? • Conclusions.
Agenda • Why do we need AC Systems ? • How do AC Systems work ? • The model. • What is “security” in an AC System ? • What is “privacy” in an AC System ? • Open questions.
Why another model ? • There is a formal model in [CL01]*. • Based on simulatability: • Ideal functionality guarantees security and privacy; cryptosystem has to “meet” this standard. • Relationship between different notions is somewhat hidden. • Adversary cannot corrupt parties adaptively. • Alternative model based on different ideas, in particular the [BR93]** model. *Camenisch & Lysyanskaya “An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation”, Eurocrypt 2001 **Bellare & Rogaway “Entity Authentication and Key Distribution” Crypto 1993
What is a AC System ? • It is a 10-tuple consisting of • Five Sets: Users, Issuers, Verifiers, Pseudonyms, Credential Types. • Three Protocols: Pseudonym Establishment, Credential Issuing, Credential Showing. • One Algorithm: Initialisation. • One number: Security Parameter (k).
What is a AC System ? Turing machines • It is a 10-tuple consisting of • Five Sets: Users, Issuers, Verifiers, Pseudonyms, Credential Types. • Three Protocols: Pseudonym Establishment, Credential Issuing, Credential Showing. • One Algorithm: Initialisation. • One number: Security Parameter (k).
The model • Users, Issuers and Verifiers execute the protocols with each other directly (not through an attacker who controls all communications). • Several notions of security and privacy. • Each notion is defined by means of a game between two Turing machines: Challenger vs. Adversary.
The games – three phases 1) Challenger chooses k, runs initialisation, controls all Users, Issuers, Verifiers. 2) Adversary issues queries to Challenger. • A query makes the Challenger either • initiate a protocol between a user and an issuer or a user and a verifier, or • hand control of a party over to the Adversary.
The games – three phases 3) No more queries. Adversary runs credential showing protocol with an uncorrupted verifier. If verifier accepts Adversary wins; otherwise he loses. • The notion of security is satisfied iff no Adversary can win the game with a non-negligible probability (in the security parameter k).
Agenda • Why do we need AC Systems ? • How do AC Systems work ? • The model. • What is “security” in an AC System ? • What is “privacy” in an AC System ? • Open questions.
What is “security” in an ACS ? • Three notions of security. • Pseudonym owner protection. • Credential Unforgeability. • Credential Non-transferability.
Pseudonym owner protection “Nobody, even if colludingwith others (users, issuers and verifiers) should be able to successfully show a credential on a pseudonym of which he is not the owner (i.e. on a pseudonym which was not established by himself).”
Credential Unforgeability “The only way for a user to successfully show a credential is by having previously obtained it from the issuer.”
Credential Non-Transferability Needs additional assumption: not all secrets may be shared!
Credential Non-Transferability “Even if colluding with others who have obtained a credential, a user can successfully show it only if it was issued to him personally.”
Credential Non-Transferability Non-Transferability implies Unforgeability. Definitions make this explicit. Non-Transferability not always required.