Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation



Similar documents
The Impact of Cryptography on Platform Security

Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings

Attribute-proving for Smart Cards

A New and Efficient Signature on Commitment Values

Lecture 25: Pairing-Based Cryptography

Privacy in e-ticketing & e-identity

Information Security Basic Concepts

Efficient Unlinkable Secret Handshakes for Anonymous Communications

Security in Electronic Payment Systems

Lecture VII : Public Key Infrastructure (PKI)

A Secure Decentralized Access Control Scheme for Data stored in Clouds

An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

Scalable Authentication

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

SP A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

Danske Bank Group Certificate Policy

Key Exchange with Anonymous Authentication using DAA-SIGMA Protocol

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

Neutralus Certification Practices Statement

Introduction to Cryptography

Implementation and Adaptation of the Pseudonymous PKI for Ubiquitous Computing for Car-2-Car Communication

Acronym Term Description

A Survey on Untransferable Anonymous Credentials

Cryptography and Key Management Basics

Central Agency for Information Technology

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

Public Key Cryptography in Practice. c Eli Biham - May 3, Public Key Cryptography in Practice (13)

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan

Efficient construction of vote-tags to allow open objection to the tally in electronic elections

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

Enabling Public Auditing for Secured Data Storage in Cloud Computing

CRYPTOGRAPHY AS A SERVICE

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

VoteID 2011 Internet Voting System with Cast as Intended Verification

CMS Illinois Department of Central Management Services

CA Certificate Policy. SCHEDULE 1 to the SERVICE PROVIDER AGREEMENT

CERTIFICATION PRACTICE STATEMENT UPDATE

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

A Draft Framework for Designing Cryptographic Key Management Systems

Security Policy Revision Date: 23 April 2009

Device-Centric Authentication and WebCrypto

Certification Practice Statement (ANZ PKI)

Group Signatures: Authentication with Privacy

21 CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES CFR Part 11 Compliance PLA 2.1

Business Issues in the implementation of Digital signatures

Surveying Cloud Storage Correctness using TPA with BLS

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. July 2011 Version 2.0. Copyright , The Walt Disney Company

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

A Factoring and Discrete Logarithm based Cryptosystem

TELSTRA RSS CA Subscriber Agreement (SA)

Module 7 Security CS655! 7-1!

CS 356 Lecture 28 Internet Authentication. Spring 2013

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

Land Registry. Version /09/2009. Certificate Policy

Using BroadSAFE TM Technology 07/18/05

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Certification Practice Statement

A Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

QUT Digital Repository:

CoSign for 21CFR Part 11 Compliance

Concept of Electronic Approvals

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Electronic Voting Protocol Analysis with the Inductive Method

Randomized Hashing for Digital Signatures

Applying Cryptography as a Service to Mobile Applications

Authentication requirement Authentication function MAC Hash function Security of

Improving data integrity on cloud storage services

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

View from a European Trust Service Provider Server Signing: Return of experience and certification strategy

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

REVENUE ON-LINE SERVICE CERTIFICATE POLICY. Document Version 1.2 Date: 15 September OID for this CP:

Signature policy for TUPAS Witnessed Signed Document

X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities

5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES

CS 392/681 - Computer Security

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Transcription:

Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation 1

Agenda EPID overview EPID usages Device Authentication Government Issued ID EPID performance and standardization efforts 2

Overview of EPID EPID pub-key Message Message, EPID Signature Sign Verify pvt-key 1 pvt-key 2 pvt-key n EPID Signature True / False EPID is a digital signature scheme with special properties One group public key corresponds to multiple private keys Each unique private key can be used to generate a signature Signature can be verified using the group public key 3

Enhanced Privacy ID (EPID) Direct Anonymous Attestation (DAA) A crypto scheme for providing anonymous signatures DAA is designed specifically for TPM RSA based DAA scheme adopted by TCG TPM Spec v1.2 EPID is an extension of DAA Flexible key generation and signature creation options Additional revocation capabilities Pairing based EPID scheme has improved efficiency 4

What is EPID Knows Issuer Secret Join Each Member obtains a unique EPID private key Knows Private key Sign Issuer Member Signs a message using his private key and outputs a signature EPID group public key Verifier Verify Verifies EPID signature using the group public key 5

Privacy Features of DAA/EPID EPID key issuing can be blinded Issuer does not need to know Member Private Key EPID signatures are anonymous EPID signatures are untraceable Nobody including the issuer can open an EPID signature and identify the member This is the main difference between group signatures Unlinkability property depends upon Base Signature includes a pseudonym B f where B is base chosen for a signature and revealed during the signature f is unique per member and private Random base: Pseudonym R f where R is random signatures are unlinkable Name base: Pseudonym N f all where N is name of verifier Signatures still unlinkable for different verifiers Signatures using common N are linkable 6

Revocations in EPID Private key revocation (Revealed Key List) Ex: Private key is corrupted and is published Revocation check performed by verifier Verifier Local Revocation using name base Ex: Verifier can revoke a Pseudonym for his name (N f ) Revocation check performed by verifier Signature based revocation (Signature Revocation List) Issuer and/or verifier decide that they no longer want to accept signatures from whatever signed a revoked message with pseudonym B f For each future signature, Member signs as normal Member proves he didn t sign the revoked message Member proves his pseudonym with base B is not B f Retains same anonymity and unlinkability properties 7

More on signature based revocation Signature Revoke list K i = B i fi for many pseudonyms Member produces a pseudonym K = B f in a signature The Member performs a Not My Pseudonym Proof, for each pseudonym in Signature Revoke list, i.e., for each (B i, K i ), the member proves that K i B i f Signature Revoke list signed by Revocation authority and checked by Member device 8

Agenda EPID overview EPID usages Device Authentication Government Issued ID EPID performance and standardization efforts 9

Uses of EPID Device Authentication Device authentication Prove: This is an approved device (and SW environment) for this purpose Only reason to revoke a device EPID key is if the EPID key has been physically removed from the device Example: Device which generates, stores, and uses keys in a protected environment Used to establish login keys with many institutions Institution knows that login keys are protected Member knows that a compromise at one institution does not affect his security or privacy at any other institution 10

Use Name Base or Random Base? Issue with Random Base A single HW reverse engineered key could be used to get many different accounts with the same institution Recommendation: Use Name Base for registration for an account Ex: CitiBank Permanent Name Base is okay Netflix Could change the Name Base daily Reverse engineered key cannot be used by two different platforms during the same day 11

Example use of signature based revocation Member registers with CitiBank EPID Signs a message with pseudonym (CitiBank f ) {Here is a public verification key V where my device securely holds the corresponding private key [S]} Suppose S is found in a piece of malware The pair of the above EPID signature and S is convincing evidence that the device has been reverse engineered Then the pseudonym (CitiBank f ) can be revoked and added to signed Signature Revoke List 12

Uses of EPID ID Card Government issued ID card Only prove minimal necessary information Age Not on watch list Random base sufficient for many instances Multiple reasons for revocation and/or watch of EPID key Potential watch list During Issuing, a random base pseudonym established (R f ) If individual ever put on government watch list, (R f ) is put on watch list Watch list used as revocation list Watch list also signed by Revocation Authority 13

Revocation (and Watch) List Revocation List Verification Public Key Embedded in EPID token Verifies revocation list was signed by Revocation Authority Keeps the EPID Token from responding to an unauthorized revocation list Local Audit of Revocation / Watch User Token will know if his private key is ever on a revocation /watch list User would not know unless User Token informed the user Policy enforced by the user token determines when the user is informed A Max time could be in the user token. 14

Comparisons vs. PKI and DAA PKI DAA with Random B DAA with Named B EPID Group Signatures Unique Public Key Yes No No No No Unique Private Key Yes Yes Yes Yes Yes Anonymous No Yes Yes Yes Yes Untraceable No Yes Yes Yes No Unlinkable No Yes No Yes Yes Check for revealed private key Revoke the signer of a signature Member Auditability of Revocation Yes Yes Yes Yes Scheme specific Yes No Yes Yes Yes No No No Yes No 15

Agenda EPID overview EPID usages EPID performance and standardization efforts 16

EPID Scheme for Bilinear Maps EPID scheme derived from Boneh, Boyen, and Shacham group signature scheme (2004) Furukawa and Imai group signature scheme (2006) Security assumptions Strong Diffie-Hellman (q-sdh) assumption for security Decisional Diffie-Hellman (DDH) assumption for anonymity Efficiency of EPID scheme Sign takes 4 multi-exponentiations (EXPs) Less than 20ms with 256-bit BN curve Verify takes 1 pairing + 3 EXPs Each revoked private key, verifier computes 1 EXP Each revoked signature, signer computes 3 EXPs, verifier computes 2 EXPs Less than 10ms per signature Almost all signing and revoke signature can be pre-computed before message to be signed is known 17

Re-issuing If Revealed list or Signature Revocation List gets too big, then Member can join a new group. Member proves to Issuer that he is not revealed or on Signer Revocation List Issuer then provides Member a membership in a new group Probably use Issuer Pseudonym in the reissuing Protects against a compromised key that is not yet revealed 18

Standardization ISO EPID included in ISO/IEC 20008: Anonymous Digital Signatures Full EPID scheme included in 1 st committee draft of ISO 20008-2 ISO/IEC 20009: Anonymous Entity Authentication EPID based key exchange protocol (DAA-SIGMA protocol) included in 1 st committee draft of ISO 20009-2 TCG DAA (EPID without signature revocation) included in TPM 2.0 TPM portion of the EPID signing algorithm standardized in TPM spec v0.86 Host portion of the EPID signing algorithm to be standardized in TCG PC client specification 19

20 Backup

Cryptographic Assumptions of EPID q-sdh assumption: Given (g 1, g 1r, g r^2 1,, g r^q 1, g 2, g 2r ), where g 1, g 2 are generators of G 1, G 2, respectively, it is hard to compute an (A, x) pair such that A = g 1/(x+r) 1 DDH assumption: it is hard to distinguish two distributions (g a, g b, g ab ) and (g a, g b, g c ), where a, b, c are randomly chosen from Z q. 21

References of EPID E. Brickell and J. Li. Enhanced Privacy ID from bilinear pairing. Cryptology eprint Archive. http://eprint.iacr.org/2009/095 E. Brickell and J. Li. A Pairing-Based DAA Scheme Further Reducing TPM Resources. TRUST 2010. E. Brickell and J. Li. Enhanced Privacy ID from Bilinear Pairing for Hardware Authentication and Attestation. IEEE PASSAT 2010. E. Brickell and J. Li. Enhanced Privacy ID from Bilinear Pairing for Hardware Authentication and Attestation. IJIPSI 2011. Other EPID related publications E. Brickell and J. Li. ACM WPES 2007 E. Brickell, L. Chen, and J. Li. TRUST 2008 E. Brickell, L. Chen, and J. Li. IJIS 2009 E. Brickell and J. Li. Intel Technology Journal 2009 J. Walker and J. Li. INTRUST 2010 22