Oblivious Handshakes and Sharing of Secrets of Privacy-Preserving Matching and Authentication Protocols

The objective of this research is focused on two of the most important privacy-preserving techniques: privacy-preserving element matching protocols and privacy-preserving credential authentication protocols, where an element represents the information generated by users themselves and a credential r...

Full description

Bibliographic Details
Main Author: Duan, Pu
Other Authors: Liu, Jyh-Charn (Steve)
Format: Others
Language:en_US
Published: 2012
Subjects:
Online Access:http://hdl.handle.net/1969.1/ETD-TAMU-2011-05-9445
id ndltd-tamu.edu-oai-repository.tamu.edu-1969.1-ETD-TAMU-2011-05-9445
record_format oai_dc
spelling ndltd-tamu.edu-oai-repository.tamu.edu-1969.1-ETD-TAMU-2011-05-94452013-01-08T10:43:32ZOblivious Handshakes and Sharing of Secrets of Privacy-Preserving Matching and Authentication ProtocolsDuan, PuElliptic Curve CryptographyPrivacy-Preserving Element Matching ProtocolPrivacy-Preserving Credential Authentication ProtocolNetwork SecurityThe objective of this research is focused on two of the most important privacy-preserving techniques: privacy-preserving element matching protocols and privacy-preserving credential authentication protocols, where an element represents the information generated by users themselves and a credential represents a group membership assigned from an independent central authority (CA). The former is also known as private set intersection (PSI) protocol and the latter is also known as secret handshake (SH) protocol. In this dissertation, I present a general framework for design of efficient and secure PSI and SH protocols based on similar message exchange and computing procedures to confirm “commonality” of their exchanged information, while protecting the information from each other when the commonalty test fails. I propose to use the homomorphic randomization function (HRF) to meet the privacy-preserving requirements, i.e., common element/credential can be computed efficiently based on homomorphism of the function and uncommon element/credential are difficult to derive because of the randomization of the same function. Based on the general framework two new PSI protocols with linear computing and communication cost are proposed. The first protocol uses full homomorphic randomization function as the cryptographic basis and the second one uses partial homomorphic randomization function. Both of them achieve element confidentiality and private set intersection. A new SH protocol is also designed based on the framework, which achieves unlinkability with a reusable pair of credential and pseudonym and least number of bilinear mapping operations. I also propose to interlock the proposed PSI protocols and SH protocol to design new protocols with new security properties. When a PSI protocol is executed first and the matched elements are associated with the credentials in a following SH protocol, authenticity is guaranteed on matched elements. When a SH protocol is executed first and the verified credentials is used in a following PSI protocol, detection resistance and impersonation attack resistance are guaranteed on matching elements. The proposed PSI and SH protocols are implemented to provide privacy-preserving inquiry matching service (PPIM) for social networking applications and privacy-preserving correlation service (PAC) of network security alerts. PPIM allows online social consumers to find partners with matched inquiries and verified group memberships without exposing any information to unmatched parties. PAC allows independent network alert sources to find the common alerts without unveiling their local network information to each other.Liu, Jyh-Charn (Steve)2012-07-16T15:57:18Z2012-07-16T20:17:23Z2012-07-16T15:57:18Z2012-07-16T20:17:23Z2011-052012-07-16May 2011thesistextapplication/pdfhttp://hdl.handle.net/1969.1/ETD-TAMU-2011-05-9445en_US
collection NDLTD
language en_US
format Others
sources NDLTD
topic Elliptic Curve Cryptography
Privacy-Preserving Element Matching Protocol
Privacy-Preserving Credential Authentication Protocol
Network Security
spellingShingle Elliptic Curve Cryptography
Privacy-Preserving Element Matching Protocol
Privacy-Preserving Credential Authentication Protocol
Network Security
Duan, Pu
Oblivious Handshakes and Sharing of Secrets of Privacy-Preserving Matching and Authentication Protocols
description The objective of this research is focused on two of the most important privacy-preserving techniques: privacy-preserving element matching protocols and privacy-preserving credential authentication protocols, where an element represents the information generated by users themselves and a credential represents a group membership assigned from an independent central authority (CA). The former is also known as private set intersection (PSI) protocol and the latter is also known as secret handshake (SH) protocol. In this dissertation, I present a general framework for design of efficient and secure PSI and SH protocols based on similar message exchange and computing procedures to confirm “commonality” of their exchanged information, while protecting the information from each other when the commonalty test fails. I propose to use the homomorphic randomization function (HRF) to meet the privacy-preserving requirements, i.e., common element/credential can be computed efficiently based on homomorphism of the function and uncommon element/credential are difficult to derive because of the randomization of the same function. Based on the general framework two new PSI protocols with linear computing and communication cost are proposed. The first protocol uses full homomorphic randomization function as the cryptographic basis and the second one uses partial homomorphic randomization function. Both of them achieve element confidentiality and private set intersection. A new SH protocol is also designed based on the framework, which achieves unlinkability with a reusable pair of credential and pseudonym and least number of bilinear mapping operations. I also propose to interlock the proposed PSI protocols and SH protocol to design new protocols with new security properties. When a PSI protocol is executed first and the matched elements are associated with the credentials in a following SH protocol, authenticity is guaranteed on matched elements. When a SH protocol is executed first and the verified credentials is used in a following PSI protocol, detection resistance and impersonation attack resistance are guaranteed on matching elements. The proposed PSI and SH protocols are implemented to provide privacy-preserving inquiry matching service (PPIM) for social networking applications and privacy-preserving correlation service (PAC) of network security alerts. PPIM allows online social consumers to find partners with matched inquiries and verified group memberships without exposing any information to unmatched parties. PAC allows independent network alert sources to find the common alerts without unveiling their local network information to each other.
author2 Liu, Jyh-Charn (Steve)
author_facet Liu, Jyh-Charn (Steve)
Duan, Pu
author Duan, Pu
author_sort Duan, Pu
title Oblivious Handshakes and Sharing of Secrets of Privacy-Preserving Matching and Authentication Protocols
title_short Oblivious Handshakes and Sharing of Secrets of Privacy-Preserving Matching and Authentication Protocols
title_full Oblivious Handshakes and Sharing of Secrets of Privacy-Preserving Matching and Authentication Protocols
title_fullStr Oblivious Handshakes and Sharing of Secrets of Privacy-Preserving Matching and Authentication Protocols
title_full_unstemmed Oblivious Handshakes and Sharing of Secrets of Privacy-Preserving Matching and Authentication Protocols
title_sort oblivious handshakes and sharing of secrets of privacy-preserving matching and authentication protocols
publishDate 2012
url http://hdl.handle.net/1969.1/ETD-TAMU-2011-05-9445
work_keys_str_mv AT duanpu oblivioushandshakesandsharingofsecretsofprivacypreservingmatchingandauthenticationprotocols
_version_ 1716505215560056832