Identity Theft Prevention using Aggregated Proof of Knowledge - PowerPoint PPT Presentation

1 / 19
About This Presentation
Title:

Identity Theft Prevention using Aggregated Proof of Knowledge

Description:

Proving aggregated signature on some committed values and opening some ... The final submitted value is independent of any of the actual signatures. ... – PowerPoint PPT presentation

Number of Views:44
Avg rating:3.0/5.0
Slides: 20
Provided by: abhilashab
Category:

less

Transcript and Presenter's Notes

Title: Identity Theft Prevention using Aggregated Proof of Knowledge


1
Identity Theft Prevention usingAggregated Proof
of Knowledge
  • Elisa Bertino, Abhilasha Bhargav-Spantzel,
  • Anna Squicciarini,
  • Rui Xue

2
What is Identity Theft?
  • Identity Theft is the use of personally
    identifying information belonging to one
    individual by another individual for financial or
    personal gain.

3
Multi-Factor Identity Verification
Require additional identity information as
proof to qualify to be the owner of the identity
attribute being used.
Example Real Life Scenario Requirement for
additional proofs of identity
I will use my credit card to pay
To use your credit card please show your drivers
license and an additional photo id for
verification of your identity
4
Overview of our Approach
  • We have a logical entity called the registrar
    which establishes and maintains identity
    commitments used to establish proof of knowledge
    of strong identifiers used later for multifactor
    identity verification.
  • Two main Phases
  • Enrollment or Registration User commits his
    strong identifiers to be used later as proofs of
    identity.
  • Usage Before revealing the actual value of a
    required attribute one has to verify the
    commitments of other attributes as proofs of
    identity.

5
Example
6
Preliminary Concepts

7
Example of ZK Proof system
8
Pedersen Commitment ZK Proveknow how to open
  • Public commitment c gxhr (mod p)
  • Private knowledge x,r
  • Protocol
  • P picks random y, s in 1..q, sends d gyhs
    mod p
  • V sends random challenge e in 1..q
  • P sends uyex, vser (mod q)
  • 4. V accepts if guhv dce (mod p)

9
Bilinear Maps
  • Let G1, G2, and Gt be cyclic groups of the same
    order.

Bilinear maps are called pairings because they
associate pairs of elements from G1 and G2 with
elements in Gt.
10
Aggregated signatures (Boneh, et al.)
  • Signatures on different messages by multiple
    signers can be combined into one small signature.
  • Scheme requires bilinear map (in Gap DH groups)
  • BGLS Details

11
(No Transcript)
12
Preliminary Concepts

13
Proving aggregated signature on committed values
To prove the knowledge of multiple identifiers.
14
Proving aggregated signature on committed values
and open
To open in clear multiple sensitive identifiers.
15
Proving aggregated signature on some committed
values and opening some
To prove u values and open v
16
Integrating the zero-knowledge proof into the
verification
To prove the knowledge of secret commitments.
Note that the only information sent by the
principal is s, while in the previous protocol
the tags and the commitments were also sent.
17
Zero-knowledge proof the aggregated signature
To prove the possession of signature.
The final submitted value is independent of any
of the actual signatures. Principal remains
unlinkable and anonymous even if it had initially
revealed its strong identifiers and commitments
to the verifying SP.
18
Efficiency Analysis
  • Our signatures on commitments are short and the
    storage complexity is smaller than the ones
    computed with existing techniques Camenisch et.
    Al.04
  • Our approach is more flexible in that whenever n
    messages are committed for a user, the user is
    able to to prove 2n-1 many combinations of them
    which does not appear possible in the existing
    schemes

Comparison of the number of exponentiations for
proving t factors
19
Conclusion
  • Identity theft is a major problem
  • Our approach supports the strong verification of
    identity attributes, which is a component of
    comprehensive solutions against identity theft

20
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com