On the Security of Rate-limited Privacy Pass

被引:0
|
作者
Chu, Hien [1 ]
Do, Khue [2 ]
Hanzlik, Lucjan [2 ]
机构
[1] Friedrich Alexander Univ Erlangen Nurnberg, Erlangen, Germany
[2] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
关键词
Security and Privacy; Cryptography;
D O I
10.1145/3576915.3616619
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The privacy pass protocol allows users to redeem anonymously issued cryptographic tokens instead of solving annoying CAPTCHAs. The issuing authority verifies the credibility of the user, who can later use the pass while browsing the web using an anonymous or virtual private network. Hendrickson et al. proposed an IETF draft (privacy pass-rate-limit-tokens-00) for a rate-limiting version of the privacy pass protocol, also called rate-limited Privacy Pass (RlP). Introducing a new actor called a mediator makes both versions inherently different. The mediator applies access policies to rate-limit users' access to the service while, at the same time, should be oblivious to the website/origin the user is trying to access. In this paper, we formally define the rate-limited Privacy Pass protocol and propose a game-based security model to capture the informal security notions introduced by Hendrickson et al.. We show a construction from simple building blocks that fulfills our security definitions and even allows for a post-quantum secure instantiation. Interestingly, the instantiation proposed in the IETF draft is a specific case of our construction. Thus, we can reuse the security arguments for the generic construction and show that the version used in practice is secure.
引用
收藏
页码:2871 / 2885
页数:15
相关论文
共 50 条
  • [1] Rate-limited secure function evaluation
    Dagdelen, Oezguer
    Mohassel, Payman
    Venturi, Daniele
    THEORETICAL COMPUTER SCIENCE, 2016, 653 : 53 - 78
  • [2] Interference Channels With Rate-Limited Feedback
    Vahid, Alireza
    Suh, Changho
    Avestimehr, A. Salman
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (05) : 2788 - 2812
  • [3] RATE-LIMITED CONTROL SYSTEM NOISE
    VANHORN, IH
    WILSON, RG
    PROCEEDINGS OF THE INSTITUTE OF RADIO ENGINEERS, 1952, 40 (02): : 229 - 229
  • [4] Wiretap Channel with Rate-limited Feedback
    Ardetsanizadeh, Ehsan
    Franceschetti, Massimo
    Javidi, Tara
    Kim, Young-Han
    2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 101 - 105
  • [5] Rate-limited transport of hydroxyatrazine in an unsaturated soil
    Kauffman, Shelley J.
    Bolster, Carl H.
    Hornberger, George M.
    Herman, Janet S.
    Mills, Aaron L.
    Environmental Science and Technology, 1998, 32 (20): : 3137 - 3141
  • [6] Rate-limited transport of hydroxyatrazine in an unsaturated soil
    Kauffman, SJ
    Bolster, CH
    Hornberger, GM
    Herman, JS
    Mills, AL
    ENVIRONMENTAL SCIENCE & TECHNOLOGY, 1998, 32 (20) : 3137 - 3141
  • [7] On the Rate-Limited Gelfand-Pinsker Problem
    Tandon, Ravi
    Ulukus, Sennur
    2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 1963 - 1967
  • [8] Rate-limited stabilization for Network Control Systems
    Lopez, I.
    Abdallah, C. T.
    2007 AMERICAN CONTROL CONFERENCE, VOLS 1-13, 2007, : 4166 - 4171
  • [9] Rate-limited plastic deformation in nanocrystalline Ni
    Cao, Lei
    Koslowski, Marisol
    JOURNAL OF APPLIED PHYSICS, 2015, 117 (24)
  • [10] Degraded Broadcast Channels with Rate-Limited Feedback
    Yin, Xinxing
    Pang, Liang
    Xue, Zhi
    Zhou, Yongkai
    2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2013, : 911 - 916