On Securing Communication from Profilers

Debrup Chakraborty, Sandra Díaz-Santiago, Debrup Chakraborty, Sandra Díaz-Santiago

Abstract

A profiling adversary is an adversary which aims to classify messages into pre-defined profiles and thus gain useful information regarding the sender or receiver of such messages. Usual chosen-plaintext secure encryption schemes are capable of securing information from profilers, but these schemes provide more security than required for this purpose. In this paper we study the requirements for an encryption algorithm to be secure only against profilers and finally give a precise notion of security for such schemes. We also present a full protocol for secure (against profiling adversaries) communication, which neither requires a key exchange nor a public key infrastructure. Our protocol guarantees security against non-human profilers and is constructed using CAPTCHAs and secret sharing schemes.

References

  1. Abdalla, M., Bellare, M., and Rogaway, P. (2001). The oracle Diffie-Hellman assumptions and an analysis of DHIES. In Naccache, D., editor, CT-RSA, volume 2020 of Lecture Notes in Computer Science, pages 143-158. Springer.
  2. Canetti, R., Halevi, S., and Steiner, M. (2005). Hardness amplification of weakly verifiable puzzles. In Kilian, J., editor, TCC, volume 3378 of Lecture Notes in Computer Science, pages 17-33. Springer.
  3. Dwork, C. and Naor, M. (1992). Pricing via processing or combatting junk mail. In Brickell, E. F., editor, CRYPTO, volume 740 of Lecture Notes in Computer Science, pages 139-147. Springer.
  4. Dziembowski, S. (2010). How to pair with a human. In Garay, J. A. and Prisco, R. D., editors, SCN, volume 6280 of Lecture Notes in Computer Science, pages 200-218. Springer.
  5. Golle, P. and Farahat, A. (2004). Defending email communication against profiling attacks. In Atluri, V., Syverson, P. F., and di Vimercati, S. D. C., editors, WPES, pages 39-40. ACM.
  6. Impagliazzo, R., Jaiswal, R., and Kabanets, V. (2009). Chernoff-type direct product theorems. J. Cryptology, 22(1):75-92.
  7. Impagliazzo, R. and Zuckerman, D. (1989). How to recycle random bits. In FOCS, pages 248-253. IEEE.
  8. Jutla, C. S. (2010). Almost optimal bounds for direct product threshold theorem. In Micciancio, D., editor, TCC, volume 5978 of Lecture Notes in Computer Science, pages 37-51. Springer.
  9. Katz, J. and Lindell, Y. (2008). Introduction to Modern Cryptography. Chapman & Hall/ CRC.
  10. Naor, M. (1997). Verification of a human in the loop or identification via the turing test. http://www.wisdom.weizmann.ac.il/~naor/PAPERS/ human.pdf.
  11. NYT (2009). Congress begins deep packet inspection of internet providers. http://bits.blogs.nytimes.com/2009/04/24/congressbegins-deep-packet-inspection-of-internet-providers/.
  12. Pinkas, B. and Sander, T. (2002). Securing passwords against dictionary attacks. In Atluri, V., editor, ACM Conference on Computer and Communications Security, pages 161-170. ACM.
  13. Shamir, A. (1979). How to share a secret. Commun. ACM, 22(11):612-613.
  14. Toubiana, V., Narayanan, A., Boneh, D., Nissenbaum, H., and Barocas, S. (2010). Privacy preserving targeted advertising. In Proceedings of annual network and distributed systems security symposium. http://www.isoc.org/isoc/conferences/ndss/10/pdf/05 .pdf.
  15. von Ahn, L., Blum, M., Hopper, N. J., and Langford, J. (2003). CAPTCHA: Using hard AI problems for security. In Biham, E., editor, EUROCRYPT, volume 2656 of Lecture Notes in Computer Science, pages 294-311. Springer.
Download


Paper Citation


in Harvard Style

Díaz-Santiago S., Chakraborty D., Díaz-Santiago S. and Chakraborty D. (2012). On Securing Communication from Profilers . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 154-162. DOI: 10.5220/0004054501540162


in Bibtex Style

@conference{secrypt12,
author={Sandra Díaz-Santiago and Debrup Chakraborty and Sandra Díaz-Santiago and Debrup Chakraborty},
title={On Securing Communication from Profilers},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={154-162},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004054501540162},
isbn={978-989-8565-24-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - On Securing Communication from Profilers
SN - 978-989-8565-24-2
AU - Díaz-Santiago S.
AU - Chakraborty D.
AU - Díaz-Santiago S.
AU - Chakraborty D.
PY - 2012
SP - 154
EP - 162
DO - 10.5220/0004054501540162