Skip to content
Snippets Groups Projects
Commit f04c39be authored by Keno Goertz's avatar Keno Goertz
Browse files

Add section quantifying distributed trust

parent 86bc2862
Branches
No related merge requests found
...@@ -30,7 +30,7 @@ The publication can be implemented in many different ways, which we will take a ...@@ -30,7 +30,7 @@ The publication can be implemented in many different ways, which we will take a
For now, the reader may imagine that the TSA publishes its time-stamps in a newspaper. For now, the reader may imagine that the TSA publishes its time-stamps in a newspaper.
The time-stamping company \emph{Surety} actually employed this method of publication in practice. (Citation needed) The time-stamping company \emph{Surety} actually employed this method of publication in practice. (Citation needed)
Witnesses keep records of the time-stamps issued by the TSA. Witnesses keep a record of the time-stamps issued by the TSA.
They do not accept time-stamps issued too far in the past. They do not accept time-stamps issued too far in the past.
Staying with the example of time-stamps published in a newspaper, the newspaper archives of public libraries can act as witnesses. Staying with the example of time-stamps published in a newspaper, the newspaper archives of public libraries can act as witnesses.
To prevent backdating attacks, a library only archives a newspaper which it receives on the printed date of publication. To prevent backdating attacks, a library only archives a newspaper which it receives on the printed date of publication.
...@@ -44,3 +44,69 @@ Instead, it would require the active cooperation of a sufficiently large number ...@@ -44,3 +44,69 @@ Instead, it would require the active cooperation of a sufficiently large number
The client's trust is thus \emph{distributed} over the TSA, the publication process and the witnesses. The client's trust is thus \emph{distributed} over the TSA, the publication process and the witnesses.
\subsubsection{Quantifying distributed trust} \subsubsection{Quantifying distributed trust}
Let us now introduce a mathematical model for the publication scheme outlined in the previous section.
Say the TSA publishes its time-stamps to $N$ witnesses.
It should be emphasized that a witness is required to keep a record of time-stamps.
Going back to our example of time-stamps published in a newspaper, $N$ does \emph{not} correspond to the number of copies printed.
Instead, $N$ refers to the number of places that keep archives of the newspaper.
We assume that there exist a number $E$ of malicious witnesses that collude together with the TSA in an attempt to backdate time-stamps.
Finally, a client consults a number $n$ of witnesses to verify a time-stamp.
The client only accepts the time-stamp if all $n$ selected witnesses confirm its existence at the given time.
Let $e$ be the number of maliciously colluding witnesses selected by the client.
Evidently, a successful backdating attack occurs when the client selects only colluding witnesses, so when $e=n$.
Let us now further assume that the client selects its $n$ witnesses from the total number of witnesses $N$ completely at random.
Our problem is now equivalent to the urn problem when ``drawing without replacement''.
$e$ thus follows the hypergeometric distribution. (cite Forbes2010Statistical pp. 117-119)
\begin{equation}
\left. P(e=k)=\binom{E}{k}\binom{N-E}{n-k} \middle/ \binom{N}{n}\right.
\end{equation}
The probability of a successful backdating attack is then given by the equation:
\begin{equation}
\left. P(e=n)=\binom{E}{n} \middle/ \binom{N}{n}\right.
\end{equation}
In practice, the selection of witnesses may not be truly random.
Sticking to our example of newspaper archives, a client will likely prefer libraries which are geographically close to them.
A network protocol for distributed trust may also favor witnesses with small round-trip times in order to increase performance.
An attacker may be able to leverage this by placing colluding witnesses at favorable locations.
We can model this by introducing a weight parameter $\omega$, where a malicious witness is $\omega$ times more likely to be selected than an honest witness.
$e$ then follows Fisher's noncentral hypergeomtric distribution. (cite Fog2008Sampling)
\begin{align}
e_{\mathrm{min}}&=\max(0, n+E-N)\\
e_{\mathrm{max}}&=\min(n, E)\\
P(e=k)&=\left. \binom{E}{k}\binom{N-E}{n-k}\omega^k \middle/ \sum_{k'=e_{\mathrm{min}}}^{e_{\mathrm{max}}} \binom{E}{k'}\binom{N-E}{n-k'}\omega^{k'} \right.
\end{align}
With the probability of a successful backdating attack being:
\begin{equation}
P(e=n)=\left. \binom{E}{n}\omega^n \middle/ \sum_{k'=e_{\mathrm{min}}}^{e_{\mathrm{max}}} \binom{E}{k'}\binom{N-E}{n-k'}\omega^{k'} \right.
\end{equation}
Note that these equations are equivalent to the hypergeomtric distribution when $\omega=1$.
This is the optimal case, limiting the probability of a successful backdating attack as much as possible.
$\omega$ approaches infinity if the attacker can ensure that the client will only select malicious witnesses.
In this case, the probability of a successful backdating attack approaches 1.
\begin{equation}
\lim_{\omega\rightarrow \infty} P(e=n)=1
\end{equation}
This is, of course, the worst possible case for security.
TODO: Add lots of graphs for the probability distributions in this section.
TODO: The other side of trust is that Alice needs to trust service availability.
Can be solved by employing multiple TSAs.
Quickly explain this.
...@@ -27,6 +27,7 @@ ...@@ -27,6 +27,7 @@
% UTILITY PACKAGES % UTILITY PACKAGES
\usepackage{cite} \usepackage{cite}
\usepackage{comment} % enables block comments via \begin{comment} ... \end{comment} environment \usepackage{comment} % enables block comments via \begin{comment} ... \end{comment} environment
\usepackage{amsmath} % for all the good maths stuff like the align environment
\usepackage{amsthm} % for definitions, lemmas, etc. - also for defining your own stuff, eg below: \usepackage{amsthm} % for definitions, lemmas, etc. - also for defining your own stuff, eg below:
%\theoremstyle{definition} % defines a new theorem called definition %\theoremstyle{definition} % defines a new theorem called definition
%\newtheorem{definition}{Definition}[section] % definition setup and call %\newtheorem{definition}{Definition}[section] % definition setup and call
......
No preview for this file type
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment