Paper 2018/003
How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior
Moni Naor, Benny Pinkas, and Eyal Ronen
Abstract
Bad choices of passwords were and are a pervasive problem. Users choosing weak passwords do not only compromise themselves, but the whole ecosystem. E.g, common and default passwords in IoT devices were exploited by hackers to create botnets and mount severe attacks on large Internet services, such as the Mirai botnet DDoS attack. We present a method to help protect the Internet from such large scale attacks. Our method enables a server to identify popular passwords (heavy hitters), and publish a list of over-popular passwords that must be avoided. This filter ensures that no single password can be used to compromise a large percentage of the users. The list is dynamic and can be changed as new users are added or when current users change their passwords. We apply maliciously secure two-party computation and differential privacy to protect the users' password privacy. Our solution does not require extra hardware or cost, and is transparent to the user. Our private heavy hitters construction is secure even against a malicious coalition of devices which tries to manipulate the protocol to hide the popularity of some password that the attacker is exploiting. It also ensures differential privacy under continual observation of the blacklist as it changes over time. As a reality check we conducted three tests: computed the guarantees that the system provides wrt a few publicly available databases, ran full simulations on those databases, and implemented and analyzed a proof-of-concept on an IoT device. Our construction can also be used in other settings to privately learn heavy hitters in the presence of an active malicious adversary. E.g., learning the most popular sites accessed by the Tor network.
Metadata
- Available format(s)
- Publication info
- Published elsewhere. ACM CCS 2019
- DOI
- 10.1145/3319535.3363204
- Keywords
- differential privacyheavy hitterspasswordssecure computationmalicious model.
- Contact author(s)
- er @ eyalro net
- History
- 2019-09-19: last of 3 revisions
- 2018-01-02: received
- See all versions
- Short URL
- https://ia.cr/2018/003
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2018/003, author = {Moni Naor and Benny Pinkas and Eyal Ronen}, title = {How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior}, howpublished = {Cryptology {ePrint} Archive, Paper 2018/003}, year = {2018}, doi = {10.1145/3319535.3363204}, url = {https://eprint.iacr.org/2018/003} }