You are looking at a specific version 20180218:073046 of this paper. See the latest version.

Paper 2018/003

How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior

Moni Naor and Benny Pinkas and Eyal Ronen

Abstract

Bad choices of passwords were and are a pervasive problem. Most password alternatives (such as two-factor authentication) may increase cost and arguably hurt the usability of the system. This is of special significance for low cost IoT devices. Users choosing weak passwords do not only compromise themselves, but the whole ecosystem. For example, common and default passwords in IoT devices were exploited by hackers to create botnets and mount severe attacks on large Internet services, such as the Mirai botnet DDoS attack. We present a method to help protect the Internet from such large scale attacks. We enable a server to identify popular passwords (heavy hitters), and publish a list of over-popular passwords that must be avoided. This filter ensures that no single password can be used to comprise a large percentage of the users. The list is dynamic and can be changed as new users are added or when current users change their passwords. We apply maliciously secure two-party computation and differential privacy to protect the users' password privacy. Our solution does not require extra hardware or cost, and is transparent to the user. Our private heavy hitters construction is secure even against a malicious coalition of devices which tries to manipulate the protocol in order to hide the popularity of some password that the attacker is exploiting. Moreover it ensures differential privacy under continues observation of the blacklist as it changes over time. We implemented and analyze the performance of a proof-of-concept. Our construction can also be used in other settings to privately learn heavy hitters in the presence of an active malicious adversary. For example, learning the most popular sites accessed by the TOR network.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
differential privacyheavy hitterspasswordssecure computationmalicious model
Contact author(s)
ey
History
2019-09-19: last of 3 revisions
2018-01-02: received
See all versions
Short URL
https://ia.cr/2018/003
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.