You are looking at a specific version 20210806:075430 of this paper. See the latest version.

Paper 2021/1022

Zero-Knowledge Middleboxes

Paul Grubbs and Arasu Arun and Ye Zhang and Joseph Bonneau and Michael Walfish

Abstract

This paper initiates research on zero-knowledge middleboxes (ZKMBs). A ZKMB is a network middlebox that enforces network usage policies on encrypted traffic. Clients send the middlebox zero-knowledge proofs that their traffic is policy-compliant; these proofs reveal nothing about the client’s communication except that it complies with the policy. We show how to make ZKMBs work with unmodified encrypted-communication protocols (specifically TLS 1.3), making ZKMBs invisible to servers. As a contribution of independent interest, we design zero-knowledge proofs for TLS 1.3 session keys. We apply the ZKMB paradigm to several case studies, including filtering for encrypted DNS protocols. Experimental results suggest that performance, while not yet practical, is promising. The middlebox’s overhead is only 2–5ms of running time per verified proof. Clients must store hundreds of MBs to participate in the protocol, and added latency ranges from tens of seconds (to set up a connection) to several seconds (for each successive packet requiring proof). Our optimized TLS 1.3 proofs improve the client’s costs 6× over an unoptimized baseline.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Preprint. MINOR revision.
Keywords
zero knowledgenetwork protocolsprivacyprobabilistic proofsapplicationsmiddleboxesTLS
Contact author(s)
paulgrubbs12 @ gmail com
History
2022-05-06: last of 4 revisions
2021-08-06: received
See all versions
Short URL
https://ia.cr/2021/1022
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.