Zero-Knowledge Middleboxes

被引:0
|
作者
Grubbs, Paul [1 ,2 ]
Arun, Arasu [1 ]
Zhang, Ye [1 ]
Bonneau, Joseph [1 ]
Walfish, Michael [1 ]
机构
[1] NYU, Dept Comp Sci, Courant Inst, New York, NY 10003 USA
[2] Univ Michigan, Ann Arbor, MI 48109 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper initiates research on zero-knowledge middleboxes (ZKMBs). A ZKMB is a network middlebox that enforces network usage policies on encrypted traffic. Clients send the middlebox zero-knowledge proofs that their traffic is policy-compliant; these proofs reveal nothing about the client's communication except that it complies with the policy. We show how to make ZKMBs work with unmodified encrypted-communication protocols (specifically TLS 1.3), making ZKMBs invisible to servers. As a contribution of independent interest, we design optimized zero-knowledge proofs for TLS 1.3 session keys. We apply the ZKMB paradigm to several case studies. Experimental results suggest that in certain settings, performance is in striking distance of practicality; an example is a middlebox that filters domain queries (each query requiring a separate proof) when the client has a long-lived TLS connection with a DNS resolver. In such configurations, the middlebox's overhead is 2-5 ms of running time per proof, and client latency to create a proof is several seconds. On the other hand, clients may have to store hundreds of MBs depending on the underlying zero-knowledge proof machinery, and for some applications, latency is tens of seconds.
引用
收藏
页码:4255 / 4272
页数:18
相关论文
共 50 条
  • [1] Improved Zero-Knowledge Identification with Improved Zero-Knowledge Identification with Lattices
    Cayrel, Pierre-Louis
    Lindner, Richard
    Rueckert, Markus
    Silva, Rosemberg
    [J]. PROVABLE SECURITY, 2010, 6402 : 1 - +
  • [2] Statistical zero-knowledge and analysis of rank-metric zero-knowledge proofs of knowledge
    Song, Yongcheng
    Zhang, Jiang
    Huang, Xinyi
    Wu, Wei
    Yang, Haining
    [J]. THEORETICAL COMPUTER SCIENCE, 2023, 952
  • [3] ZERO-KNOWLEDGE PROOFS
    MCGEOCH, CC
    [J]. AMERICAN MATHEMATICAL MONTHLY, 1993, 100 (07): : 682 - 685
  • [4] Concurrent zero-knowledge
    Dwork, C
    Naor, M
    Sahai, A
    [J]. JOURNAL OF THE ACM, 2004, 51 (06) : 851 - 898
  • [5] Reduction zero-knowledge
    Zhao, YL
    Deng, XT
    Lee, CH
    Zhu, H
    [J]. PROGRESS IN NATURAL SCIENCE-MATERIALS INTERNATIONAL, 2004, 14 (04) : 350 - 358
  • [6] Zero-Knowledge in EasyCrypt
    Firsov, Denis
    Unruh, Dominique
    [J]. 2023 IEEE 36TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF, 2023, : 1 - 16
  • [7] Reduction zero-knowledge
    Deng, XT
    Lee, CH
    Zhao, YL
    Zhu, H
    [J]. SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 303 - 317
  • [8] ZERO-KNOWLEDGE PROOFS
    WAYNER, P
    [J]. BYTE, 1987, 12 (11): : 149 - 152
  • [9] Zero-Knowledge Traders
    Carrella, Ernesto
    [J]. JASSS-THE JOURNAL OF ARTIFICIAL SOCIETIES AND SOCIAL SIMULATION, 2014, 17 (03): : 05
  • [10] Subquadratic zero-knowledge
    Boyar, J
    Brassard, G
    Peralta, R
    [J]. JOURNAL OF THE ACM, 1995, 42 (06) : 1169 - 1193