mgr Parisa Hassanizadeh |
|
Prace konferencyjne
1. | Dziembowski S.♦, Ebrahimi S.♦, Hassanizadeh P., VIMz: Private Proofs of Image Manipulation using Folding-based zkSNARKs, PETS 2025, 2025-07-14/07-19, Waszyngton (US), pp.1-19, 2025 Słowa kluczowe: zkSNARKs, Proof of Provenance, C2PA, Folding Schemes Afiliacje autorów:
| ||||||||||
2. | Ebrahimi S.♦, Hassanizadeh P., From Interaction to Independence: zkSNARKs for Transparent and Non-Interactive Remote Attestation, NDSS, Network and Distributed System Security (NDSS) Symposium 2024, 2024-02-26/03-01, San Diego (US), DOI: 10.14722/ndss.2024.24815, pp.1-18, 2024 Streszczenie: Remote attestation (RA) protocols have been widely used to evaluate the integrity of software on remote devices. Currently, the state-of-the-art RA protocols lack a crucial fea- ture: transparency. This means that the details of the final attestation verification are not openly accessible or verifiable by the public. Furthermore, the interactivity of these protocols often limits attestation to trusted parties who possess privileged access to confidential device data, such as pre-shared keys and initial measurements. These constraints impede the widespread adoption of these protocols in various applications. In this paper, we introduce zRA, a non-interactive, transpar- ent, and publicly provable RA protocol based on zkSNARKs. zRA enables verification of device attestations without the need for pre-shared keys or access to confidential data, ensuring a trustless and open attestation process. This eliminates the reliance on online services or secure storage on the verifier side. Moreover, zRA does not impose any additional security assumptions beyond the fundamental cryptographic schemes and the essential trust anchor components on the prover side (i.e., ROM and MPU). The zero-knowledge attestation proofs generated by devices have constant size regardless of the network complexity and number of attestations. Moreover, these proofs do not reveal sensitive information regarding internal states of the device, allowing ver- ification by anyone in a public and auditable manner. We conduct an extensive security analysis and demonstrate scalability of zRA compared to prior work. Our analysis suggests that zRA excels especially in peer-to-peer and Pub/Sub network structures. To validate the practicality, we implement an open-source prototype of zRA using the Circom language. We show that zRA can be securely deployed on public permissionless blockchains, serving as an archival platform for attestation data to achieve resilience against DoS attacks. Afiliacje autorów:
|