[Resource Topic] 2022/1774: PECO: methods to enhance the privacy of DECO protocol

Welcome to the resource topic for 2022/1774

Title:
PECO: methods to enhance the privacy of DECO protocol

Authors: Manuel B. Santos

Abstract:

The DECentralized Oracle (DECO) protocol enables the verifiable provenance of data from Transport Layer Security (TLS) connections through secure two-party computation and zero-knowledge proofs. In this paper, we present PECO, an extension of DECO that enhances privacy features through the integration of two new private three-party handshake protocols (P3P-HS). PECO allows any web user to prove to a verifier the properties of data from TLS connections without disclosing the identity of the servers. Like DECO’s three-party handshake protocol, PECO’s P3P-HS methods do not require any changes on the server side. PECO offers two options: one that provides $k-$anonymity for the server’s identity, and another that completely masks the server’s identity from the verifier. PECO is based on three main protocols: (a) commit-and-proof zero-knowledge proofs (CP-ZKP) that enable the proof of relations under committed values in zero-knowledge, (b) verification of Elliptic Curve Digital Signature Algorithm (ECDSA) signatures under a committed public key without revealing the key (zkAttest), and (c) a proof of membership to verify that a committed key belongs to a set of keys. We estimate the performance of both P3P-HS protocols and compare it to TLS timeout using state-of-the-art implementations.

ePrint: https://eprint.iacr.org/2022/1774

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .