Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ewa Syta is active.

Publication


Featured researches published by Ewa Syta.


computer and communications security | 2013

Hang with your buddies to resist intersection attacks

David Isaac Wolinsky; Ewa Syta; Bryan Ford

Some anonymity schemes might in principle protect users from pervasive network surveillance--but only if all messages are independent and unlinkable. Users in practice often need pseudonymity--sending messages intentionally linkable to each other but not to the sender--but pseudonymity in dynamic networks exposes users to intersection attacks. We present Buddies, the first systematic design for intersection attack resistance in practical anonymity systems. Buddies groups users dynamically into buddy sets, controlling message transmission to make buddies within a set behaviorally indistinguishable under traffic analysis. To manage the inevitable tradeoffs between anonymity guarantees and communication responsiveness, Buddies enables users to select independent attack mitigation policies for each pseudonym. Using trace-based simulations and a working prototype, we find that Buddies can guarantee non-trivial anonymity set sizes in realistic chat/microblogging scenarios, for both short-lived and long-lived pseudonyms.


ieee symposium on security and privacy | 2017

Scalable Bias-Resistant Distributed Randomness

Ewa Syta; Philipp Jovanovic; Eleftherios Kokoris Kogias; Nicolas Gailly; Linus Gasser; Ismail Khoffi; Michael J. Fischer; Bryan Ford

Bias-resistant public randomness is a critical component in many (distributed) protocols. Generating public randomness is hard, however, because active adversaries may behave dishonestly to bias public random choices toward their advantage. Existing solutions do not scale to hundreds or thousands of participants, as is needed in many decentralized systems. We propose two large-scale distributed protocols, RandHound and RandHerd, which provide publicly-verifiable, unpredictable, and unbiasable randomness against Byzantine adversaries. RandHound relies on an untrusted client to divide a set of randomness servers into groups for scalability, and it depends on the pigeonhole principle to ensure output integrity, even for non-random, adversarial group choices. RandHerd implements an efficient, decentralized randomness beacon. RandHerd is structurally similar to a BFT protocol, but uses RandHound in a one-time setup to arrange participants into verifiably unbiased random secret-sharing groups, which then repeatedly produce random output at predefined intervals. Our prototype demonstrates that RandHound and RandHerd achieve good performance across hundreds of participants while retaining a low failure probability by properly selecting protocol parameters, such as a group size and secret-sharing threshold. For example, when sharding 512 nodes into groups of 32, our experiments show that RandHound can produce fresh random output after 240 seconds. RandHerd, after a setup phase of 260 seconds, is able to generate fresh random output in intervals of approximately 6 seconds. For this configuration, both protocols operate at a failure probability of at most 0.08% against a Byzantine adversary.


ACM Transactions on Information and System Security | 2014

Security Analysis of Accountable Anonymity in Dissent

Ewa Syta; Henry Corrigan-Gibbs; Shu-Chun Weng; David Isaac Wolinsky; Bryan Ford; Aaron Johnson

Users often wish to communicate anonymously on the Internet, for example, in group discussion or instant messaging forums. Existing solutions are vulnerable to misbehaving users, however, who may abuse their anonymity to disrupt communication. Dining Cryptographers Networks (DC-nets) leave groups vulnerable to denial-of-service and Sybil attacks; mix networks are difficult to protect against traffic analysis; and accountable voting schemes are unsuited to general anonymous messaging. dissent is the first general protocol offering provable anonymity and accountability for moderate-size groups, while efficiently handling unbalanced communication demands among users. We present an improved and hardened dissent protocol, define its precise security properties, and offer rigorous proofs of these properties. The improved protocol systematically addresses the delicate balance between provably hiding the identities of well-behaved users, while provably revealing the identities of disruptive users, a challenging task because many forms of misbehavior are inherently undetectable. The new protocol also addresses several nontrivial attacks on the original dissent protocol stemming from subtle design flaws.


international conference on security and cryptography | 2015

Private eyes: Secure remote biometric authentication

Ewa Syta; Michael J. Fischer; David Isaac Wolinsky; Abraham Silberschatz; Gina Gallegos-García; Bryan Ford

We propose an efficient remote biometric authentication protocol that gives strong protection to the users biometric data in case of two common kinds of security breaches: (1) loss or theft of the users token (smart card, handheld device, etc.), giving the attacker full access to any secrets embedded within it; (2) total penetration of the server. Only if both client and server are simultaneously compromised is the users biometric data vulnerable to exposure. The protocol works by encrypting the users biometric template in a way that allows it to be used for authentication without being decrypted by either token or server. Further, the encrypted template never leaves the token, and only the server has the information that would enable it to be decrypted. We have implemented our protocol using two iris recognition libraries and evaluated its performance. The overall efficiency and recognition performance is essentially the same compared to an unprotected biometric system.


ieee symposium on security and privacy | 2016

Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning

Ewa Syta; Iulia Tamas; Dylan Visher; David Isaac Wolinsky; Philipp Jovanovic; Linus Gasser; Nicolas Gailly; Ismail Khoffi; Bryan Ford


networked systems design and implementation | 2016

AnonRep: towards tracking-resistant anonymous reputation

Ennan Zhai; David Wolinsky; Ruichuan Chen; Ewa Syta; Chao Teng; Bryan Ford


ieee symposium on security and privacy | 2018

OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding

Eleftherios Kokoris-Kogias; Philipp Jovanovic; Linus Gasser; Nicolas Gailly; Ewa Syta; Bryan Ford


arXiv: Cryptography and Security | 2015

Decentralizing Authorities into Scalable Strongest-Link Cothorities.

Ewa Syta; Iulia Tamas; Dylan Visher; David Isaac Wolinsky; Bryan Ford


IACR Cryptology ePrint Archive | 2016

Scalable Bias-Resistant Distributed Randomness.

Ewa Syta; Philipp Jovanovic; Eleftherios Kokoris-Kogias; Nicolas Gailly; Linus Gasser; Ismail Khoffi; Michael J. Fischer; Bryan Ford


Archive | 2014

Deniable Anonymous Group Authentication

Ewa Syta; Benjamin Peterson; David Wolinsky; Michael J. Fischer; Brian Ford

Collaboration


Dive into the Ewa Syta's collaboration.

Top Co-Authors

Avatar

Bryan Ford

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Philipp Jovanovic

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar

Linus Gasser

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar

Nicolas Gailly

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Aaron Johnson

United States Naval Research Laboratory

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge