Ewa Syta
Yale University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ewa Syta.
computer and communications security | 2013
David Isaac Wolinsky; Ewa Syta; Bryan Ford
Some anonymity schemes might in principle protect users from pervasive network surveillance--but only if all messages are independent and unlinkable. Users in practice often need pseudonymity--sending messages intentionally linkable to each other but not to the sender--but pseudonymity in dynamic networks exposes users to intersection attacks. We present Buddies, the first systematic design for intersection attack resistance in practical anonymity systems. Buddies groups users dynamically into buddy sets, controlling message transmission to make buddies within a set behaviorally indistinguishable under traffic analysis. To manage the inevitable tradeoffs between anonymity guarantees and communication responsiveness, Buddies enables users to select independent attack mitigation policies for each pseudonym. Using trace-based simulations and a working prototype, we find that Buddies can guarantee non-trivial anonymity set sizes in realistic chat/microblogging scenarios, for both short-lived and long-lived pseudonyms.
ieee symposium on security and privacy | 2017
Ewa Syta; Philipp Jovanovic; Eleftherios Kokoris Kogias; Nicolas Gailly; Linus Gasser; Ismail Khoffi; Michael J. Fischer; Bryan Ford
Bias-resistant public randomness is a critical component in many (distributed) protocols. Generating public randomness is hard, however, because active adversaries may behave dishonestly to bias public random choices toward their advantage. Existing solutions do not scale to hundreds or thousands of participants, as is needed in many decentralized systems. We propose two large-scale distributed protocols, RandHound and RandHerd, which provide publicly-verifiable, unpredictable, and unbiasable randomness against Byzantine adversaries. RandHound relies on an untrusted client to divide a set of randomness servers into groups for scalability, and it depends on the pigeonhole principle to ensure output integrity, even for non-random, adversarial group choices. RandHerd implements an efficient, decentralized randomness beacon. RandHerd is structurally similar to a BFT protocol, but uses RandHound in a one-time setup to arrange participants into verifiably unbiased random secret-sharing groups, which then repeatedly produce random output at predefined intervals. Our prototype demonstrates that RandHound and RandHerd achieve good performance across hundreds of participants while retaining a low failure probability by properly selecting protocol parameters, such as a group size and secret-sharing threshold. For example, when sharding 512 nodes into groups of 32, our experiments show that RandHound can produce fresh random output after 240 seconds. RandHerd, after a setup phase of 260 seconds, is able to generate fresh random output in intervals of approximately 6 seconds. For this configuration, both protocols operate at a failure probability of at most 0.08% against a Byzantine adversary.
ACM Transactions on Information and System Security | 2014
Ewa Syta; Henry Corrigan-Gibbs; Shu-Chun Weng; David Isaac Wolinsky; Bryan Ford; Aaron Johnson
Users often wish to communicate anonymously on the Internet, for example, in group discussion or instant messaging forums. Existing solutions are vulnerable to misbehaving users, however, who may abuse their anonymity to disrupt communication. Dining Cryptographers Networks (DC-nets) leave groups vulnerable to denial-of-service and Sybil attacks; mix networks are difficult to protect against traffic analysis; and accountable voting schemes are unsuited to general anonymous messaging. dissent is the first general protocol offering provable anonymity and accountability for moderate-size groups, while efficiently handling unbalanced communication demands among users. We present an improved and hardened dissent protocol, define its precise security properties, and offer rigorous proofs of these properties. The improved protocol systematically addresses the delicate balance between provably hiding the identities of well-behaved users, while provably revealing the identities of disruptive users, a challenging task because many forms of misbehavior are inherently undetectable. The new protocol also addresses several nontrivial attacks on the original dissent protocol stemming from subtle design flaws.
international conference on security and cryptography | 2015
Ewa Syta; Michael J. Fischer; David Isaac Wolinsky; Abraham Silberschatz; Gina Gallegos-García; Bryan Ford
We propose an efficient remote biometric authentication protocol that gives strong protection to the users biometric data in case of two common kinds of security breaches: (1) loss or theft of the users token (smart card, handheld device, etc.), giving the attacker full access to any secrets embedded within it; (2) total penetration of the server. Only if both client and server are simultaneously compromised is the users biometric data vulnerable to exposure. The protocol works by encrypting the users biometric template in a way that allows it to be used for authentication without being decrypted by either token or server. Further, the encrypted template never leaves the token, and only the server has the information that would enable it to be decrypted. We have implemented our protocol using two iris recognition libraries and evaluated its performance. The overall efficiency and recognition performance is essentially the same compared to an unprotected biometric system.
ieee symposium on security and privacy | 2016
Ewa Syta; Iulia Tamas; Dylan Visher; David Isaac Wolinsky; Philipp Jovanovic; Linus Gasser; Nicolas Gailly; Ismail Khoffi; Bryan Ford
networked systems design and implementation | 2016
Ennan Zhai; David Wolinsky; Ruichuan Chen; Ewa Syta; Chao Teng; Bryan Ford
ieee symposium on security and privacy | 2018
Eleftherios Kokoris-Kogias; Philipp Jovanovic; Linus Gasser; Nicolas Gailly; Ewa Syta; Bryan Ford
arXiv: Cryptography and Security | 2015
Ewa Syta; Iulia Tamas; Dylan Visher; David Isaac Wolinsky; Bryan Ford
IACR Cryptology ePrint Archive | 2016
Ewa Syta; Philipp Jovanovic; Eleftherios Kokoris-Kogias; Nicolas Gailly; Linus Gasser; Ismail Khoffi; Michael J. Fischer; Bryan Ford
Archive | 2014
Ewa Syta; Benjamin Peterson; David Wolinsky; Michael J. Fischer; Brian Ford