Practical Accountability of Secret Processes

The US federal court system is exploring ways to improve the accountability of electronic surveillance, an opaque process often involving cases sealed from public view and tech companies subject to gag orders against informing surveilled users. One judge has proposed publicly releasing some metadata about each case on a paper cover sheet as a way to balance the competing goals of (1) secrecy, so the target of an investigation does not discover and sabotage it, and (2) accountability, to assure the public that surveillance powers are not misused or abused. Inspired by the courts’ accountability challenge, we illustrate how accountability and secrecy are simultaneously achievable when modern cryptography is brought to bear. Our system improves configurability while preserving secrecy, offering new tradeoffs potentially more palatable to the risk-averse court system. Judges, law enforcement, and companies publish commitments to surveillance actions, argue in zero-knowledge that their behavior is consistent, and compute aggregate surveillance statistics by multi-party computation (MPC). We demonstrate that these primitives perform efficiently at the scale of the federal judiciary. To do so, we implement a hierarchical form of MPC that mirrors the hierarchy of the court system. We also develop statements in succinct zero-knowledge (SNARKs) whose specificity can be tuned to calibrate the amount of information released. All told, our proposal not only offers the court system a flexible range of options for enhancing accountability in the face of necessary secrecy, but also yields a general framework for accountability in a broader class of secret information processes.

[1]  Jonathan Katz,et al.  Global-Scale Secure Multiparty Computation , 2017, CCS.

[2]  Yehuda Lindell,et al.  Optimized Honest-Majority MPC for Malicious Adversaries — Breaking the 1 Billion-Gate Per Second Barrier , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[3]  Joan Feigenbaum,et al.  Open vs. closed systems for accountability , 2014, HotSoS '14.

[4]  Siani Pearson,et al.  Toward Accountability in the Cloud , 2011, IEEE Internet Computing.

[5]  Joan Feigenbaum,et al.  Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance , 2014, FOCI.

[6]  Geoff Holmes,et al.  Security and Data Accountability in Distributed Systems: A Provenance Survey , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[7]  Marcel Keller,et al.  Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits , 2013, ESORICS.

[8]  Joshua A. Kroll Secure protocols for accountable warrant execution , 2014 .

[9]  Micah Sherr,et al.  Accountable wiretapping - or - I know they can hear you now , 2012, J. Comput. Secur..

[10]  Eli Ben-Sasson,et al.  Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture , 2014, USENIX Security Symposium.

[11]  Joan Feigenbaum,et al.  Privacy-Preserving Lawful Contact Chaining: [Preliminary Report] , 2016, WPES@CCS.

[12]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.

[13]  Daisuke Mashima,et al.  Enabling Robust Information Accountability in E-healthcare Systems , 2012, HealthSec.

[14]  Stephen W Smith,et al.  Gagged, Sealed & Delivered: Reforming ECPA's Secret Docket , 2012 .

[15]  Azer Bestavros,et al.  Secure MPC for Analytics as a Web Application , 2016, 2016 IEEE Cybersecurity Development (SecDev).

[16]  Butler W. Lampson Privacy and securityUsable security , 2009, Commun. ACM.

[17]  Yang Xiao,et al.  A survey of accountability in computer networks and distributed systems , 2016, Secur. Commun. Networks.

[18]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[19]  Stephen W Smith,et al.  Kudzu in the Courthouse: Judgments Made in the Shade , 2009 .

[20]  Eli Ben-Sasson,et al.  Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs , 2015, 2015 IEEE Symposium on Security and Privacy.

[21]  Claudio Orlandi,et al.  A Framework for Outsourcing of Secure Computation , 2014, CCSW.

[22]  Eli Ben-Sasson,et al.  Scalable Zero Knowledge Via Cycles of Elliptic Curves , 2014, Algorithmica.

[23]  Shahrukh Khan,et al.  Ensuring Distributed Accountability for Data Sharing On the Cloud , 2016 .

[24]  Seny Kamara Restructuring the NSA Metadata Program , 2014, Financial Cryptography Workshops.

[25]  Shafi Goldwasser,et al.  Public Accountability vs. Secret Laws: Can They Coexist?: A Cryptographic Proposal , 2017, WPES@CCS.

[26]  Rebecca N. Wright,et al.  Systematizing “ Accountability ” in Computer Science , 2012 .

[27]  Yuval Ishai,et al.  Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator , 2005, CRYPTO.

[28]  V. T. Kamble,et al.  Ensuring Distributed Accountability for Data Sharing in the Cloud , 2014 .

[29]  Azer Bestavros,et al.  User-centric distributed solutions for privacy-preserving analytics , 2017, Commun. ACM.