-
Privacy-preserving record linkage using local sensitive hash and private set intersection
Authors:
Allon Adir,
Ehud Aharoni,
Nir Drucker,
Eyal Kushnir,
Ramy Masalha,
Michael Mirkin,
Omri Soceanu
Abstract:
The amount of data stored in data repositories increases every year. This makes it challenging to link records between different datasets across companies and even internally, while adhering to privacy regulations. Address or name changes, and even different spelling used for entity data, can prevent companies from using private deduplication or record-linking solutions such as private set interse…
▽ More
The amount of data stored in data repositories increases every year. This makes it challenging to link records between different datasets across companies and even internally, while adhering to privacy regulations. Address or name changes, and even different spelling used for entity data, can prevent companies from using private deduplication or record-linking solutions such as private set intersection (PSI). To this end, we propose a new and efficient privacy-preserving record linkage (PPRL) protocol that combines PSI and local sensitive hash (LSH) functions, and runs in linear time. We explain the privacy guarantees that our protocol provides and demonstrate its practicality by executing the protocol over two datasets with $2^{20}$ records each, in $11-45$ minutes, depending on network settings.
△ Less
Submitted 27 March, 2022;
originally announced March 2022.
-
Phoenix: A Formally Verified Regenerating Vault
Authors:
Uri Kirstein,
Shelly Grossman,
Michael Mirkin,
James Wilcox,
Ittay Eyal,
Mooly Sagiv
Abstract:
An attacker that gains access to a cryptocurrency user's private keys can perform any operation in her stead. Due to the decentralized nature of most cryptocurrencies, no entity can revert those operations. This is a central challenge for decentralized systems, illustrated by numerous high-profile heists. Vault contracts reduce this risk by introducing artificial delay on operations, allowing abor…
▽ More
An attacker that gains access to a cryptocurrency user's private keys can perform any operation in her stead. Due to the decentralized nature of most cryptocurrencies, no entity can revert those operations. This is a central challenge for decentralized systems, illustrated by numerous high-profile heists. Vault contracts reduce this risk by introducing artificial delay on operations, allowing abortion by the contract owner during the delay. However, the theft of a key still renders the vault unusable and puts funds at risk.
We introduce Phoenix, a novel contract architecture that allows the user to restore its security properties after key loss. Phoenix takes advantage of users' ability to store keys in easily-available but less secure storage (tier-two) as well as more secure storage that is harder to access (tier-one). Unlike previous solutions, the user can restore Phoenix security after the theft of tier-two keys and does not lose funds despite losing keys in either tier. Phoenix also introduces a mechanism to reduce the damage an attacker can cause in case of a tier-one compromise.
We formally specify Phoenix's required behavior and provide a prototype implementation of Phoenix as an Ethereum contract. Since such an implementation is highly sensitive and vulnerable to subtle bugs, we apply a formal verification tool to prove specific code properties and identify faults. We highlight a bug identified by the tool that could be exploited by an attacker to compromise Phoenix. After fixing the bug, the tool proved the low-level executable code's correctness.
△ Less
Submitted 2 June, 2021;
originally announced June 2021.
-
Nanoelectrodes for intracellular measurements of reactive oxygen and nitrogen species in single living cells
Authors:
Keke Hu,
Yan-Ling Liu,
Alexander Oleinick,
Michael Mirkin,
Wei-Hua Huang,
Christian Amatore
Abstract:
Reactive oxygen and nitrogen species (ROS and RNS) play important roles in various physiological processes (e.g., phagocytosis) and pathological conditions (e.g., cancer). The primary ROS/RNS, viz., hydrogen peroxide, peroxynitrite ion, nitric oxide, and nitrite ion, can be oxidized at different electrode potentials and therefore detected and quantified by electroanalytical techniques. Nanometer-s…
▽ More
Reactive oxygen and nitrogen species (ROS and RNS) play important roles in various physiological processes (e.g., phagocytosis) and pathological conditions (e.g., cancer). The primary ROS/RNS, viz., hydrogen peroxide, peroxynitrite ion, nitric oxide, and nitrite ion, can be oxidized at different electrode potentials and therefore detected and quantified by electroanalytical techniques. Nanometer-sized electrochemical probes are especially suitable for measuring ROS/RNS in single cells and cellular organelles. In this article, we survey recent advances in localized measurements of ROS/RNS inside single cells and discuss several methodological issues, including optimization of nanoelectrode geometry, precise positioning of an electrochemical probe inside a cell, and interpretation of electroanalytical data.
△ Less
Submitted 7 July, 2020;
originally announced July 2020.
-
BDoS: Blockchain Denial of Service
Authors:
Michael Mirkin,
Yan Ji,
Jonathan Pang,
Ariah Klages-Mundt,
Ittay Eyal,
Ari Juels
Abstract:
Proof-of-work (PoW) cryptocurrency blockchains like Bitcoin secure vast amounts of money. Their operators, called miners, expend resources to generate blocks and receive monetary rewards for their effort. Blockchains are, in principle, attractive targets for Denial-of-Service (DoS) attacks: There is fierce competition among coins, as well as potential gains from short selling. Classical DoS attack…
▽ More
Proof-of-work (PoW) cryptocurrency blockchains like Bitcoin secure vast amounts of money. Their operators, called miners, expend resources to generate blocks and receive monetary rewards for their effort. Blockchains are, in principle, attractive targets for Denial-of-Service (DoS) attacks: There is fierce competition among coins, as well as potential gains from short selling. Classical DoS attacks, however, typically target a few servers and cannot scale to systems with many nodes. There have been no successful DoS attacks to date against prominent cryptocurrencies. We present Blockchain DoS (BDoS), the first incentive-based DoS attack that targets PoW cryptocurrencies. Unlike classical DoS, BDoS targets the system's mechanism design: It exploits the reward mechanism to discourage miner participation. Previous DoS attacks against PoW blockchains require an adversary's mining power to match that of all other miners. In contrast, BDoS can cause a blockchain to grind to a halt with significantly fewer resources, e.g., 21% as of March 2020 in Bitcoin, according to our empirical study. We find that Bitcoin's vulnerability to BDoS increases rapidly as the mining industry matures and profitability drops. BDoS differs from known attacks like Selfish Mining in its aim not to increase an adversary's revenue, but to disrupt the system. Although it bears some algorithmic similarity to those attacks, it introduces a new adversarial model, goals, algorithm, and game-theoretic analysis. Beyond its direct implications for operational blockchains, BDoS introduces the novel idea that an adversary can manipulate miners' incentives by proving the existence of blocks without actually publishing them.
△ Less
Submitted 4 November, 2020; v1 submitted 16 December, 2019;
originally announced December 2019.
-
Ostraka: Secure Blockchain Scaling by Node Sharding
Authors:
Alex Manuskin,
Michael Mirkin,
Ittay Eyal
Abstract:
Cryptocurrencies, implemented with blockchain protocols, promise to become a global payment system if they can overcome performance limitations. Rapidly advancing architectures improve on latency and throughput, but most require all participating servers to process all transactions. Several recent works propose to shard the system, such that each machine would only process a subset of the transact…
▽ More
Cryptocurrencies, implemented with blockchain protocols, promise to become a global payment system if they can overcome performance limitations. Rapidly advancing architectures improve on latency and throughput, but most require all participating servers to process all transactions. Several recent works propose to shard the system, such that each machine would only process a subset of the transactions. However, we identify a denial-of-service attack that is exposed by these solutions - an attacker can generate transactions that would overload a single shard, thus delaying processing in the entire system. Moreover, we show that in common scenarios, these protocols require most node operators to process almost all blockchain transactions. We present Ostraka, a blockchain node architecture that shards (parallelizes) the nodes themselves. We prove that replacing a unified node with an Ostraka node does not affect the security of the underlying consensus mechanism. We evaluate analytically and experimentally block propagation and processing in various settings. Ostraka allows nodes in the network to scale, without costly coordination. In our experiments, Ostraka nodes' transaction processing rate grows linearly with the addition of resources.
△ Less
Submitted 16 September, 2020; v1 submitted 7 July, 2019;
originally announced July 2019.