{"id":1127607,"date":"2025-02-07T07:44:45","date_gmt":"2025-02-07T15:44:45","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-video&p=1127607"},"modified":"2025-02-07T08:10:55","modified_gmt":"2025-02-07T16:10:55","slug":"attestations-over-tls-1-3-and-zkp","status":"publish","type":"msr-video","link":"https:\/\/www.microsoft.com\/en-us\/research\/video\/attestations-over-tls-1-3-and-zkp\/","title":{"rendered":"Attestations over TLS 1.3 and ZKP"},"content":{"rendered":"
The Transport Layer Security (TLS) protocol is fundamental for securing data transmission over the Internet, providing encrypted and authenticated channels that protect users’ data. However, certain scenarios require not only secure transmission but also the ability to prove specific properties about transmitted data without revealing any other detail. For instance, a user might need to prove they are over 18 to access a service, but traditional methods often compromise privacy by exposing sensitive information, such as the user’s exact birth date. Zero-knowledge proofs (ZKPs) present a promising solution, enabling users to prove statements about their data without disclosing the underlying details, thus ensuring both privacy and trust.<\/p>\n
In this talk, we introduce DiStefano, a protocol designed to enhance privacy over TLS 1.3. DiStefano leverages AES-GCM, the primary encryption algorithm used in TLS, and incorporates ZKPs to maintain privacy. This approach enables users to prove specific properties about TLS-encrypted data efficiently, even in high-latency environments.<\/p>\n
We will present the design of the DiStefano protocol, discuss its potential applications for the web, and explore future work on extending ZKP capabilities to include proving properties of AES and JSON. We will also critically examine the limitations of such protocols, addressing why they are not a one-size-fits-all solution and highlighting potential risks associated with their adoption.<\/p>\n","protected":false},"excerpt":{"rendered":"
The Transport Layer Security (TLS) protocol is fundamental for securing data transmission over the Internet, providing encrypted and authenticated channels that protect users’ data. However, certain scenarios require not only secure transmission but also the ability to prove specific properties about transmitted data without revealing any other detail. For instance, a user might need to […]<\/p>\n","protected":false},"featured_media":1127616,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_hide_image_in_river":null,"footnotes":""},"research-area":[13558],"msr-video-type":[269676],"msr-locale":[268875],"msr-post-option":[269148,269142],"msr-session-type":[],"msr-impact-theme":[],"msr-pillar":[],"msr-episode":[],"msr-research-theme":[],"class_list":["post-1127607","msr-video","type-msr-video","status-publish","has-post-thumbnail","hentry","msr-research-area-security-privacy-cryptography","msr-video-type-cryptography-talk-series","msr-locale-en_us","msr-post-option-approved-for-river","msr-post-option-include-in-river"],"msr_download_urls":"","msr_external_url":"https:\/\/youtu.be\/GXf9-VgAbE0","msr_secondary_video_url":"","msr_video_file":"http:\/\/0","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/1127607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-video"}],"version-history":[{"count":3,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/1127607\/revisions"}],"predecessor-version":[{"id":1127631,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/1127607\/revisions\/1127631"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/1127616"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=1127607"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=1127607"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=1127607"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=1127607"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=1127607"},{"taxonomy":"msr-session-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-session-type?post=1127607"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=1127607"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=1127607"},{"taxonomy":"msr-episode","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-episode?post=1127607"},{"taxonomy":"msr-research-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-theme?post=1127607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}