Network-Hiding Communication and Applications to Multi-party Protocols

被引:11
|
作者
Hirt, Martin [1 ]
Maurer, Ueli [1 ]
Tschudi, Daniel [1 ]
Zikas, Vassilis [2 ]
机构
[1] Swiss Fed Inst Technol, Zurich, Switzerland
[2] RPI, Troy, NY USA
基金
瑞士国家科学基金会;
关键词
UNTRACEABLE ELECTRONIC MAIL; DIGITAL PSEUDONYMS; RETURN ADDRESSES; COMPUTATION; SECURE;
D O I
10.1007/978-3-662-53008-5_12
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As distributed networks are heavily used in modern applications, new security challenges emerge. In a multi-party computation (in short, MPC) protocol over an incomplete network, such a challenge is to hide, to the extent possible, the topology of the underlying communication network. Such a topology-hiding (aka network hiding) property is in fact very relevant in applications where anonymity is needed. To our knowledge, with the exception of two recent works by Chandran et al. [ITCS 2015] and by Moran et al. [TCC 2015], existing MPC protocols do not hide the topology of the underlying communication network. Moreover, the above two solutions are either not applicable to arbitrary networks (as is [ITCS 2015]) or, as in [TCC 2015], they make non-black-box and recursive use of cryptographic primitives resulting in an unrealistic communication and computation complexity even for simple, i.e., low degree and diameter, networks. Our work suggests the first topology-hiding communication protocol for incomplete networks which makes black-box use of the underlying cryptographic assumption-in particular, a public-key encryption scheme-and tolerates any adversary who passively corrupts arbitrarily many network nodes. Our solutions are based on a new, enhanced variant of threshold homomorphic encryption, in short, TH-PKE, that requires no a-priori setup and allows to circulate an encrypted message over any (unknown) incomplete network and then decrypt it without revealing any network information to intermediate nodes. We show how to realize this enhanced TH-PKE from the DDH assumption. The black-box nature of our scheme, along with some optimization tricks that we employ, makes our communication protocol more efficient than existing solutions. We then use our communication protocol to make any semi-honest secure MPC protocol topology-hiding with a reasonable-i.e., for simple networks, polynomial with small constants-communication and computation overhead. We further show how to construct anonymous broadcast without using expensive MPCs to setup the original pseudonyms.
引用
收藏
页码:335 / 365
页数:31
相关论文
共 50 条
  • [1] Communication middleware for multi-party multimedia applications
    Ensor, JR
    Ahuja, SR
    [J]. BELL LABS TECHNICAL JOURNAL, 1997, 2 (01) : 74 - 85
  • [2] Circuits and multi-party protocols
    Grolmusz, V
    [J]. COMPUTATIONAL COMPLEXITY, 1998, 7 (01) : 1 - 18
  • [3] Circuits and multi-party protocols
    V. Grolmusz
    [J]. computational complexity, 1998, 7 : 1 - 18
  • [4] Multi-Party Private Set Intersection Protocols for Practical Applications
    Bay, Asli
    Erkin, Zeki
    Alishahi, Mina
    Vos, Jelle
    [J]. SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 515 - 522
  • [5] Optimizing multi-party agreement protocols
    Fedotov, Ivan
    Khritankov, Anton
    Barger, Artem
    [J]. 2022 4TH CONFERENCE ON BLOCKCHAIN RESEARCH & APPLICATIONS FOR INNOVATIVE NETWORKS AND SERVICES (BRAINS), 2022, : 55 - 58
  • [6] Reversible data hiding in encrypted image with secure multi-party for telemedicine applications
    Qu, Lingfeng
    Li, Mohan
    Chen, Peng
    [J]. BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2024, 93
  • [7] Sublinear communication protocols for multi-party pointer jumping and a related lower bound
    Brody, Joshua
    Chakrabarti, Amit
    [J]. STACS 2008: PROCEEDINGS OF THE 25TH INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE, 2008, : 145 - 156
  • [8] Quantum protocols for secure multi-party summation
    Ji, ZhaoXu
    Zhang, HuanGuo
    Wang, HouZhen
    Wu, FuSheng
    Jia, JianWei
    Wu, WanQing
    [J]. QUANTUM INFORMATION PROCESSING, 2019, 18 (06)
  • [9] Multi-Party Protocols, Information Complexity and Privacy
    Kerenidis, Iordanis
    Rosen, Adi
    Urrutia, Florent
    [J]. ACM TRANSACTIONS ON COMPUTATION THEORY, 2019, 11 (02)
  • [10] Adaptive Security of Multi-party Protocols, Revisited
    Hirt, Martin
    Liu-Zhang, Chen-Da
    Maurer, Ueli
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2021, PT I, 2021, 13042 : 686 - 716