Non-Interactive Anonymous Router

被引:7
|
作者
Shi, Elaine [1 ]
Wu, Ke [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
基金
美国国家科学基金会;
关键词
FUNCTIONAL ENCRYPTION; PRIVACY;
D O I
10.1007/978-3-030-77883-5_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anonymous routing is one of the most fundamental online privacy problems and has been studied extensively for decades. Almost all known approaches for anonymous routing (e.g., mix-nets, DC-nets, and others) rely on multiple servers or routers to engage in some interactive protocol; and anonymity is guaranteed in the threshold model, i.e., if one or more of the servers/routers behave honestly. Departing from all prior approaches, we propose a novel non-interactive abstraction called a Non-Interactive Anonymous Router (NIAR), which works even with a single untrusted router. In a NIAR scheme, suppose that n senders each want to talk to a distinct receiver. A one-time trusted setup is performed such that each sender obtains a sending key, each receiver obtains a receiving key, and the router receives a token that "encrypts" the permutation mapping the senders to receivers. In every time step, each sender can encrypt its message using its sender key, and the router can use its token to convert the n ciphertexts received from the senders to n transformed ciphertexts. Each transformed ciphertext is delivered to the corresponding receiver, and the receiver can decrypt the message using its receiver key. Imprecisely speaking, security requires that the untrusted router, even when colluding with a subset of corrupt senders and/or receivers, should not be able to compromise the privacy of honest parties, including who is talking to who, and the message contents. We show how to construct a communication-efficient NIAR scheme with provable security guarantees based on the standard Decision Linear assumption in suitable bilinear groups. We show that a compelling application of NIAR is to realize a Non-Interactive Anonymous Shuffler (NIAS), where an untrusted server or data analyst can only decrypt a permuted version of the messages coming from n senders where the permutation is hidden. NIAS can be adopted to construct privacy-preserving surveys, differentially private protocols in the shuffle model, and pseudonymous bulletin boards. Besides this main result, we also describe a variant that achieves fault tolerance when a subset of the senders may crash. Finally, we further explore a paranoid notion of security called full insider protection, and show that if we additionally assume sub-exponentially secure Indistin-guishability Obfuscation and as sub-exponentially secure one-way functions, one can construct a NIAR scheme with paranoid security.
引用
收藏
页码:489 / 520
页数:32
相关论文
共 50 条
  • [1] Non-Interactive Anonymous Router with Quasi-Linear Router Computation
    Fernando, Rex
    Shi, Elaine
    Soni, Pratik
    Vanjani, Nikhil
    Waters, Brent
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2023, PT III, 2023, 14371 : 62 - 92
  • [2] Efficient Non-interactive Anonymous Communication
    Eskeland, Sigurd
    Boudko, Svetlana
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP SEC 2023, 2024, 679 : 102 - 116
  • [3] Non-Interactive Anonymous Credential Based on Structure-Preserving Signature
    Zhou, Fucai
    Lin, Muqing
    Chen, Chen
    [J]. IETE JOURNAL OF RESEARCH, 2015, 61 (05) : 552 - 561
  • [4] An efficient non-interactive deniable authentication protocol with anonymous sender protection
    Hwang, Shin-Jia
    Chao, Chien-Hung
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2010, 13 (03): : 219 - 231
  • [5] Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials
    Derler, David
    Hanser, Christian
    Slamanig, Daniel
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 49 - 65
  • [6] Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks
    Ibrahim, Maged Hamada
    Kumari, Saru
    Das, Ashok Kumar
    Odelu, Vanga
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5563 - 5580
  • [7] Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs
    Anada, Hiroaki
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP 2019), 2019, : 25 - 32
  • [8] MAXIMUM AND MINIMUM BETWEEN FUZZY SYMBOLS IN NON-INTERACTIVE AND WEAKLY NON-INTERACTIVE SITUATIONS
    AMBROSIO, R
    MARTINI, GB
    [J]. FUZZY SETS AND SYSTEMS, 1984, 12 (01) : 27 - 35
  • [9] Non-interactive Confirmer Signatures
    Chow, Sherman S. M.
    Haralambiev, Kristiyan
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 49 - +
  • [10] Non-interactive proofs of proximity
    Gur, Tom
    Rothblum, Ron D.
    [J]. COMPUTATIONAL COMPLEXITY, 2018, 27 (01) : 99 - 207