Self-adaptive Topology-hiding Broadcast based on CRT

被引:0
|
作者
Mi Bo [1 ]
Wei Tiancheng [1 ]
Huang Darong [1 ]
Li Yang [1 ]
机构
[1] Chongqing Jiaotong Univ, Coll Informat Sci & Engn, Chongqing 400074, Peoples R China
关键词
CRT; Topology-Hiding Protection; ideal;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the course of network communication, the exposure of network topology may seriously result in leaking sensitive information to attackers, saying social relationships or financial flows. Howbeit, balancing the functionality of routing between topology concealment is never a trivial task in consideration of efficiency, robustness, and scalability. Though a certain of topological-hiding protocols have emerged in recent years, they are faulty with third-party dependence and high latency. This paper focuses on devising a broadcast protocol exploiting the structure of ideal. We also implemented it utilizing the Chinese Remainder Theorem (CRT) and compared it with previous schemes. It is proved that our protocol is unconditionally secure under the game-based definition of topology hiding and capable of broadcasting the information with few iterations. Besides, the simulation also demonstrates its preferable computation/communication overhead in contrast with existing protocols, not to mention that any third-party would be unnecessary.
引用
收藏
页码:1043 / 1047
页数:5
相关论文
共 50 条
  • [1] Topology-Hiding Broadcast Based on NTRUEncrypt
    Mi, Bo
    Liu, Dongyan
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (01): : 431 - 443
  • [2] Topology-Hiding Computation
    Moran, Tal
    Orlov, Ilan
    Richelson, Silas
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2015), PT I, 2015, 9014 : 159 - 181
  • [3] Unconditional Secure Topology-hiding Broadcast Via Shamir's Secret Sharing
    Bo Mi
    Wu, Bingqing
    Kuang, Fengtian
    Huang darong
    Wu, Shijie
    Lin, Mengting
    [J]. PROCEEDINGS OF 2020 IEEE 9TH DATA DRIVEN CONTROL AND LEARNING SYSTEMS CONFERENCE (DDCLS'20), 2020, : 679 - 683
  • [4] Topology-Hiding Computation on All Graphs
    Akavia, Adi
    LaVigne, Rio
    Moran, Tal
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 : 447 - 467
  • [5] Topology-Hiding Computation on All Graphs
    Akavia, Adi
    LaVigne, Rio
    Moran, Tal
    [J]. JOURNAL OF CRYPTOLOGY, 2020, 33 (01) : 176 - 227
  • [6] Exploring the Boundaries of Topology-Hiding Computation
    Ball, Marshall
    Boyle, Elette
    Malkin, Tal
    Moran, Tal
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 : 294 - 325
  • [7] Topology-Hiding Computation on All Graphs
    Adi Akavia
    Rio LaVigne
    Tal Moran
    [J]. Journal of Cryptology, 2020, 33 : 176 - 227
  • [8] Towards Practical Topology-Hiding Computation
    Li, Shuaishuai
    [J]. ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT I, 2022, 13791 : 588 - 617
  • [9] Topology-Hiding Communication from Minimal Assumptions
    Marshall Ball
    Elette Boyle
    Ran Cohen
    Lisa Kohl
    Tal Malkin
    Pierre Meyer
    Tal Moran
    [J]. Journal of Cryptology, 2023, 36
  • [10] Topology-Hiding Computation Beyond Logarithmic Diameter
    Akavia, Adi
    Moran, Tal
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III, 2017, 10212 : 609 - 637