Skip to main content

2024 | OriginalPaper | Buchkapitel

Efficient Non-interactive Anonymous Communication

verfasst von : Sigurd Eskeland, Svetlana Boudko

Erschienen in: ICT Systems Security and Privacy Protection

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Methods for untraceable and anonymous communication, such as anonymous routing networks and dining cryptographers networks, are in general very complex and suffer from high performance overhead of a minimum order of \(N^2\) encryptions for N participants. In this paper, we propose an original approach to untraceable communication that avoids some of the significant shortcomings of existing methods. Using non-interactive privacy-preserving aggregation as an underlying building block we achieve attractive features, including unsurpassed low computational and transmission overhead of only 3 encryptions per participant in only a single round.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Bauer, J., Staudemeyer, R.: From dining cryptographers to dining things: unobservable communication in the IoT, pp. 1–7 (2017) Bauer, J., Staudemeyer, R.: From dining cryptographers to dining things: unobservable communication in the IoT, pp. 1–7 (2017)
2.
Zurück zum Zitat Benhamouda, F., Joye, M., Libert, B.: A new framework for privacy-preserving aggregation of time-series data. ACM Trans. Inf. Syst. Secur. 18(3), 1–21 (2016)CrossRef Benhamouda, F., Joye, M., Libert, B.: A new framework for privacy-preserving aggregation of time-series data. ACM Trans. Inf. Syst. Secur. 18(3), 1–21 (2016)CrossRef
3.
Zurück zum Zitat Borges, F., Demirel, D., Böck, L., Buchmann, J., Mühlhäuser, M.: A privacy-enhancing protocol that provides in-network data aggregation and verifiable smart meter billing. In: 2014 IEEE Symposium on Computers and Communications (ISCC), pp. 1–6 (2014) Borges, F., Demirel, D., Böck, L., Buchmann, J., Mühlhäuser, M.: A privacy-enhancing protocol that provides in-network data aggregation and verifiable smart meter billing. In: 2014 IEEE Symposium on Computers and Communications (ISCC), pp. 1–6 (2014)
4.
Zurück zum Zitat Borges, F., Mühlhäuser, M.: EPPP4SMS: Efficient privacy-preserving protocol for smart metering systems and its simulation using real-world data. IEEE Trans. Smart Grid 5(6), 2701–2708 (2014)CrossRef Borges, F., Mühlhäuser, M.: EPPP4SMS: Efficient privacy-preserving protocol for smart metering systems and its simulation using real-world data. IEEE Trans. Smart Grid 5(6), 2701–2708 (2014)CrossRef
5.
Zurück zum Zitat Bos, J.: Practical privacy. J.N.E. Bos [Leiden] (1992) Bos, J.: Practical privacy. J.N.E. Bos [Leiden] (1992)
7.
Zurück zum Zitat Brickell, J., Shmatikov, V.: Efficient anonymity-preserving data collection. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2006, pp. 76–85. Association for Computing Machinery, New York (2006) Brickell, J., Shmatikov, V.: Efficient anonymity-preserving data collection. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2006, pp. 76–85. Association for Computing Machinery, New York (2006)
8.
Zurück zum Zitat Busom, N., Petrlic, R., Sebe, F., Sorge, C., Valls, M.: Efficient smart metering based on homomorphic encryption. Comput. Commun. 82, 95–101 (2016)CrossRef Busom, N., Petrlic, R., Sebe, F., Sorge, C., Valls, M.: Efficient smart metering based on homomorphic encryption. Comput. Commun. 82, 95–101 (2016)CrossRef
9.
Zurück zum Zitat Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. J. Cryptol. 1, 65–75 (1988)MathSciNetCrossRef Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. J. Cryptol. 1, 65–75 (1988)MathSciNetCrossRef
10.
Zurück zum Zitat Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)CrossRef Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)CrossRef
11.
Zurück zum Zitat Corrigan-Gibbs, H., Ford, B.: Dissent: accountable anonymous group messaging. In: Proceedings of the 17th ACM Conference on Computer and Communications Security Security, CCS 2010, pp. 340–350. Association for Computing Machinery, New York (2010) Corrigan-Gibbs, H., Ford, B.: Dissent: accountable anonymous group messaging. In: Proceedings of the 17th ACM Conference on Computer and Communications Security Security, CCS 2010, pp. 340–350. Association for Computing Machinery, New York (2010)
12.
Zurück zum Zitat Corrigan-Gibbs, H., Wolinsky, D.I., Ford, B.: Proactively accountable anonymous messaging in verdict. In: 22nd USENIX Security Symposium (USENIX Security 2013), pp. 147–162. USENIX Association, Washington (2013) Corrigan-Gibbs, H., Wolinsky, D.I., Ford, B.: Proactively accountable anonymous messaging in verdict. In: 22nd USENIX Security Symposium (USENIX Security 2013), pp. 147–162. USENIX Association, Washington (2013)
13.
Zurück zum Zitat Emura, K., Kimura, H., Ohigashi, T., Suzuki, T.: Privacy-preserving aggregation of time-series data with public verifiability from simple assumptions and its implementations. Comput. J. 62, 614–630 (2019)MathSciNetCrossRef Emura, K., Kimura, H., Ohigashi, T., Suzuki, T.: Privacy-preserving aggregation of time-series data with public verifiability from simple assumptions and its implementations. Comput. J. 62, 614–630 (2019)MathSciNetCrossRef
15.
Zurück zum Zitat Franck, C., van de Graaf, J.: Dining cryptographers are practical. arXiv Cryptography and Security (2014) Franck, C., van de Graaf, J.: Dining cryptographers are practical. arXiv Cryptography and Security (2014)
17.
Zurück zum Zitat Goldschlag, D., Reed, M., Syverson, P.: Onion routing. Commun. ACM 42(2), 39–41 (1999)CrossRef Goldschlag, D., Reed, M., Syverson, P.: Onion routing. Commun. ACM 42(2), 39–41 (1999)CrossRef
22.
Zurück zum Zitat Li, F., Luo, B., Liu, P.: Secure information aggregation for smart grids using homomorphic encryption. In: 2010 First IEEE International Conference on Smart Grid Communications, pp. 327–332 (2010) Li, F., Luo, B., Liu, P.: Secure information aggregation for smart grids using homomorphic encryption. In: 2010 First IEEE International Conference on Smart Grid Communications, pp. 327–332 (2010)
23.
Zurück zum Zitat Nosouhi, M., Yu, S., Sood, K., Grobler, M.: HSDC-net: secure anonymous messaging in online social networks, pp. 350–357 (2019) Nosouhi, M., Yu, S., Sood, K., Grobler, M.: HSDC-net: secure anonymous messaging in online social networks, pp. 350–357 (2019)
24.
Zurück zum Zitat Reiter, M.K., Rubin, A.D.: Crowds: anonymity for web transactions. ACM Trans. Inf. Syst. Secur. 1(1), 66–92 (1998)CrossRef Reiter, M.K., Rubin, A.D.: Crowds: anonymity for web transactions. ACM Trans. Inf. Syst. Secur. 1(1), 66–92 (1998)CrossRef
25.
Zurück zum Zitat Shi, E., Hubert Chan, T.-H., Rieffel, E.G., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. In: NDSS, vol. 2 (2011) Shi, E., Hubert Chan, T.-H., Rieffel, E.G., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. In: NDSS, vol. 2 (2011)
26.
Zurück zum Zitat Shirazi, F., Simeonovski, M., Asghar, M.R., Backes, M., Díaz, C.: A survey on routing in anonymous communication protocols. ACM Comput. Surv. 51(3), 51:1–51:39 (2018) Shirazi, F., Simeonovski, M., Asghar, M.R., Backes, M., Díaz, C.: A survey on routing in anonymous communication protocols. ACM Comput. Surv. 51(3), 51:1–51:39 (2018)
28.
Zurück zum Zitat Waidner, M., Pfitzmann, B.: The dining cryptographers in the disco: unconditional sender and recipient untraceability with computationally secure serviceability. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, p. 690. Springer, Heidelberg (1990). https://doi.org/10.1007/3-540-46885-4_69CrossRef Waidner, M., Pfitzmann, B.: The dining cryptographers in the disco: unconditional sender and recipient untraceability with computationally secure serviceability. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, p. 690. Springer, Heidelberg (1990). https://​doi.​org/​10.​1007/​3-540-46885-4_​69CrossRef
29.
Zurück zum Zitat Yang, Z., Zhong, S., Wright, R.N.: Anonymity-preserving data collection. In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, KDD 2005, pp. 334–343. Association for Computing Machinery, New York (2005) Yang, Z., Zhong, S., Wright, R.N.: Anonymity-preserving data collection. In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, KDD 2005, pp. 334–343. Association for Computing Machinery, New York (2005)
30.
Zurück zum Zitat Zhao, X., Li, L., Xue, G., Ahn, G.-J.: Efficient anonymous message submission. IEEE Trans. Dependable Secure Comput. 15(2), 217–230 (2018)CrossRef Zhao, X., Li, L., Xue, G., Ahn, G.-J.: Efficient anonymous message submission. IEEE Trans. Dependable Secure Comput. 15(2), 217–230 (2018)CrossRef
Metadaten
Titel
Efficient Non-interactive Anonymous Communication
verfasst von
Sigurd Eskeland
Svetlana Boudko
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-56326-3_8

Premium Partner