21 results on '"Dining cryptographers"'
Search Results
2. Formal Analysis of the Information Leakage of the DC-Nets and Crowds Anonymity Protocols
- Author
-
Américo, Arthur, Vaz, Artur, Alvim, Mário S., Campos, Sérgio V. A., McIver, Annabelle, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Cavalheiro, Simone, editor, and Fiadeiro, José, editor
- Published
- 2017
- Full Text
- View/download PDF
3. Anonymous Quantum Communication
- Author
-
Brassard, Gilles, Broadbent, Anne, Fitzsimons, Joseph, Gambs, Sébastien, Tapp, Alain, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, and Kurosawa, Kaoru, editor
- Published
- 2007
- Full Text
- View/download PDF
4. Information-Theoretic Security Without an Honest Majority
- Author
-
Broadbent, Anne, Tapp, Alain, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, and Kurosawa, Kaoru, editor
- Published
- 2007
- Full Text
- View/download PDF
5. Dining Cryptographers Revisited
- Author
-
Golle, Philippe, Juels, Ari, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Cachin, Christian, editor, and Camenisch, Jan L., editor
- Published
- 2004
- Full Text
- View/download PDF
6. PriFi: Low-Latency Anonymity for Organizational Networks
- Author
-
Italo Dacosta, Joan Feigenbaum, Ludovic Barman, Ennan Zhai, Jean-Pierre Hubaux, Mahdi Zamani, Bryan Ford, and Apostolos Pyrgelis
- Subjects
FOS: Computer and information sciences ,local-area networks ,Computer Science - Cryptography and Security ,Computer science ,dc-nets ,communications ,0211 other engineering and technologies ,02 engineering and technology ,privacy ,0202 electrical engineering, electronic engineering, information engineering ,Latency (engineering) ,General Environmental Science ,Ethics ,021110 strategic, defence & security studies ,cryptography ,anonymity ,business.industry ,Information technology ,020206 networking & telecommunications ,QA75.5-76.95 ,BJ1-1725 ,dining cryptographers ,traffic analysis ,Electronic computers. Computer science ,General Earth and Planetary Sciences ,business ,Cryptography and Security (cs.CR) ,Computer network ,Anonymity - Abstract
Organizational networks are vulnerable to traffic-analysis attacks that enable adversaries to infer sensitive information from the network traffic - even if encryption is used. Typical anonymous communication networks are tailored to the Internet and are poorly suited for organizational networks. We present PriFi, an anonymous communication protocol for LANs, which protects users against eavesdroppers and provides high-performance traffic-analysis resistance. PriFi builds on Dining Cryptographers networks but reduces the high communication latency of prior work via a new client/relay/server architecture, in which a client's packets remain on their usual network path without additional hops, and in which a set of remote servers assist the anonymization process without adding latency. PriFi also solves the challenge of equivocation attacks, which are not addressed by related works, by encrypting the traffic based on the communication history. Our evaluation shows that PriFi introduces a small latency overhead (~100ms for 100 clients) and is compatible with delay-sensitive applications such as VoIP., 25 pages
- Published
- 2020
7. Opaque Superlanguages and Sublanguages in Discrete Event Systems.
- Author
-
Ben-Kalefa, Majed and Lin, Feng
- Subjects
- *
DEBUGGING , *DATA security , *COMPUTER engineering , *DISCRETE systems , *CRYPTOGRAPHY - Abstract
In this article, we further investigate opacity of discrete event systems. In our previous work, we defined three types of opacity: strong opacity, weak opacity, and no opacity. Strong opacity can be used to study security-related problems whereas no opacity can be used to study fault detection and diagnosis problems. In this study, we investigate the properties of (strong, weak, and no) opacity. We show that opacity is often closed under union, but may not be closed under the intersection. We also investigate the largest opaque sublanguages and the smallest opaque superlanguages of a language if the language is not opaque. We derive formulas for these sublanguages and superlanguages. We then extend these results from centralized opacity to decentralized opacity, when more than one observer or controller is observing the system. Finally, we apply the results to the Dining Cryptographers Problem. We show that the protocol proposed in the literature satisfies both no opacity (the cryptographers know if the boss is paying) and strong opacity (the cryptographers do not know who is paying if the boss is not paying). We also use the formulas derived in this article to synthesize the protocol, which is much more difficult to do than verifying the protocol. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
8. What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net
- Author
-
Staudemeyer, Ralf C., Pöhls, Henrich C., and Wójcik, Marcin
- Published
- 2019
- Full Text
- View/download PDF
9. Shared-Dining: Broadcasting Secret Shares Using Dining-Cryptographers Groups
- Author
-
Juri Dispan, David Mödinger, Franz J. Hauck, Institute of Distributed Systems, Universität Ulm - Ulm University [Ulm, Allemagne], Miguel Matos, Fabíola Greve, TC 6, and WG 6.1
- Subjects
FOS: Computer and information sciences ,050101 languages & linguistics ,Security analysis ,Dining cryptographers problem ,Computer Science - Cryptography and Security ,Computer science ,Throughput ,02 engineering and technology ,Broadcasting ,Computer security ,computer.software_genre ,Secret sharing ,Computer Science - Networking and Internet Architecture ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Privacy protocol ,0202 electrical engineering, electronic engineering, information engineering ,0501 psychology and cognitive sciences ,[INFO]Computer Science [cs] ,Communication source ,Network protocol ,Peer-to-Peer networking ,Networking and Internet Architecture (cs.NI) ,business.industry ,05 social sciences ,Flooding (computer networking) ,Dining cryptographers ,020201 artificial intelligence & image processing ,business ,computer ,Cryptography and Security (cs.CR) ,Anonymity - Abstract
A k-anonymous broadcast can be implemented using a small group of dining cryptographers to first share the message, followed by a flooding phase started by group members. Members have little incentive to forward the message in a timely manner, as forwarding incurs costs, or they may even profit from keeping the message. In worst case, this leaves the true originator as the only sender, rendering the dining-cryptographers phase useless and compromising their privacy. We present a novel approach using a modified dining-cryptographers protocol to distributed shares of an (n,k)-Shamir's secret sharing scheme. Finally, all group members broadcast their received share through the network, allowing any recipient of k shares to reconstruct the message, enforcing anonymity. If less than k group members broadcast their shares, the message cannot be decoded thus preventing privacy breaches for the originator. Our system provides (n-|attackers|)-anonymity for up to k-1 attackers and has little performance impact on dissemination. We show these results in a security analysis and performance evaluation based on a proof-of-concept prototype. Throughput rates between 10 and 100 kB/s are enough for many real applications with high privacy requirements, e.g., financial blockchain system., 16 pages, 5 figures
- Published
- 2021
10. Weak Probabilistic Anonymity.
- Author
-
Deng, Yuxin, Palamidessi, Catuscia, and Pang, Jun
- Subjects
ANONYMITY ,SYSTEM identification ,STOCHASTIC processes ,PROBABILITY theory ,CRYPTOGRAPHERS ,CRYPTOGRAPHY - Abstract
Abstract: Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can be described probabilistically. In this paper we propose a notion of weak probabilistic anonymity, where weak refers to the fact that some amount of probabilistic information may be revealed by the protocol. This information can be used by an observer to infer the likeliness that the action has been performed by a certain user. The aim of this work is to study the degree of anonymity that the protocol can still ensure, despite the leakage of information. We illustrate our ideas by using the example of the dining cryptographers with biased coins. We consider both the cases of nondeterministic and probabilistic users. Correspondingly, we propose two notions of weak anonymity and we investigate their respective dependencies on the biased factor of the coins. [Copyright &y& Elsevier]
- Published
- 2007
- Full Text
- View/download PDF
11. Untraceable VoIP Communication based on DC-nets
- Author
-
Franck, Christian, Sorger, Ulrich, Franck, Christian, and Sorger, Ulrich
- Abstract
Untraceable communication is about hiding the identity of the sender or the recipient of a message. Currently most systems used in practice (e.g., TOR) rely on the principle that a message is routed via several relays to obfuscate its path through the network. However, as this increases the end-to-end latency it is not ideal for applications like Voice-over-IP (VoIP) communication, where participants will notice annoying delays if the data does not arrive fast enough. We propose an approach based on the paradigm of Dining Cryptographer networks (DC-nets) that can be used to realize untraceable communication within small groups. The main features of our approach are low latency and resilience to packet-loss and fault packets sent by malicious players. We consider the special case of VoIP communication and propose techniques for a P2P implementation. We expose existing problems and sketch possible future large-scale systems composed of multiple groups.
- Published
- 2016
12. Anonymous sealed bid auction protocol based on a variant of the dining cryptographers’ protocol
- Author
-
Bárász, Mihály, Ligeti, Péter, Mérai, László, and Nagy, Dániel A.
- Published
- 2012
- Full Text
- View/download PDF
13. Weak Probabilistic Anonymity
- Author
-
Jun Pang, Yuxin Deng, Catuscia Palamidessi, Preuves, Programmes et Systèmes (PPS), Centre National de la Recherche Scientifique (CNRS)-Université Paris Diderot - Paris 7 (UPD7), Concurrency, Mobility and Transactions (COMETE), Inria Saclay - Ile de France, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire d'informatique de l'École polytechnique [Palaiseau] (LIX), Centre National de la Recherche Scientifique (CNRS)-École polytechnique (X)-Centre National de la Recherche Scientifique (CNRS)-École polytechnique (X), Michael Backes and Andre Scedrov, Université Paris Diderot - Paris 7 (UPD7)-Centre National de la Recherche Scientifique (CNRS), Laboratoire d'informatique de l'École polytechnique [Palaiseau] (LIX), École polytechnique (X)-Centre National de la Recherche Scientifique (CNRS)-École polytechnique (X)-Centre National de la Recherche Scientifique (CNRS)-Inria Saclay - Ile de France, and Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)
- Subjects
Dining cryptographers problem ,General Computer Science ,Observer (quantum physics) ,0211 other engineering and technologies ,0102 computer and information sciences ,02 engineering and technology ,Computer security ,computer.software_genre ,01 natural sciences ,Theoretical Computer Science ,Nondeterminism ,Dining Cryptographers ,Protocol (object-oriented programming) ,Probability ,Mathematics ,021110 strategic, defence & security studies ,Probabilistic logic ,[INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO] ,16. Peace & justice ,Nondeterministic algorithm ,Action (philosophy) ,010201 computation theory & mathematics ,Identity (object-oriented programming) ,Anonymity ,computer ,Computer Science(all) - Abstract
International audience; Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can be described probabilistically. In this paper we propose a notion of weak probabilistic anonymity, where weak refers to the fact that some amount of probabilistic information may be revealed by the protocol. This information can be used by an observer to infer the likeliness that the action has been performed by a certain user. The aim of this work is to study the degree of anonymity that the protocol can still ensure, despite the leakage of information. We illustrate our ideas by using the example of the dining cryptographers with biased coins. We consider both the cases of nondeterministic and probabilistic users. Correspondingly, we propose two notions of weak anonymity and we investigate their respective dependencies on the biased factor of the coins.
- Published
- 2007
14. Riffle: An Efficient Communication System With Strong Anonymity
- Author
-
Bryan Ford, David Lazar, Albert Kwon, Srinivas Devadas, Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory, and Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
- Subjects
anonymity ,cryptography ,Riffle ,business.industry ,Computer science ,Information technology ,020206 networking & telecommunications ,security ,02 engineering and technology ,privacy ,Communications system ,World Wide Web ,dining cryptographers ,traffic analysis ,0202 electrical engineering, electronic engineering, information engineering ,file sharing ,General Earth and Planetary Sciences ,020201 artificial intelligence & image processing ,Engineering ethics ,business ,General Environmental Science ,Anonymity - Abstract
Existing anonymity systems sacrifice anonymity for efficient communication or vice-versa. Onion-routing achieves low latency, high bandwidth, and scalable anonymous communication, but is susceptible to traffic analysis attacks. Designs based on DC-Nets, on the other hand, protect the users against traffic analysis attacks, but sacrifice bandwidth. Verifiable mixnets maintain strong anonymity with low bandwidth overhead, but suffer from high computation overhead instead. In this paper, we present Riffle, a bandwidth and computation efficient communication system with strong anonymity. Riffle consists of a small set of anonymity servers and a large number of users, and guarantees anonymity among all honest clients as long as there exists at least one honest server. Riffle uses a new hybrid verifiable shuffle technique and private information retrieval for bandwidth- and computation-efficient anonymous communication. Our evaluation of Riffle in file sharing and microblogging applications shows that Riffle can achieve a bandwidth of over 100KB/s per user in an anonymity set of 200 users in the case of file sharing, and handle over 100,000 users with less than 10 second latency in the case of microblogging., National Science Foundation (CNS-1413920)
- Published
- 2015
15. Dining Cryptographers are Practical
- Author
-
Franck, Christian, van de Graaf, Jeroen, Franck, Christian, and van de Graaf, Jeroen
- Abstract
The dining cryptographers protocol provides information-theoretically secure sender and recipient untraceability. However, the protocol is considered to be impractical because a malicious participant may disrupt the communication. We propose an implementation which provides information-theoretical security for senders and recipients, and in which a disruptor with limited computational capabilities can easily be detected.
- Published
- 2015
16. Dining Cryptographers with 0.924 Verifiable Collision Resolution
- Author
-
Franck, Christian and Franck, Christian
- Abstract
The dining cryptographers protocol implements a multiple access channel in which senders and recipients are anonymous. A problem is that a malicious participant can disrupt communication by deliberately creating collisions. We propose a computationally secure dining cryptographers protocol with collision resolution that achieves a maximum stable throughput of 0.924 messages per round and which allows to easily detect disruptors.
- Published
- 2014
17. A symmetry reduction technique for model checking temporal epistemic logic
- Author
-
Cohen, M, Lomuscio, A, Dam, Mads, Qu, H, Cohen, M, Lomuscio, A, Dam, Mads, and Qu, H
- Abstract
We introduce a symmetry reduction technique for model checking temporal-epistemic properties of multi-agent systems defined in the mainstream interpreted systems framework. The technique, based on counterpart semantics, aims to reduce the set of initial states that need to be considered in a model. We present theoretical results establishing that there are neither false positives nor false negatives in the reduced model. We evaluate the technique by presenting the results of an implementation tested against two well known applications of epistemic logic, the muddy children and the dining cryptographers. The experimental results obtained confirm that the reduction in model checking time can be dramatic, thereby allowing for the verification of hitherto intractable systems., QC 20120207
- Published
- 2009
- Full Text
- View/download PDF
18. Kryptografické protokoly pro CrypTool
- Author
-
Henzl, Martin, Zelený, Jan, Henzl, Martin, and Zelený, Jan
- Abstract
Práce je zaměrena na kryptografické protokoly a jejich implementaci do programu CrypTool. Cílem práce je určit, které kryptografické protokoly by bylo vhodné do programu CrypTool implementovat a následně jejich implementaci provést takovým způsobem, aby jejich demonstrace byla co nejnázornější a nejvhodnější pro pochopení jejich konceptu. V souvislosti se zadáním této práce byly vybrány protokoly Dining Cryptographers, Coin Flipping a Zero-Knowledge. Jako další vhodné protokoly byly přidány Oblivious Transfer a Yao´s Millionaire Problem. V práci je podrobně popsán koncept vybraných protokolů a postup při jejich implementaci., This work is focused on cryptographic protocols and their implementation in the CrypTool. Goal of this work is to settle which cryptographics protocols are appropriate to implement and to find the way how to implement them most illustratively and usably for educational purposes. These protocols were chosen according to the work assigment: Dining Cryptograhpers, Coin Flippin and Zero-Knowledge. As other appropriate protocols were added: Yao´s Millionaire Problem and Oblivious Transfer. Detailed concept of chosen protocols and their implementation process are described in this work.
19. Kryptografické protokoly pro CrypTool
- Author
-
Henzl, Martin, Zelený, Jan, Henzl, Martin, and Zelený, Jan
- Abstract
Práce je zaměrena na kryptografické protokoly a jejich implementaci do programu CrypTool. Cílem práce je určit, které kryptografické protokoly by bylo vhodné do programu CrypTool implementovat a následně jejich implementaci provést takovým způsobem, aby jejich demonstrace byla co nejnázornější a nejvhodnější pro pochopení jejich konceptu. V souvislosti se zadáním této práce byly vybrány protokoly Dining Cryptographers, Coin Flipping a Zero-Knowledge. Jako další vhodné protokoly byly přidány Oblivious Transfer a Yao´s Millionaire Problem. V práci je podrobně popsán koncept vybraných protokolů a postup při jejich implementaci., This work is focused on cryptographic protocols and their implementation in the CrypTool. Goal of this work is to settle which cryptographics protocols are appropriate to implement and to find the way how to implement them most illustratively and usably for educational purposes. These protocols were chosen according to the work assigment: Dining Cryptograhpers, Coin Flippin and Zero-Knowledge. As other appropriate protocols were added: Yao´s Millionaire Problem and Oblivious Transfer. Detailed concept of chosen protocols and their implementation process are described in this work.
20. Kryptografické protokoly pro CrypTool
- Author
-
Henzl, Martin, Zelený, Jan, Henzl, Martin, and Zelený, Jan
- Abstract
Práce je zaměrena na kryptografické protokoly a jejich implementaci do programu CrypTool. Cílem práce je určit, které kryptografické protokoly by bylo vhodné do programu CrypTool implementovat a následně jejich implementaci provést takovým způsobem, aby jejich demonstrace byla co nejnázornější a nejvhodnější pro pochopení jejich konceptu. V souvislosti se zadáním této práce byly vybrány protokoly Dining Cryptographers, Coin Flipping a Zero-Knowledge. Jako další vhodné protokoly byly přidány Oblivious Transfer a Yao´s Millionaire Problem. V práci je podrobně popsán koncept vybraných protokolů a postup při jejich implementaci., This work is focused on cryptographic protocols and their implementation in the CrypTool. Goal of this work is to settle which cryptographics protocols are appropriate to implement and to find the way how to implement them most illustratively and usably for educational purposes. These protocols were chosen according to the work assigment: Dining Cryptograhpers, Coin Flippin and Zero-Knowledge. As other appropriate protocols were added: Yao´s Millionaire Problem and Oblivious Transfer. Detailed concept of chosen protocols and their implementation process are described in this work.
21. Kryptografické protokoly pro CrypTool
- Author
-
Henzl, Martin, Zelený, Jan, Skowronek, Ondřej, Henzl, Martin, Zelený, Jan, and Skowronek, Ondřej
- Abstract
Práce je zaměrena na kryptografické protokoly a jejich implementaci do programu CrypTool. Cílem práce je určit, které kryptografické protokoly by bylo vhodné do programu CrypTool implementovat a následně jejich implementaci provést takovým způsobem, aby jejich demonstrace byla co nejnázornější a nejvhodnější pro pochopení jejich konceptu. V souvislosti se zadáním této práce byly vybrány protokoly Dining Cryptographers, Coin Flipping a Zero-Knowledge. Jako další vhodné protokoly byly přidány Oblivious Transfer a Yao´s Millionaire Problem. V práci je podrobně popsán koncept vybraných protokolů a postup při jejich implementaci., This work is focused on cryptographic protocols and their implementation in the CrypTool. Goal of this work is to settle which cryptographics protocols are appropriate to implement and to find the way how to implement them most illustratively and usably for educational purposes. These protocols were chosen according to the work assigment: Dining Cryptograhpers, Coin Flippin and Zero-Knowledge. As other appropriate protocols were added: Yao´s Millionaire Problem and Oblivious Transfer. Detailed concept of chosen protocols and their implementation process are described in this work.
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.